GoSecure Internship Experience

During my internship at GoSecure, I worked within the Project Management team responsible for onboarding new clients to a range of managed cybersecurity services. This role placed me at the intersection of technical teams, security operations, and client communication, giving me a broad and practical understanding of how modern cybersecurity services are deployed and operated.

Role & Responsibilities

My primary responsibility was to coordinate the onboarding of multiple security services, including SIEM, EDR/MXDR, VMaaS, Dark Web Monitoring (DWM), and Inbox Detection & Response (IDR).

I acted as a bridge between clients and technical teams by:

  • Leading initial client interactions and presenting purchased services
  • Organizing and facilitating onboarding meetings
  • Documenting technical discussions and ensuring accurate knowledge transfer
  • Writing detailed follow-up reports with action items and deployment steps

This role required strong communication skills as well as the ability to understand and translate technical concepts across different stakeholders.

Technical Exposure

Although my position was not purely technical, it provided deep exposure to the architecture and workflows of Security Operations Centers (SOC).

  • Log analysis (Windows Events, WEC, EDR telemetry)
  • Detection and alerting workflows
  • SIEM correlation and event aggregation
  • How different security layers interact (EDR → SIEM → SOAR)

Technologies & Tools

During the internship, I worked with several industry-standard tools, including:

  • FortiSIEM
  • Microsoft Sentinel
  • Microsoft Defender for Endpoint
  • FortiEDR
  • Flare (for dark web intelligence)

I also used collaboration and operational tools such as Zendesk, Microsoft Teams, Planner, Loop, and GoSecure’s internal platform (Titan).

Key Learnings

One of the most valuable aspects of this experience was understanding how cybersecurity services are deployed in real-world environments.

I gained insight into:

  • How logs are collected, centralized, and analyzed using collectors, agents, and Windows Event Collector (WEC).
  • How alerts are generated through correlation across multiple data sources
  • How SOC teams investigate and respond to threats
  • How different security products integrate into a unified defense strategy

I also contributed to internal documentation, process timelines, and technical validation tasks, particularly for Dark Web Monitoring reports, where I verified the relevance and accuracy of exposed data using Flare.

Collaboration & Communication

Collaborated with cross-functional teams including Security Operations (SOC), Cloud Security, Vulnerability Management (VMaaS), Threat Detection & Response (IDR), Service Delivery, and PMO.

If I was not directly working with otheremployees, I had the time to meet them at the office.

This experience helped me develop the ability to navigate technical discussions while maintaining a strong focus on client satisfaction and clear communication.

Personal Takeaways

This internship confirmed my interest in cybersecurity, particularly in environments where technical systems and human collaboration intersect.

I discovered that I enjoy:

  • Working in team-oriented environments
  • Being involved in both technical and organizational aspects
  • Communicating complex ideas clearly
  • Contributing to real-world security operations

Summary

My experience at GoSecure gave me a comprehensive introduction to the lifecycle of managed cybersecurity services—from deployment to ongoing operations.

Even though my role was centered around onboarding coordination, it allowed me to build a strong technical foundation in:

  • SIEM and log analysis
  • Endpoint detection technologies
  • Threat detection workflows
  • SOC operations

This experience strengthened both my technical understanding and my ability to operate in a professional cybersecurity environment.

← Back to Home