Skip to content

Power point #19

@komeeleonor

Description

@komeeleonor
  1. Introduction
    Industrial training is a key part of the Bachelor of Engineering program at the University of Buea, College of
    Technology. It serves as a bridge between academic learning and real-world professional practice. While
    university courses provide the theoretical knowledge and technical skills needed in engineering, the workplace
    introduces challenges, responsibilities, and practical skills that cannot be fully taught in a classroom.
    As part of my program requirements, I undertook a two-month internship at Securex Global Services LTD, a
    cybersecurity company specializing in threat intelligence, security consulting, and cyber defense services. I
    was assigned to the Cyber Threat Intelligence (CTI) department, which aligned well with my background in
    software engineering and my growing interest in cybersecurity.
    The internship ran from August 6th to October 6th, 2025. During this period, I worked closely with experienced
    cybersecurity professionals and was exposed to how organizations monitor, analyze, and respond to cyber
    threats. My training was structured to build gradually, starting with foundational concepts of threat intelligence
    and progressing to more advanced tasks such as analyzing threat actors, assessing vulnerabilities, and
    producing intelligence reports.
    This report documents the activities, experiences, challenges, and lessons I gained throughout the internship.
    It highlights not only the work I performed but also the skills I developed, including technical, analytical, and
    professional competencies. The experience gave me practical insight into the cybersecurity profession and
    helped me understand how to apply classroom knowledge to solve real-world problems.
    Through this internship, I learned that effective threat intelligence requires a combination of technical skills,
    analytical thinking, attention to detail, clear communication, and understanding of the business context. The
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    10
    opportunity to work in a professional, high-pressure environment allowed me to grow both academically and
    personally, preparing me for future work in cybersecurity and related fields.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    11
  2. Overview of Securex Global Services LTD
    4.1 Company Background
    Securex Global Services LTD is a Cameroon based cybersecurity and information technology services
    company established to address the growing security challenges faced by organizations in Central Africa. The
    company operates from its offices in Karata Limber and serves clients across various sectors including finance,
    telecommunications, government, and education.
    4.2 Services and Operations
    The company's core services include:
     Cyber Threat Intelligence: Monitoring and analyzing cyber threats relevant to client environments,
    producing actionable intelligence reports, and providing early warning of emerging attack campaigns.
     Security Consulting: Assessing organizational security posture, identifying vulnerabilities, and
    recommending improvements aligned with international standards and best practices.
     Incident Response: Supporting organizations during and after security incidents, conducting
    investigations, and helping restore normal operations.
     Security Awareness Training: Educating employees about cyber risks and safe computing practices,
    which remains one of the most effective defenses against social engineering attacks.
     Risk Assessment and Management: Helping organizations understand their security risks and
    develop appropriate mitigation strategies.
    4.3 Organizational Structure
    The CTI department where I worked is part of the Security Operations division. The team is relatively small
    but highly skilled, with members bringing backgrounds in computer science, information security, and
    intelligence analysis. This compact structure meant I had the opportunity to work closely with senior staff and
    observe decision making processes that might have been invisible in a larger organization.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    12
    4.4 Work Culture
    From my first day, I noticed that Securex maintains a professional yet supportive work environment. The dress
    code is business casual, punctuality is expected, and there's a strong emphasis on clear communication.
    However, the culture also encourages questions and learning. I never felt dismissed when I needed clarification,
    and team members regularly shared knowledge during informal discussions.
    The organization uses a combination of proprietary processes and industry standard frameworks. While I
    cannot disclose specific operational details due to confidentiality agreements, I can say that the company's
    approach to threat intelligence follows recognized methodologies and emphasizes quality over quantity.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    13
  3. Objectives of the Internship
    The internship was designed with both broad and specific objectives:
    5.1 Primary Objectives
     Understanding Cyber Threat Intelligence Fundamentals: Develop a solid grasp of what CTI
    actually is, why it matters, and how it differs from other security functions. This included understanding
    the distinction between data, information, and intelligence.
