1 / 16

Booz | Allen | Hamilton

Booz | Allen | Hamilton. Research Analyst Summer Internship Lauren Ramgattie. BAH Company Information. American Consulting Firm HQ: Tysons Corner, Fairfax County, Virginia One of the most prestigious in the world Founded in 1914 by Edwin G. Booz

hazina
Download Presentation

Booz | Allen | Hamilton

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Booz | Allen | Hamilton • Research Analyst Summer Internship • Lauren Ramgattie

  2. BAH Company Information • American Consulting Firm • HQ: Tysons Corner, Fairfax County, Virginia • One of the most prestigious in the world • Founded in 1914 by Edwin G. Booz • Management & Technology Consulting for Government and Commercial • Company split in two

  3. BAH Company Information • Technology Consulting Firm • Employees with a wide skill set • Clientele • Civil • Security • Defense • Commercial

  4. Engineering Branches • Analytics • Cloud • Cyber • Energy • Health • Information Technology

  5. Security Clearance Government Agencies

  6. My Internship • 10 Weeks (40 hours/week) • Working with Mobile Security • Team of 8, OS team of 3 • Given a client’s possible issues, create solutions to sell to the client

  7. Mobile Security Stats • Mobile Device Breaches • 51% of organizations have had data loss due to insecure devices • 59% of orgs experienced an increase in malware infection due to insecure mobile devices • 174 million records were stolen in 855 data breaches • Malicious Apps: Hidden Spyware, Malware, Background Processes Stats provided by Veracode http://mashable.com/2012/10/10/mobile-security-infographic/

  8. Product Cycle

  9. Research • When the project gets assigned • What has been accomplished? • What has yet to be implemented? • What may the client want in the future? • Is what the client asked for, the best product?

  10. Design • Verify back and forth with supervisor (client) • Finalize problem or project • Prepare the design • Feasibility

  11. Development • Implementation • Various languages • Stumbling blocks • 5th/6th week update • Finalization

  12. Testing • Error handling • Expected results

  13. Documentation • Skeleton outline during design • Detailed internal documentation • White paper (Consulting overview) • Presentation

  14. Deliverables • iOS Application Analyzer • Decrypted application analyzer – symbol tables, strings, frameworks • iOS Backup Analyzer • Extract contacts, SMS, emails, search history, etc • Jailbroken attacks • Complete control of the phone that is jailbroken through a downloaded file

  15. Internship Accomplishments • Working on a team with other interns • versus past internship experience • Learning new language(s) • Presenting to executives • presentation, public speaking • Delivering a product that will be used by the department

  16. Questions?Contact: lramgattie@gmail.com

More Related