Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
FM Research Cybersecurity Co-op image - Rise Careers
Job details

FM Research Cybersecurity Co-op

FM is a leading property insurer of the world's largest businesses, providing more than one-third of FORTUNE 1000-size companies with engineering-based risk management and property insurance solutions. FM helps clients maintain continuity in their business operations by drawing upon state-of-the-art loss-prevention engineering and research; risk management skills and support services; tailored risk transfer capabilities; and superior financial strength. To do so, we rely on a dynamic, culturally diverse group of employees, working in more than 100 countries, in a variety of challenging roles.

 

We are seeking a highly motivated and detail-oriented co-op student to join our cybersecurity team. The successful candidate will contribute to the continuous development of cyber mitigation strategies for Operational Technology (OT) environments, leveraging the MITRE ATT&CK for ICS matrix. This position offers hands-on experience in designing attack experiments, evaluating mitigation techniques, and supporting the development of testbeds for validating security measures. The co-op student will also be involved in producing technical documentation and utilizing threat intelligence to enhance our cybersecurity posture.

  • Testbed Support
    • Assist in the development and maintenance of testbeds for validating cyber mitigation strategies.
    • Interest in configuring and troubleshoot hardware and software components within the testbed environment, including industrial devices (PLC, HMI, DCS, RTU, etc.) and industrial software (e.g. OPC UA/DA, PI, historians, user repositories, firewall management including inspection, etc.).
  • MITRE ATT&CK for ICS Expertise
    • Leverage MITRE ATT&CK for ICS matrix to understand adversarial tactics, techniques, and procedures in industrial control systems.
    • Research and propose mitigation strategies to address specific threats identified within the MITRE ATT&CK for ICS framework.
  • Run Experiments
    • Design and document attack experiments to simulate real-world cyber threats against OT environments.
    • Focus on attack strategies that are shifting from immediate exploitation to establishing persistent footholds within OT environments.
    • Incorporate techniques such as exploiting supply chains and "living off the land".
  • Analysis of Run Experiments
    • Evaluate the effectiveness of proposed IT and OT mitigation strategies in preventing or mitigating the impact of simulated attacks.
    • Analyze the results of experiments and provide recommendations for improving mitigation techniques.
  • Technical Documentation
    • Produce clear and concise slipsheets, technical reports, and presentations summarizing research findings and experimental results.
    • Document IT and OT attack methodologies, mitigation strategies, and testbed configurations.
  • Threat Intelligence and Research
    • Leverage threat intelligence feeds and research capabilities to stay informed about emerging cyber threats and vulnerabilities.
    • Analyze threat intelligence data to identify relevant threats to our OT environment and propose proactive security measures.
    • Use platforms and frameworks to improve and automate threat research.
  • Currently enrolled in a Master's degree program in Cybersecurity, Computer Science, Engineering, or a related field.
  • Familiarity with industrial control systems (ICS) and operational technology (OT) concepts.
  • Understanding of cyber-attack methodologies and mitigation techniques.
  • Knowledge of the MITRE ATT&CK framework, particularly the ICS matrix.
  • Interest in designing and conducting experiments or simulations.
  • Analytical and problem-solving skills.
  • Fluency in English, written and verbal communication skills.
  • Ability to work independently and as part of a team.

 

Preferred Skills

  • Experience with penetration testing or ethical hacking.
  • Knowledge of network security principles and technologies.
  • Familiarity with scripting languages such as Python or PowerShell.
  • Experience with virtualization technologies such as VMware or VirtualBox.
  • Understanding of threat intelligence concepts and tools.

 

This co-op position offers a valuable opportunity to gain practical experience in the field of OT cybersecurity and contribute to the development of innovative mitigation strategies.

 

This is an in-office role based in Norwood, MA. Temporary relocation support provided for selected qualified candidate.

FM is an Equal Opportunity Employer and is committed to attracting, developing, and retaining a diverse workforce. 

 

#LI-TA1

 

What You Should Know About FM Research Cybersecurity Co-op, FM

FM is looking for a passionate FM Research Cybersecurity Co-op to join our amazing cybersecurity team in Norwood, MA! As a leading property insurer for some of the world's largest businesses, we provide engineering-based risk management and property insurance solutions that help our clients maintain continuity in their operations. In this exciting co-op role, you'll dive into the world of cybersecurity for Operational Technology (OT) environments while getting hands-on experience in designing attack experiments and evaluating mitigation techniques. You'll also assist in developing and maintaining testbeds that validate our cyber mitigation strategies, utilizing the MITRE ATT&CK for ICS matrix to understand adversarial tactics and propose effective solutions. Your role will involve producing technical documentation to summarize research findings, analyzing threat intelligence, and continuously improving our cybersecurity posture. We’re looking for someone currently enrolled in a Master's degree program in Cybersecurity, Computer Science, Engineering, or a related field, with a strong interest in ICS/OT concepts and cyber-attack methodologies. If you have analytical skills, a knack for problem-solving, and a collaborative spirit, this could be the perfect opportunity for you to grow and contribute to our innovative cybersecurity strategies. At FM, we embrace a diverse workforce and are committed to fostering an inclusive environment. Join us and be a part of something more than just work—make a difference in the cybersecurity space today!