     Learning the CTI Lifecycle: Gain practical knowledge of how intelligence operations work from
    beginning to end, from identifying intelligence requirements through collection, processing, analysis,
    and dissemination.
     Developing Analytical Skills: Learn to think critically about threat data, identify patterns, assess
    credibility, and draw meaningful conclusions that can inform security decisions.
     Mastering Documentation Standards: Learn to write clear, structured intelligence reports that
    communicate findings effectively to different audiences.
     Professional Development: Develop workplace professionalism, time management, teamwork, and
    communication skills essential for career success
    5.2 Personal Learning Goals
    Beyond the formal objectives, I set personal goals for the internship:
     Understand how cybersecurity professionals think about problems
     Learn what daily work in cybersecurity looks like
     Build professional relationships that could support my career development
     Identify areas where I need additional study or skill development
     Gain confidence in my ability to contribute meaningfully to security operations
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    14
    Looking back, I achieved most of these objectives, though some revealed gaps in my knowledge that I have
    since worked to address.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    15
  4. Scope of Work and Activities
    6.1 Introduction to Cyber Threat Intelligence
    The first week involved intensive learning about what CTI means. I learned that threat intelligence is not simply
    collecting information about attacks. It's about understanding who is conducting attacks, why they're doing it,
    what methods they use, and what that means for specific organizations.
    We discussed the difference between strategic, operational, and tactical intelligence. Strategic intelligence
    helps executives understand long term threats and make policy decisions. Operational intelligence helps
    security teams understand active campaigns and adversary behaviors. Tactical intelligence provides specific
    indicators that technical teams can use for detection and blocking.
    I also learned about the intelligence cycle: planning and direction, collection, processing, analysis,
    dissemination, and feedback. This framework, borrowed from traditional intelligence agencies, provides
    structure to what could otherwise become an overwhelming flow of information.
    6.2 Threat Data Collection
    Much of my early work involved collecting raw information that could be processed into intelligence. This
    primarily meant working with open source intelligence (OSINT), which is publicly available information that,
    when properly analyzed, can reveal significant insights about threats.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    16
    My daily routine included:
     Monitoring Security News Sources: I regularly checked websites like Bleeping Computer, The
    Hacker News, Krebs on Security, and threat intelligence vendor blogs. These sources report on new
    vulnerabilities, active attack campaigns, and security trends.
     Reviewing Vendor Advisories: Companies like Microsoft, Cisco, Adobe, and others publish security
    advisories when they discover vulnerabilities in their products. I learned to read these advisories,
    understand the severity ratings, and assess which ones were most relevant to our typical client
    environments.
     Following Security Researchers: Many cybersecurity researchers share their findings on Twitter
    (now X), personal blogs, and platforms like GitHub. I learned to identify credible researchers and
    follow their work, which often provides early warning of emerging threats.
     Tracking Threat Actor Groups: Various organizations track known threat actor groups and their
    activities. I learned about groups like APT29, FIN7, and others, studying their typical targets, attack
    methods, and indicators of compromise.
     The challenge in this phase was not finding information. The internet is full of security content. Rather,
    it was determining what was relevant, credible, and actionable. I learned to ask questions like: Is this
    source reliable? Is this threat relevant to our clients? Is this information current? Is this actually new or
    just a repackaging of old information?
    6.3 Threat Analysis and Interpretation
    As I became more comfortable with data collection, I was given opportunities to analyze what I was finding.
    This proved more difficult than I expected.
    Analysis involved several steps:
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    17
    a) Verification: First, I had to verify that reported information was accurate. Sometimes early reports of
    attacks or vulnerabilities contain errors or are based on speculation. I learned to look for corroboration from
    multiple sources and to be skeptical of single source reports, especially those that seemed sensational.
    b) Contextualization: Raw information means little without context. If a new ransomware variant is
    discovered, what does that mean? Is it targeting specific industries? Does it use new techniques? How does
    it compare to existing ransomware threats? I learned to place new information into a broader context of
    what we already knew.
    c) Relevance Assessment: Not every threat is relevant to every organization. A vulnerability in industrial
    control systems matters greatly to manufacturing clients but may be irrelevant to financial services firms.
