The duties and responsibilities that I was given as intern was to join the hunter team. Our first responsibilities were to learn the standing operating procedures and to start downloading a few programs that the company uses. I download an encryption key program for my …show more content…
I read a few presentations about the Intelligence Cycle and on OPSEC training that works with the Intelligence Cycle. My responsibilities expanded from reading presentations and making an excel database with my fellow Intern co-workers to working on real client monitoring of issues that have been present to the team that I’m on. I start to learn how to use their API website to help see threats that the clients have and another website that monitors social media website and helps with analyst threats that may affect our clients. I took this internship because I want real experience in the IT field and the team and job that I’m doing is very passionate. Being a hunter and helping to recognize threats that may occur before it happens is what I like. I want to have security + and CISSP certifications, and I want to work in the security side of the virtual space. Even after watching the webinar on the cyber-attack on the Swift Bank and seeing that new specialist jobs will occur such as hunter, incident responders, forensics, malware analysts, application specialist, big data, and machine learning. These specialists would be working we one another to accomplish the mission and helping out each. I like being on the hunter team and knowing that there are white hat hackers out their helping to make a difference in the cyber world that is only going to get more …show more content…
The research that I looked had helped me in improving my writing skills, so I can write in American Psychological Association (APA) or Modern Language Association (MLA) format. Another format that I had to do which there is not book is the writing for news articles or Law papers because the articles are not written in APA or MLA format. The knowledge that I’ve learned at the internship will help know that there is an application to encrypt emails, and make GPG keys to link with mac email application. The Intelligence Cycle is one of the most important agile methodology to learn because I would be able to apply it to this cycle to another job that I may have in the future. The Intelligence Cycle would apply to law enforcement, military, cyber, and even businesses because even businesses need to know future events that may occur that would affect their performance; therefore, changing the value in stocks for the