LIA opportunities for autumn 2025 to spring 2026

CGI

Not Interested
Bookmark
Report This Job

profile Job Location:

Stockholm - Sweden

profile Monthly Salary: Not Disclosed
Posted on: 07-11-2025
Vacancies: 1 Vacancy

Job Summary

Position Description:

From Autumn 2025 to spring 2026 we will be offering LIA students positions in the following areas/projects/teams.
We follow most schools LIA planning periods.
To be an integer part of the team or as part of a project to develop new functionalities in current systems and tools or if need be develop a new set of tools.
Most of the work will be Office-based. All students will have at least one buddy or Team the case of projects they will be managed by a Project manager and supervised by one of our managers. We also provide technical competence wherever needed.
We value: Competence Ability to work in teams and your own drive to accomplish the task. As always it is a combination of working alone to solve your assignment and to work in a team to build a great solution together.
All roles are subject to background checks as our customers demand that.

To apply:

In the application please add what role/s you are interested in so we can handle all applicants as quickly as possible. You can add several roles of course in the single application.

Do not forget to personalize your application add things like hobbies interests what you do in your free time and what motivates and drives you forward in your career.

Good luck with your application!

Your future duties and responsibilities:

Compliance

In this project we are looking for several positions.
Be a part of our LIA team to build our onprem AI platform.

Continue with our PolicyPilot initiative to integrate all frameworks: ESMF and external NIS2 SOC2 DORA ISOxxxx etc
oSeparate PolicyPilot in an external part and an internal part where different rules apply.
Train the AI module to not hallucinate.
Build a ready product and establish a functional production environment.
Consulting

Roles:
AI/ML students
Datamanager Dataengineer students
Devekoper

Knowledge:
AI/ML
Linux
Scripting python
Containers/Kubernetes
Databases

Contracts

In this project we are looking for several positions.
Be a part of our Legal LIA project to digitalize and chunk all our contracts for better usage automation billing and understanding the Legal and Financial risk in these documents.

With PolicyPilot extend to incorporate all our Supplier contracts as well as all Client contracts.
Use AI / Data to find gaps look for errors risks in contracts (fines SLA) collect valuable data like what services are included in the contract number of users servers and add/compare/update that to CMDB data.

Needs:
AI/Ml students
Datamanager Dataengineer students
Project Manager student

Knowledge

AI/ML
Linux
Scripting python
Containers/Kubernetes
Databases

Data Management and Reporting

In this project we are looking for several positions.
Be a part of our Operations Support team to develop automated reporting for our management teams add new features combine reporting and automation tasks.

Use data and AI to automate reporting like CaFss to Management power BI reports
Develop and Incorporate Business Impact Register to Power BI standard reporting
Develop and merge Risk register from sharepoint

Needs:
Datamanager Dataengineer students
AI/ML students

Knowledge
Linux
Scripting python
Containers/Kubernetes
Databases

Helix ITSM
In this project we are looking for several positions.
Be a part of our Helix ITSM team. To develop new functionalities using both built-in AI and on-prem AI in AI projects on our ITSM platform. For our upgrade and AIOPS Helix GPT introduction data structure data cleaning etc... And development of new dashboards using Helix components and data structure.

AIOPS
Helix-GTP
Data cleaning integrations etc

Needs:
AI/Ml students
Datamanager Dataengineer students

Knowledge
Linux
Scripting python
Containers/Kubernetes
Databases
Helix ITSM

Datacenter move

In this project we are looking for several positions.

Datacenter setup and management
Physical setup of DC network Infrastructure (Servers Network etc)
Cloud and Virtualization
Part of team to design build new platform and transfer load to the new platform
Maintain current platform during migration phase

Needs:

ICT students
Cloud and Virtualization students with focus on private clouds

Knowledge

Infrastructure and Datacenter
Linux
Scripting
Containers/Kubernetes
Databases

Private and Public cloud projects

In this project we are looking for several positions.
Be part of the team to build and develop our Private Cloud (Enterprise Cloud) build and manage automations develop new features and functions.
Be part of our Public Cloud team and develop and Manage our client estates. Make best use of inhouse / built in features for Managing Monitoring Automation standard reporting Security.

Needs:

Cloud and Virtualization students
DevOps students
Fullstack developer
Datamanager Dataengineer students

Knowledge

Linux Windows
Scripting python
Containers/Kubernetes
Vmware platform RedHat openshift

Cloud & Virtualization

Onsite Technican
In this position we are looking for several positions.

