Cyber Security Consultancy
Main contact

Timeline
-
January 19, 2026Experience start
-
May 2, 2026Experience end
Experience scope
Categories
Security (cybersecurity and IT security) Information technology Software development Machine learning NetworkingSkills
cyber security information technologyIs your organization looking to develop, analyze or test new cybersecurity applications? In this course, students in the New York Institute of Technology cybersecurity program will work with your organization to solve a problem or opportunity of your choosing related to cybersecurity. While cybersecurity projects are preferred, projects from all areas of Information Technology will be considered.
About the Learners:
- Enrolled in New York Tech’s Master of Cybersecurity program. This is a two-year program that prepares learners for highly skilled cybersecurity roles in industry and government
- Have completed at least 18-credits of the 30-credit program covering competencies in Operating System Security, Advanced Network and Internet Security, Cybersecurity Risk Management and Legal Issues, Cryptography, Digital Forensics and, Intrusion Detection and Hacker Exploits
- Hold Bachelor’s degrees in Computer Science and closely related fields. In some cases this includes work experience in varied roles within the information technology sector.
- Will carry out the project as part of their capstone project required for graduation
- Demonstrated strong dedication, professionalism, and readiness to contribute to industry-aligned projects
Students
The final project deliverable will vary depending on the nature of the project and the problem to be solved. Please see project examples below.
Project timeline
-
January 19, 2026Experience start
-
May 2, 2026Experience end
Project examples
In teams of 3-4, the students will solve a problem or opportunity of your choosing related to cybersecurity. During the course of the project each student is expected to work for no more than 150 hours. At the end of the project the students will submit all their key findings or applications developed to your organization.
Project examples include:
- Develop new cybersecurity applications or improve existing applications
- Analyze data from cybersecurity incidents
- Implement/Deploy new cybersecurity applications
- Penetration testing of new applications
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
-
Q1 - Checkbox
-
Q2 - Text short
-
Q3 - Text short
-
Q4 - Text short
-
Q5 - Text short
-
Q6 - Text short
-
Q7 - Checkbox
Main contact

Timeline
-
January 19, 2026Experience start
-
May 2, 2026Experience end