Why complete our Job Simulation

A risk-free way to experience work on the job with us at AIG. Practice your skills with example tasks and build your confidence to ace your applications.

Welcome to AIG’s Shields Up: Cybersecurity Job Simulation!

In this simulation, you will learn skills - both non-technical and technical - that are used in the world of cybersecurity. Specifically, notify internal stakeholders that may be at risk from a ransomware attack and then help recover some hacked files. You will learn how to analyze alerts from the Cybersecurity & Infrastructure Security Agency (CISA), in collaboration with the FBI and the NSA - and then apply the intel to reduce the risk of an attack on AIG.

We hope this program provides a great resource for you to up-skill and strengthen your resume as you explore career options and a potential career in cybersecurity!

Want to learn more about the New York Jobs CEO Council? Click here to explore. 

Are you a student at CUNY? Learn more about the EverUp Micro-Credentials here.

Talent Network Open
Skills you will learn and practice:
Cybersecurity
Vulnerability Triage
Security Advisory
Problem Solving
Research
Communication
Data Analysis
Strategy
Software Development
Python

How it works

Complete tasks guided by pre-recorded videos and example answers from our team at AIG. No live sessions, all self-paced.
Earn a certificate and add it to your resume and LinkedIn as an extra curricular activity.
Stand out in applications. Confidently answer interview questions and explain why you’re a good fit for our team.
Company Logo

Introduction from AIG

Explore Our Job Sims

Tasks in this program

Task One: Responding to a zero-day vulnerability
30-60 mins
Intermediate
CISA has just released an alert on a new zero-day vulnerability for Apache Log4j. Research the vulnerability and publish an advisory to affected teams to alert and prevent exploitation.
What you'll learn
  • How to address a vulnerability that may affect Product Development Staging Environment infrastructure
What you'll do
  • Review some recent publications from the Cybersecurity & Infrastructure Security Agency (CISA)
  • Research the reported vulnerability
  • Draft an email to affected teams to alert them of the vulnerability, and explain how to remediate

Reviews

Over 6450
5 Star Reviews
Not the right career for you?