Work with Client team onsite for our external clients with general PC Print Server Application support and Management/Maintenance.

Needs:
Onsite Technicans students
Technical Operations Specialist students

Knowledge:
Windows Linux
Service Management Tools and processes (ITIL pref Incident Problem Change)
M365 knowledge
Basic Networking

Identity and Access Management (IAM)

Identity First is the core for cyber security and the zero-trust doctrine! If you dont know who and what the person can access then there is no security at all. Identity and Access Management (IAM) is one of the key areas when working with cyber security.

Our team is working with the three pillars of IAM:
IGA Identity Governance and Administration to be in control of who can access what how they got this access who approved it and being able to prove that you are in control.
Access Control authentication multifactor authentication federation level of assurance in other words to make sure the person is who he or she claims they are.
PAM Privileged Access Management how to protect administrative or high privileged resources. Often combined with IGA and Access Control with a high level of assurance to raise the security for accessing critical capabilities in the organization.
The IAM area combines business knowledge with technology and resources with this competence is scarce on the our team you will find experts that happily share their knowledge and experience. If you show your dedication and fit the team they will gladly be your future colleagues as well.

Needs:
Cybersecurity students
Identity and Access Management students

Knowledge
Cybersecurity
Databases
A holistic perspective; business requirements - regulations - safety requirements - quality requirements - technical solution - business benefit

Security

The purpose of this internship is to provide the student with practical experience in the development operation and maintenance of log management and malware detection platforms.

The student has a strong personal interest in cybersecurity and IT security and the internship aims to strengthen both technical and analytical skills through real-world applications.
Under supervision the student will apply foundational knowledge gain insight into system design and data flows and become familiar with the tools methods and routines used in professional cybersecurity environments.

Needs:
Cybersecurity students are the most suitable candidates. They understand IT infrastructure threats and security operations and are motivated to work with malware detection SIEM and platform maintenance
Data engineering students are a strong secondary fit. They bring skills in data pipelines log processing and analytics making them valuable for managing and developing log ingestion and monitoring systems

Knowledge
Introductory understanding of computer networks protocols and basic infrastructure (e.g. TCP/IP DNS VPN firewalls)
Basic familiarity with operating systems such as Windows and Linux.
Awareness of cybersecurity fundamentals common threats vulnerabilities and protection methods.
Initial experience with scripting or command-line environments (PowerShell Bash or Python).
Basic knowledge of log analysis and monitoring concepts (e.g. SIEM IDS/IPS).
Understanding of general IT security practices such as access control and patch management.

What you can expect from us:

Låt oss som ägare omvandla verklig insikt till handling tillsammans.

Livet på CGI bygger på ägande lagarbete respekt och tillhörighet. Tillsammans med oss kommer du att kunna nå din fulla potential.

Du är inbjuden att ta ägandeskap redan från första dagen i vårt arbete med att förverkliga vår dröm om att skapa en arbetsmiljö där vi trivs med att arbeta tillsammans och bidrar till framgången för vårt företag. Det är därför vi kallar oss CGI Partners snarare än anställda. Vi drar nytta av vår kollektiva framgång och tillsammans får vi möjlighet att aktivt forma vår företagsstrategi och inriktning.

Ditt arbete skapar värde. Du kommer att vara med att utveckla innovativa lösningar och bygga relationer med medarbetare och kunder samtidigt som du får tillgång till globala möjligheter att skala upp dina idéer omfamna nya möjligheter och dra nytta av gedigen bransch- och teknikexpertis.

Du kommer att forma din karriär tillsammans med ett företag som är byggt för att växa och bestå. Du får stöd av ledare som bryr sig om din hälsa och ditt välbefinnande och ger dig möjligheter att fördjupa dina kunskaper och vidga dina vyer.

Bli en del en av världens största leverantörer av IT- och affärskonsulttjänster.

Position Description:From Autumn 2025 to spring 2026 we will be offering LIA students positions in the following areas/projects/teams. We follow most schools LIA planning periods. To be an integer part of the team or as part of a project to develop new functionalities in current systems and tools o...
View more view more

Key Skills

  • Anti Money Laundering
  • Gas Turbine
  • CNC
  • Jpa
  • Marine Services
  • ACCA

About Company

Company Logo

The COMPANY is one of the few end-to-end consulting firms with the scale, reach, capabilities and commitment to meet clients’ enterprise digital transformation needs. Our 77,500 consultants and professionals work side-by-side with clients in 10 industries across more than 400 location ... View more

View Profile View Profile