    I learned to think about threats from the perspective of different client types.
    d) Pattern Recognition: Over time, I began recognizing patterns. Certain types of attacks increase at certain
    times of year. Particular threat actors show consistent behaviours. Vulnerability exploitation often follows
    predictable patterns. These patterns help predict future activity and prioritize defences.
    e) One particular assignment involved analysing a series of phishing campaigns targeting African
    organizations. I collected examples of phishing emails, analysed the social engineering techniques used,
    identified the infrastructure hosting malicious content, and documented the entire attack chain. This
    comprehensive analysis helped me understand how threat actors think and operate.
    6.4 Documentation and Intelligence Reporting
    The most important skill I developed was writing clear intelligence reports. In cybersecurity, you can conduct
    brilliant analysis, but if you cannot communicate your findings effectively, the analysis has limited value. I
    learned that good intelligence reports have several characteristics:
    a. Clear Structure: Reports should follow a logical structure that guides the reader through the information.
    We typically used an executive summary for quick understanding, followed by detailed findings, and ending
    with recommendations.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    18
    b. Audience Awareness: Technical staff need different information than executives. Technical reports
    include indicators of compromise, attack techniques, and detection methods. Executive reports focus on
    business impact, risk levels, and recommended actions.
    c. Conciseness: Security professionals are busy. Reports should be as brief as possible while still conveying
    necessary information. I learned to eliminate unnecessary words and focus on essential points.
    d. Accuracy: Intelligence reports inform important decisions. Errors can lead to wasted resources or missed
    threats. I learned to double check facts, cite sources, and clearly distinguish between confirmed information
    and assessment.
    e. Timeliness: Intelligence loses value over time. A report about a vulnerability is most valuable before
    attackers begin exploiting it widely. I learned that a good report delivered quickly is often more valuable than
    a perfect report delivered late.
    b) Threat Intelligence Documents
    During my internship, I prepared different types of cybersecurity documents:
     Daily Threat Summaries: Short reports about important cybersecurity events each day. Reported phishing
    emails targeting banks like Afriland First Bank and Société Générale Cameroon, and new types of
    malwares spreading in local corporate networks.
     Detailed Threat Analysis Reports: In-depth reports about specific attacks or threat actors. Studied a
    phishing campaign aimed at government offices in Yaoundé, such as the Ministry of Finance, explaining
    how it worked and what risks it posed.
     Vulnerability Assessments: Checked newly disclosed security flaws and their risks.
    Assessed general web application vulnerabilities such as injection flaws or authentication weaknesses that
    could affect critical services and described how such issues should be fixed and mitigated within telecom
    or corporate networks.
     Weekly Intelligence Briefings: Summarized trends and patterns observed in cybersecurity threats.
    Identified a rise in ransomware attacks targeting businesses and institutions in Cameroon, highlighting
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    19
    common attack techniques such as phishing emails, malicious links, and unpatched software
    vulnerabilities.
    6.5 Intelligence Dissemination and Stakeholder Communication
    The final stage of the intelligence cycle is dissemination, getting intelligence to the organisations who need
    it, in formats they can use, at the time they need it. I learned that different stakeholders need different types
    of intelligence:
     Executive Leadership: Needs strategic intelligence about emerging threats, industry trends, and risk
    landscape changes. Reports should be concise, business focused, and include clear recommendations.
     Security Operations Teams: Need tactical intelligence including indicators of compromise (IP addresses,
    domains, file hashes), attack techniques, and detection rules they can implement immediately.
     IT Operations: Need information about vulnerabilities affecting their systems, patch requirements, and
    configuration changes to reduce risk.
     Risk Management: Needs intelligence about threat trends, attacker capabilities, and likelihood of different
    attack types to inform risk assessments.
     I also learned about the ethical considerations in intelligence sharing. While collaboration and information
    sharing strengthen collective defense, intelligence organizations must protect client confidentiality, respect
    privacy, and be careful about potentially sensitive information. We discussed scenarios where sharing
    certain intelligence might inadvertently cause harm and how to navigate these situations responsibly.