Frequently Asked Questions (FAQs) for FM Research Cybersecurity Co-op Role at FM
What responsibilities does the FM Research Cybersecurity Co-op have?

As an FM Research Cybersecurity Co-op, you will play a vital role in developing cyber mitigation strategies for Operational Technology environments. Your responsibilities will include designing and running attack experiments, evaluating IT and OT mitigation strategies, assisting in maintaining testbeds, and producing clear documentation of technical findings. This position is ideal for those eager to gain valuable hands-on experience in the cybersecurity field.

Join Rise to see the full answer
What qualifications are needed for the FM Research Cybersecurity Co-op position?

Candidates pursuing a Master's degree in Cybersecurity, Computer Science, Engineering, or a related field are encouraged to apply for the FM Research Cybersecurity Co-op position. Familiarity with industrial control systems (ICS), cyber-attack methodologies, and the MITRE ATT&CK framework is valuable. Strong analytical skills and effective communication capabilities are essential for success in this role.

Join Rise to see the full answer
How does the FM Research Cybersecurity Co-op contribute to cybersecurity initiatives?

The FM Research Cybersecurity Co-op contributes to our cybersecurity initiatives by analyzing threat intelligence, developing mitigation strategies, and running experiments to simulate cyber threats against OT environments. Your research will have a direct impact on enhancing our cybersecurity posture and improving our overall risk management solutions.

Join Rise to see the full answer
What skills will the FM Research Cybersecurity Co-op develop during the internship?

During the FM Research Cybersecurity Co-op, you will enhance various critical skills such as technical documentation writing, problem-solving in cybersecurity contexts, and hands-on experience with ICS and OT technologies. You will also gain valuable insights into using the MITRE ATT&CK framework and expanding your knowledge of penetration testing and network security principles.

Join Rise to see the full answer
Is the FM Research Cybersecurity Co-op position remote or in-office?

The FM Research Cybersecurity Co-op position is an in-office role based in Norwood, MA. As part of our commitment to attracting talent, temporary relocation support is available for selected qualified candidates who need assistance moving to the area.

Join Rise to see the full answer
Common Interview Questions for FM Research Cybersecurity Co-op
What experience do you have with the MITRE ATT&CK framework?

When discussing your experience with the MITRE ATT&CK framework, emphasize your understanding of its application in analyzing adversarial tactics and techniques, especially in relation to industrial control systems. Share any relevant projects or experiences where you utilized this framework to improve cybersecurity outcomes.

Join Rise to see the full answer
How would you approach designing an attack experiment for an Operational Technology environment?

In designing an attack experiment for an OT environment, first, conduct thorough research on potential threats. Identify specific attack vectors that could be simulated and then outline a step-by-step process for the experiment. Be prepared to discuss the objectives and the metrics you would use to evaluate the experiment's success.

Join Rise to see the full answer
Can you explain the importance of testbeds in cybersecurity research?

Testbeds are crucial in cybersecurity research as they provide a safe, isolated environment to conduct experiments without risking actual operational systems. When responding, highlight how you have utilized testbeds to validate mitigation strategies and enhance security measures, ensuring you understand their role in simulating real-world scenarios.

Join Rise to see the full answer
What is your familiarity with penetration testing tools and techniques?

When discussing penetration testing, provide examples of tools you’ve used and the techniques you’ve implemented. Highlight experience that involves ethical hacking principles, emphasizing how you ensure compliance with legal and ethical standards while performing tests.

Join Rise to see the full answer
Describe a situation where you used threat intelligence to prevent a cybersecurity threat.

Share a specific example where you analyzed threat intelligence data to identify vulnerabilities and addressed them proactively. Discuss the measures you took based on this intelligence, focusing on the effectiveness of your actions in mitigating potential threats.

Join Rise to see the full answer
How do you stay updated on emerging cybersecurity threats?

Discuss strategies such as subscribing to industry newsletters, participating in cybersecurity forums, and attending webinars or conferences. Highlight specific resources you use to keep your knowledge current, which showcases your commitment to continuous learning in the cybersecurity space.

Join Rise to see the full answer
What role does documentation play in cybersecurity projects?

Emphasize the importance of documentation in ensuring that findings, methodologies, and strategies are clearly communicated and accessible to team members. Discuss how good documentation supports effective collaboration and knowledge transfer, making it a cornerstone of successful cybersecurity initiatives.

Join Rise to see the full answer
Explain your understanding of industrial control systems and their cybersecurity challenges.

