FAQs
What is the main purpose of the Information Security Internship?
The main purpose of the internship is to support the MLB Information Security team in the implementation, maintenance, and monitoring of the Major League Baseball Cybersecurity Program.
What are the major responsibilities of an intern in this position?
Major responsibilities include assisting with digital investigations, incident response efforts, performing security audits, risk analysis, network forensics, penetration testing, developing and maintaining scripts or programs, and supporting efforts to improve security posture throughout the MLB environment.
What educational background is required for this internship?
Applicants must have completed or be working towards a Bachelor's or Master's degree in Computer Science, Information Technology, Information Security, Cybersecurity, Criminal Justice, or a related field.
Are there programming skills that the intern should have?
Yes, familiarity with scripting languages such as Python or Go, as well as knowledge of systems engineering using DevOps tooling and working with APIs, is a plus.
What personal traits are important for this internship?
Important traits include being self-motivated, having strong organizational skills, attention to detail, and the ability to maintain confidentiality while dealing with sensitive information.
Are there any preferred certifications for applicants?
Yes, relevant certifications such as COMPTIA Security+, Offensive Security OSCP, or SANS certifications are considered a plus.
What are the hourly pay rates for this internship position?
According to the NYC pay transparency law, the hourly pay range for this position is $20.00 to $23.00.
Who can I contact for accommodations during the application process?
You can contact accommodations@mlb.com for any reasonable accommodations needed during the application and/or interview process.
What skills are beneficial for this internship role?
Beneficial skills include strong verbal and written communication abilities, interest in vulnerability assessment, intrusion/threat detection, and familiarity with digital investigations and endpoint security.