    6.6 Practical Exercises and Case Studies
    Throughout the internship, I worked on several practical exercises that simulated real intelligence
    requirements:
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    20
     Ransomware Landscape Analysis: I was tasked with researching the current ransomware threat
    landscape, identifying the most active groups, their typical targets and demands, and trends in ransomware
    attacks. This required synthesizing information from dozens of sources into a coherent analysis.
     Vulnerability Impact Assessment: When a critical vulnerability was disclosed in widely used software,
    I assessed which of our clients were likely affected, the severity of the risk, and recommended response
    actions. This exercise taught me to think quickly and prioritize under time pressure.
     Threat Actor Profile: I developed a detailed profile of a specific threat actor group, documenting their
    history, capabilities, targeting patterns, and indicators of compromise. This deep dive exercise helped me
    understand how threat intelligence professionals track adversaries over time.
     Industry Threat Brief: I prepared a brief on cybersecurity threats specifically affecting the financial
    services sector in Africa, which required understanding both cybersecurity and business context.
     These exercises were challenging but extremely valuable. They pushed me to apply what I was learning,
    think critically, and produce work that could actually be used operationally.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    21
  5. Methodology and Approach
    The internship followed a structured approach designed to build knowledge and skills step by step. I progressed
    from foundational learning to guided practice, semi-independent work, and finally integration of all skills
    through larger projects.
    7.1 Learning Framework
    a) Week 1 to 2: Foundation Building
    These weeks focused on building a strong foundation. I read extensively about threat intelligence concepts,
    studied the intelligence cycle, and learned about different types of cyber threats. My supervisor assigned
    readings, and we held daily discussions to clarify key concepts.
    b) Week 3 to 4: Guided Practice
    I began hands-on work under close supervision. I collected threat data and shared my findings with my
    supervisor, who guided me on evaluating sources, assessing relevance, and organizing information. I also
    started writing simple threat summaries, which were reviewed and critiqued.
    c) Week 5 to 6: Semi-Independent Work
    I took on more responsibility and began analyzing threats and preparing reports with less direct supervision.
    My supervisor still reviewed my work but expected me to make independent judgments. I also participated
    more in team discussions and started contributing my own ideas.
    d) Week 7 to 8: Integration and Synthesis
    The final weeks involved applying all the skills I had developed. I worked on larger projects that required
    integrating monitoring, analysis, and reporting. I also assisted in training a new intern who joined in week 7,
    which reinforced my own learning and understanding.
    7.2 Learning Methods
     Hands-On Practice: Most learning came from doing real threat intelligence work under supervision. This
    was far more effective than just reading.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    22
     Mentoring and Feedback: Regular sessions with my supervisor helped me improve, identify mistakes,
    and refine my methods.
     Collaborative Learning: Working alongside experienced professionals allowed me to observe decision-
    making, ask questions, and learn from their expertise.
     Self-Directed Research: I explored topics independently, improving my research skills and curiosity.
     Reflective Practice: At the end of each week, I wrote notes about what I learned, questions I had, and
    areas needing more focus. This helped consolidate my knowledge.
    7.3 Tools and Techniques
    To carry out my tasks, I used a combination of technical tools and structured methods:
     AlienVault USM (SIEM): For centralized logging, correlating security events, and analyzing Open Threat
    Exchange (OTX) pulses.
     Python: I wrote scripts using libraries like Pandas and Regular Expressions to clean and filter firewall log
    exports.
     The Intelligence Cycle: Planning, Collection, Analysis, and Feedback formed a constant loop in all
    intelligence activities.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    23
  6. Weekly Summary of Activities
    a) Weeks 1 to 3: Orientation and Log Fundamentals
    The first three weeks focused on getting settled, learning the basics of threat intelligence, and understanding
    the network architecture. I completed HR onboarding, reviewed company policies, set up my workspace, and
    met my supervisor and team. I learned about the CTI department’s role and discussed internship goals and
    success criteria.