Describe your knowledge of industrial control systems, detailing specific challenges such as their integration with legacy systems and the increasing threat landscape. You may mention how traditional IT security measures often fall short in these environments, emphasizing the need for tailored cybersecurity approaches.

Join Rise to see the full answer
How would you prioritize tasks when working on multiple cybersecurity projects?

Discuss how you would assess the urgency and impact of each task, using project management techniques such as creating timelines, setting milestones, or employing tools to streamline your workflow. Highlight the importance of communication with team members to ensure alignment on priorities.

Join Rise to see the full answer
Can you share an example of troubleshooting a security issue in a previous project?

Provide a specific example demonstrating your troubleshooting skills in identifying and resolving a security issue. Discuss the steps you took to investigate the problem, the tools you utilized, and how you collaborated with others to implement a solution effectively.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 13 days ago
Photo of the Rise User
Sager Electrical Hybrid US, Plymouth County, MA; Massachusetts, Middleborough, MA
Posted 3 days ago

Join Sager Electronics as a Director of IT Operations to lead in optimizing IT infrastructure and managing technology operations in a dynamic environment.

Pharmacy2U Remote No location specified
Posted 9 days ago

As an Infrastructure Architect, you'll play a critical role in enhancing our scalable and secure infrastructure while working in a hybrid model at a leading pharmacy.

Photo of the Rise User
NVIDIA Hybrid US, CA, Santa Clara
Posted 19 hours ago
Customer-Centric
Mission Driven
Inclusive & Diverse
Rise from Within
Diversity of Opinions
Work/Life Harmony
Growth & Learning
Transparent & Candid
Medical Insurance
Paid Time-Off
Maternity Leave
Mental Health Resources
Equity
Child Care stipend
Paternity Leave
WFH Reimbursements
Flex-Friendly
Dental Insurance
Vision Insurance
Life insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
401K Matching
Military leave

Join NVIDIA's Offensive Security team as a Penetration Tester to lead impactful security assessments and drive secure product development.

Photo of the Rise User

Join Visa as an Associate Cybersecurity Engineer and help protect the network while developing innovative AI-driven detection solutions.

Photo of the Rise User
Deputy Remote No location specified
Posted 4 days ago

Become a key player in Deputy's mission to enhance workforce management by joining our team as a Business Systems Engineer.

Photo of the Rise User
Posted 6 days ago

Seeking a skilled Freelance Backup Engineer to deliver tailored backup solutions and ensure data security.

Ginas Tech Jobs Remote 1212 S. Naper Blvd., Boston, MA, United States
Posted 10 days ago

Lead the unified communications strategy at Gina's Tech, overseeing key platforms like Microsoft Teams and Cisco CUCM while managing a talented team.

Photo of the Rise User

Join Highspring as a Senior Epic Analyst where you'll transform healthcare IT services through your expertise in Epic systems.

FM is a leading commercial property insurer of the world's largest businesses, providing more than one-third of FORTUNE 1000-size companies with engineering-based risk management and property insurance solutions. For more than 175 years, clients h...

34 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Internship, on-site
DATE POSTED
April 12, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Columbus just viewed Project Manager at Treering
Photo of the Rise User
Someone from OH, Columbus just viewed Product Manager, Assessment Student Experience at Ellevation
Photo of the Rise User
Someone from OH, Hamilton just viewed Team Member Travel Coordinator at Allegiant
Photo of the Rise User
Someone from OH, Kent just viewed Senior Director, Program at Teaching Lab
Photo of the Rise User
Someone from OH, Toledo just viewed IT Telecom Administrator at Anduril Industries
Photo of the Rise User
Someone from OH, Kent just viewed Director, Strategic Partnerships at Teaching Lab
N
8 people applied to SAP BO Admin at NXTGIG
G
Someone from OH, Cincinnati just viewed Operations Lead - AML Refresh Ops (Global Banking) at GHR
Photo of the Rise User
Someone from OH, Akron just viewed Data Scientist II at Kaiser Permanente
Photo of the Rise User
Someone from OH, Eastlake just viewed Summer Intern at Gooch & Housego
I
Someone from OH, Perrysburg just viewed CNC Manufacturing Technician at Innovance
Photo of the Rise User
82 people applied to Security Analyst Jr at DEUNA
Photo of the Rise User
78 people applied to Cybersecurity Intern at Dewberry
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Lifecycle Marketing Manager at SoFi
Photo of the Rise User
Someone from OH, Cincinnati just viewed Lifecycle Marketing Manager at Caribou
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Marketing Manager at Ocorian
Photo of the Rise User
Someone from OH, Cincinnati just viewed Growth Marketing Manager at Credit Genie
Photo of the Rise User
Someone from OH, Cincinnati just viewed Director of Product Marketing - AAA Campaigns at PrizePicks
Photo of the Rise User
Someone from OH, Cincinnati just viewed Digital Marketing Analyst, Digital Properties at Darden
Photo of the Rise User
19 people applied to IT Support Intern at SoundCloud