Cybersecurity Intern (6 months)

DXC Technology

Not Interested
Bookmark
Report This Job

profile Job Location:

Petaling Jaya - Malaysia

profile Monthly Salary: Not Disclosed
Posted on: Yesterday
Vacancies: 1 Vacancy

Job Summary

Job Description:

Role Summary

This 6month internship provides hands-on exposure to cybersecurity operations across Security Operations (SOC) infrastructure security identity management and GRC. You will work on real operational tasks with mentor guidance following a structured plan with clear deliverables and measurable outcomes.

Key Responsibilities & Work Environment

  • Triage security alerts under supervision validate findings and determine closure or escalation.

  • Gather analyze and document evidence from logs endpoints and network sources with clear case notes.

  • Follow established runbooks consistently and propose practical improvements to strengthen processes.

  • Support infrastructure security activities including system hardening vulnerability tracking and remediation verification.

  • Identify monitoring gaps and contribute to detection improvement ideas with consideration of false positives.

  • Apply identity and access management principles including least privilege and role-based access.

  • Support access reviews and prepare audit-ready evidence on user access and approvals.

  • Assist in maintaining privileged access controls and ensuring proper documentation.

  • Contribute to GRC activities including control-to-evidence mapping basic risk documentation and audit traceability.

  • Produce weekly deliverables such as triage write-ups runbook improvements verification reports and access review documentation.

  • Maintain a structured repository of notes templates and finalized artifacts.

  • Deliver a final capstone project that provides practical value to the team (e.g. detection improvement or runbook enhancement).

  • Work in a live operational environment with supervision defined escalation paths and possible SOC shift exposure.

  • Adhere strictly to confidentiality approved tools and data handling requirements.

Requirements & Preferred Profile

  • Currently enrolled in a degree/diploma in IT Computer Science Cybersecurity or a related field.

  • Basic understanding of networking (IP DNS HTTP) and operating systems (Windows or Linux).

  • Strong written communication and ability to produce clear structured documentation.

  • Ability to follow processes consistently and apply feedback.

  • Exposure to security concepts such as monitoring vulnerability management identity controls or basic scripting is advantageous.

  • Interest in operational work requiring accuracy consistency and evidence-based thinking.

Additional Information:


Intake: June/July/August 2026
Internship Duration: Minimum 6 months
Eligibility: Malaysian citizens only finalyear students

Work arrangement: Hybrid (1-2 days on site) 8.30 am to 5.30 pm

Work location: DXC office10A Jalan Bersatu 13/4 PJSPetaling Jaya Selangor Malaysia

At DXC Technology we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing productivity individual work styles and life circumstances. Were committed to fostering an inclusive environment where everyone can thrive.

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services such as false websites or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process nor ask a job seeker to purchase IT or other equipment on our information on employment scams is availablehere.


Required Experience:

Intern

Job Description:Role SummaryThis 6month internship provides hands-on exposure to cybersecurity operations across Security Operations (SOC) infrastructure security identity management and GRC. You will work on real operational tasks with mentor guidance following a structured plan with clear delivera...
View more view more

About Company

Company Logo

Created by the merger of CSC and the Enterprise Services business of Hewlett Packard Enterprise, DXC Technology boasts a long and proud history of innovation, service and value. In 1959, computer analysts Roy Nutt and Fletcher Jones pooled $100 to form CSC, providing computer manufac ... View more

View Profile View Profile