    I began reading resources from NIST and the SANS Institute to understand the difference between threat data,
    threat information, and threat intelligence. I also learned how different audiences influence reporting. CEOs
    focus on strategic risks, while security analysts need technical details.
    Practically, I spent time observing how Firewall logs are generated and stored, learning the anatomy of log
    entries including source and destination IPs, ports, protocols, and action codes. I also started monitoring open-
    source intelligence sources like cybersecurity news sites, vendor blogs, vulnerability databases, threat-sharing
    platforms, and social media accounts of security researchers. Initially, filtering important information was
    challenging, but guidance from my supervisor helped me focus on threats that were active, relevant, and
    credible.
    By the third week, I was preparing daily briefings summarizing the most significant developments, learning to
    balance detail with clarity. I also started studying vulnerabilities, CVE identifiers, CVSS scores, and threat
    actor groups, and I gained an initial understanding of how to assess business impact versus technical severity.
    b) Weeks 4 to 5: SIEM Integration and Python Automation
    Weeks four and five marked the start of more practical work. I was introduced to AlienVault USM, learning
    to search for specific events and correlate them with known malicious IPs. To improve efficiency, I wrote
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    24
    Python scripts that flagged high-risk IP addresses, such as those from suspicious regions or Tor exit nodes,
    reducing manual filtering time by nearly 60 percent.
    I worked on a research project analyzing a ransomware strain. I examined how it operated, who it targeted,
    indicators of compromise, and assessed risks for clients. I also investigated a phishing campaign affecting
    organizations in Africa. By collecting emails, examining headers, links, and attachments, and comparing global
    reports, I determined it was a coordinated Business Email Compromise campaign. I documented findings in
    detailed reports for managers, including guidance on identifying and mitigating risks. During this period, I
    joined my first client call, observing how intelligence is communicated and how client needs influence
    reporting priorities.
    c) Weeks 6 to 7: Threat Hunting and Sector Profiling
    Week six focused on understanding how threat intelligence supports other security functions, including
    incident response, vulnerability management, security operations, and risk management. I observed the
    incident response team using intelligence to answer questions such as what kind of attack is occurring, who
    might be behind it, what could they do next, and which systems are at risk. I also learned about threat modeling
    and its use in identifying realistic organizational risks.
    This week, I worked on a weekly intelligence report summarizing emerging threats and trends. My supervisor
    suggested I improve on linking technical findings to business impact, which highlighted the importance of
    translating technical intelligence into actionable insights for decision-makers.
    In week seven, I helped orient a new intern, which reinforced my own understanding. I also started a major
    project: developing a threat profile for the telecommunications sector. This involved researching sector-
    specific threats, understanding unique vulnerabilities, analyzing recent attacks, studying case studies, and
    consulting colleagues with telecom expertise. I used AlienVault and Python for analysis, including detecting
    coordinated attacks and documenting findings with frameworks like the Cyber Kill Chain.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    25
    The final telecom threat profile identified key threats, explained why they are particularly dangerous for the
    sector, included real-world examples, and recommended mitigation strategies. This project demonstrated that
    effective threat intelligence requires both technical knowledge and an understanding of business operations
    and industry context.
    d) Week 8: Final Reporting and Handover
    The last week focused on consolidating all my work. I completed and presented the telecommunications threat
    profile to the team. Presenting was challenging, but feedback and questions helped me refine my analysis. I
    also created a guide documenting the processes and procedures I had learned, providing a reference for future
    interns.
    My supervisor and I held a final evaluation meeting, discussing areas of growth and further development. The
    feedback was positive and validating after two months of effort. I spent the final days handing over ongoing
    tasks, saying goodbye to colleagues, and reflecting on my internship experience.
