Kick-start your career: Some of the winners will be offered a 4-6 month intern position in a cyber security role at one of the sponsoring companies.
Format: Single-day event.
1 – Team Play – up to eight teams, with maximum four participants per team, compete in the morning.
2 – Individual Portion – all members from the top three teams move on to interviews with sponsors in the afternoon.
Eligibility: Any undergrad student enrolled full time in one of the regional post-secondary institutions.
Teams: Each school is invited to send at least one team of up to four students per team. Each school will decide on their method of forming teams. If you are interested in competing, and you are a full-time undergrad student, contact your school’s representative immediately.
It will be an all-day event for the top teams. Lunch will be provided!
Phase 1 – Hands-on (3 hours)
– Hands-on simulation of cyber breach, playing the part of the intruder.
– Points for success of intrusion and, in some areas, speed of attack.
– Cyber-Cup presented to winning team!
– Second and third-place teams also acknowledged.
All participants from these top three teams are the Finalists. They move-on to next phase.
Phase 2 – Awards and Lunch (1 hour)
Phase 3 – Interviews (2-3 hours)
– Finalists meet with judges to answer typical interview questions and talk about the event, their qualifications and expectations for the intern position, and beyond.
Informal networking – Judges from each company will be on-site all day for informal discussions and networking. Students are encouraged to ask questions and share ideas.
Winners: Judges will pick top students from Phase 3 to be offered the Intern positions in the sponsoring companies!
These are full-time, paid jobs in professional IT Security departments for 4 to 8 months. The only condition is students may be asked to pass a final interview at the company’s premises shortly after the competition. This will usually be just a formality, meant to ensure a good fit between the candidate and the employer. All the hiring sponsor companies each intend to offer a fully-paid Intern position to one of the students competing in this event.
Check out “Job Descriptions” in the menu above to see actual job descriptions.
Skills Needed: Computer networking, system administration, server and workstation exploits (known OS and application vulnerabilities and common configuration errors), exploit tools used by attackers, defences used against such attacks … and teamwork!
The event day (slides, instructions, discussions with employers) will be held in English. And be sure to bring your resumé that day!
How to prepare: You will be able to compete if you have some knowledge of Linux and have taken an IT Security course on Vulnerability Analysis or Penetration Testing. The more you know in these areas the better!
If you have time, there are many ways to learn. Try some books, blogs, on-line challenges, form a club, start a meet-up, challenge your friends, build a home network and add or import some vulnerabilities. And there are plenty of legal targets online you can download and practice with.
Check out our Resources page for specific ideas in those categories.
Legal Restrictions: You must be eligible to work in Canada. You cannot participate in this event if you don’t qualify to work. You would just be taking the place of some other student who would have been eligible for one of these great jobs!
For some IT security jobs – especially in the government sector – you need to have government security clearance. If you have not been a resident of Canada for at least 5 years (sometimes longer), you will not get this clearance. Please inform the sponsors during the job interviews if this restriction applies to you.