Skip to content
  Tuesday 20 January 2026
Trending
January 3, 2022How to Remove/Uninstall Office 2016 via Microsoft Fix It Tool 2022 December 5, 2024Cybersecurity, Journeyman TS March 21, 2024U.S. Imposes Sanctions on Russians Linked to ‘Doppelganger’ Cyber Influence Campaign January 19, 2024Finnish hacker refutes involvement in psychotherapy clinic attack July 8, 2024Cybersecurity Engineer October 24, 2023Cybersecurity Operations Engineer February 29, 2024Cybersecurity Analyst January 10, 2024Cybersecurity Engineer III January 5, 2025Lead Cybersecurity VPN Security Engineer December 10, 2024Cleo File Transfer Vulnerability Exploited – Act Now!
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Cybersecurity Intern
Careers

Cybersecurity Intern

SecuredyouadmSecuredyouadm—October 12, 20240
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Director, Emerging Technologies (Cybersecurity)

April 3, 2025

Cybersecurity Project Manager

February 4, 2024

Lead Cybersecurity Integrated Architect

August 1, 2025

Principal Cybersecurity – ServiceNow Technical Program Management

March 21, 2025

DepartmentITJob DescriptionAbout Kendra ScottWe are a fashion-lifestyle brand of big dreams, colorful confidence, and inspired design. Founded on Family, Fashion and Philanthropy, we believe that our employees and customers are the heart and soul of our brand, and that giving back is the truest form of success. Fashion meets innovation in the design of our two state-of-the-art facilities based in the heart of Austin, Texas, and overflows into the design of our growing retail environment across the country.Internship Details to KnowThe Kendra Scott Summer Internship Program offers a hands-on experience inside our rapidly growing multi-category fashion lifestyle brand. We value you. In our program, we are dedicated to shaping your unique interests and career aspirations, equipping you for success in your career and life.Basics

  • The Kendra Scott Internship experience is a 9-week, paid program with the requirement to be in Austin, TX. The internship will begin on June 2nd and end July 31st.
  • This is a full-time, 40/hour a week, in person opportunity. This program will be offered at $17/hour.
  • Please apply to only one internship position that you are most interested in pursuing
  • Sponsorship and Relocation assistance is not currently provided.
  • The deadline for internship applications is November 1, 2024, at 11:59 pm PST
  • Candidates will be informed of their status throughout our process, with final offers being extended in December 2024

The Value You Will Receive

  • Meet and greets and Q&A sessions with our Senior Leadership team
  • Career development with on-the-job training, guided by a Kendra Scott Mentor in your department
  • Learning and Development training sessions featuring LinkedIn, DEI, interview and resume skills, in store experience, presentation skills
  • Networking, social and philanthropy opportunities with fellow interns and business associates to develop relationships with each other and key leaders within KS

Total Rewards Package for Summer Interns

  • Up to 60% employee discount
  • Pre-planned events around Austin, to get to know the city that KS calls home!
  • Exclusive internal launch parties
  • Fourth of July will be observed as a paid company Holiday
  • Hybrid working (function dependent)
  • In office gym with equipment
  • Daily smoothies from the Kendra Scott Smoothie Bar
  • Unlimited snacks
  • Full-time, on-site security
  • Covered Secured Free Parking Garage

Position Overview
The cybersecurity internship is designed to provide exposure to a variety of security tasks that one should expect a junior or entry-level security analyst to perform. Kendra Scott LLC is seeking a dedicated and proactive Cybersecurity Intern to join our Information security team. This internship offers an exciting opportunity for individuals interested in pursuing a career in cybersecurity to gain hands-on experience in a dynamic and innovative retail environment. As a Cybersecurity Intern, you will work alongside our cybersecurity professionals, contributing to safeguarding our digital assets and ensuring the security and privacy of our customers’ data. At the end of the internship the intern will be required to complete one special security-focused project that will serve as a more detailed look into one specific security need. This project will be adjusted to the needs of Kendra Scott and matched to the skill set of the student.ResponsibilitiesThreat Monitoring and Analysis: Collaborate with the cybersecurity team to analyze and respond to security events.Vulnerability Assessment: Participate in vulnerability scanning and assessment activities, helping to identify and prioritize security weaknesses. Contribute to the development of mitigation strategies.Incident Response Support: Aid in incident response activities, including documenting incidents, coordinating with relevant teams, and implementing remediation measures to minimize the impact of security incidents.Security Awareness: Support the development and delivery of cybersecurity awareness training materials for employees to promote best practices and ensure a security-conscious culture.Policy and Procedure Compliance: Assist in reviewing and updating security policies and procedures to align with industry standards and regulatory requirements.Security Documentation: Contribute to the creation and maintenance of cybersecurity documentation, including incident reports, risk assessments, and security-related documentation.Security Tools Utilization: Gain practical experience with various cybersecurity tools and technologies, such as firewalls, intrusion detection systems, and antivirus solutions.Research and Stay Informed: Stay current with the latest cybersecurity threats and trends through research and provide insights and recommendations to enhance security measures.Collaboration: Collaborate with cross-functional teams to integrate security into all aspects of Kendra Scott LLC’s operations and projects.Our Ideal Candidate Will Have

  • Enrollment in a Relevant Degree Program: Currently pursuing a bachelor’s or master’s degree in Cybersecurity, Information Security, Computer Science, or a related field.
  • Passion for Cybersecurity: Demonstrated interest in cybersecurity, with a strong desire to learn and excel in this field.
  • Basic Knowledge: Familiarity with fundamental cybersecurity principles and concepts is preferred. Relevant coursework or projects related to cybersecurity is a plus.
  • Analytical Skills: Strong analytical and problem-solving abilities to effectively assess and address security issues.
  • Communication Skills: Excellent written and verbal communication skills to collaborate with team members and convey security concerns.
  • Detail-Oriented: Attention to detail to thoroughly review and analyze security data and reports.
  • Team Player: Ability to work cohesively in a team environment and learn from experienced professionals.
  • Ethical Mindset: Commitment to ethical behavior, integrity, and respect for the confidentiality and privacy of sensitive information.
  • Technical Skills: Familiarity with operating systems (e.g., Windows, Linux), networking concepts, and basic scripting skills (e.g., Python) is a plus.
  • A growth mindset: desire to learn, grow and embrace new ideas
  • A shared appreciation for our 3 core values of Family, Fashion and Philanthropy

We are an equal opportunity employer and value diversity at our company.DivisionHome OfficePosition TypeTemporary
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Sr Engineer – Cybersecurity Threat Detection Engineering
Senior Cybersecurity Engineer
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures