Start or extend your cybersecurity career with a training program
built by experienced practitioners.
Whether you are new to cybersecurity or have a background in IT, GPSU is designed to help you begin or enhance your cybersecurity career.
We are authorized to conduct SkillBridge, Career Skills Program and Hiring Our Heroes internships.
Learn more about our DoD internships by contacting the team at [email protected].
Application Delivery
A combination of services that work together to provide a functional and secure application – spanning from end user interactions through data processing to where the data is stored.
Network Security
The network security team helps ensure the integrity and security of physical and virtual networks, by evaluating and administering devices, such as firewalls and other network access controls.
Application Security
Application Security engineers review underlying code and test live applications to identify vulnerabilities that a threat could exploit. Members of the application security team often work in tandem with other technical specialties, such as penetration testers, to provide a more holistic approach to proactive security.
Penetration Testing
This offensive aspect of security proactively tests networks, devices, and applications for vulnerabilities that a threat could exploit to steal information or cause damage to an organization. Pentests often conclude with a detailed description of an organization’s overall security posture, along with suggestions to mitigate cyber risk.
Cloud Security
Cloud Security professionals enable organizations to secure their Amazon Web Services, Microsoft Azure and Google Cloud Platform environments. Cloud security covers many aspects of cybersecurity security: operations, administration, compliance and architecture.
Project Management
Help drive all operations and ensure cybersecurity projects are seen through to completion. PMs are involved in all disciplines covered by GuidePoint Security.
Governance, Risk and Compliance (GRC)
GRC professionals review and manage the processes, roles, controls, and metrics of handling information – while also ensuring that organizations understand relevant laws, regulations, and their current risk and compliance posture.
Security Analytics & Automation
An approach where data is analyzed to produce proactive security measures. Organizations often use Security Information and Event Management (SIEM) platforms to collect and analyze data from multiple sources in order to detect threats, ensure compliance and manage incidents. Security Orchestration, Automation & Response (SOAR) technologies are used to ingest data and automate security tasks through playbooks that integrate various products and application mechanisms.
Identity & Access Management
A framework for managing digital identities and controlling user access to critical information and systems without impeding business operations. Privileged Access Management (PAM) oversees the technologies that exert control over account privileges and elevated access levels across the network. Identity Governance and Administration (IGA) enables administrators and security teams to manage and reduce risk related to unnecessary user access levels.
Security Operations
The Security Operations Center (SOC) is where security professionals monitor network traffic and respond to potential cyber threats early within the threat lifecycle. Security analysts review alerts in real time to identify abnormal activity requiring further review by a technical expert.
Apply for an Internship! See available internships on our Careers Page.
Want More Information? Please contact [email protected]