    This internship gave me practical exposure to threat intelligence operations, allowed me to apply software
    engineering skills in cybersecurity, and helped me develop both technical and professional competencies. I left
    with a strong appreciation for the team’s expertise and guidance and a clearer sense of my career interest
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    26
  7. Skills and Knowledge Acquired
    The internship developed both technical and professional skills:
    9.1 Technical Skills
    a. Threat Intelligence Fundamentals: I gained solid understanding of CTI concepts, the intelligence
    cycle, types of intelligence, and how intelligence supports security operations.
    b. Analytical Thinking: I learned to analyze threat information critically, assess credibility, identify
    patterns, and draw meaningful conclusions. This analytical approach extends beyond cybersecurity to
    problem solving in general.
    c. Research Skills: The internship developed strong research capabilities: finding information efficiently,
    evaluating sources, synthesizing information from multiple sources, and filling knowledge gaps
    independently.
    d. Technical Writing: My documentation and reporting skills improved dramatically. I learned to write
    clearly, structure information logically, adapt content for different audiences, and eliminate unnecessary
    complexity.
    e. Cybersecurity Knowledge: I deepened my understanding of cyber threats, attack techniques,
    vulnerabilities, and defensive strategies. While I knew cybersecurity theory from coursework, the
    internship provided practical context that made this knowledge more meaningful.
    9.2 Professional Skills
    a. Time Management: Balancing multiple tasks (daily monitoring, ongoing projects, ad hoc assignments)
    required effective time management. I learned to prioritize, work efficiently, and meet deadlines.
    b. Communication: I improved both written and verbal communication skills. Intelligence work demands
    clear communication, and I received regular practice and feedback.
    c. Attention to Detail: Intelligence work requires careful attention to detail. Small errors can lead to
    significant misunderstandings. I became more meticulous in my work.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    27
    d. e. f. Professional Conduct: I learned workplace professionalism: punctuality, appropriate dress, respectful
    communication, confidentiality, and taking initiative.
    Adaptability: The threat landscape changes constantly, and intelligence priorities shift rapidly. I learned
    to adapt to changing requirements and handle ambiguity.
    Collaboration: Working as part of a team taught me about coordination, supporting colleagues, giving
    and receiving feedback, and contributing to collective goals
    9.3 Personal Growth
    Beyond learning technical skills, the internship helped me grow personally. I became more confident in my
    abilities and realized that even as a student, I could make a real contribution to professional work. I also learned
    to ask questions and admit when I did not understand something, which taught me that it is okay not to know
    everything. Being open to learning is important.
    The internship also helped me clarify my career interests. I discovered that cybersecurity fits well with my
    strengths, and I enjoy analytical work more than purely technical tasks.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    28
  8. Professional Conduct and Evaluation
    10.1 Professional Standards
    Throughout the internship, I maintained professional standards that Securex Global Services expects from all
    team members:
    a) Punctuality and Attendance: I arrived on time every day and maintained full attendance throughout the
    eight week period. I understood that reliability is fundamental to professional credibility.
    b) Professional Appearance: I adhered to the company's business casual dress code, recognizing that
    appearance affects how others perceive professionalism and credibility.
    c) Confidentiality: I treated all company and client information as confidential, understanding that trust is
    essential in cybersecurity work. I did not discuss client information outside appropriate contexts and was
    careful about information security.
    d) Initiative: Rather than waiting for tasks to be assigned, I proactively sought opportunities to contribute.
    When I completed assigned work, I asked what else I could help with or pursued independent learning.
    e) Receptivity to Feedback: I welcomed constructive criticism and worked to implement suggestions. I
    recognized that feedback accelerates learning and shows that colleagues care about my development.
    f) Respect and Collaboration: I treated all colleagues with respect, regardless of their position. I contributed
    positively to team dynamics and helped where I could.
    10.2 Performance Evaluation
    According to my field supervisor, Mr. Emmanuel Egbewatt, my performance during the internship was
    evaluated as follows:
     Regularity and Punctuality: Excellent. I attended consistently and arrived on time.
     Professional Appearance and Conduct: Excellent. I maintained proper professional standards
    throughout.
     Task Comprehension and Execution: Excellent. I was able to understand assignments and complete
    them effectively.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    29
     Interpersonal Relationships: Excellent. I built positive relationships with colleagues and contributed
    well to the team.
     Overall Performance Score: 91/100
    The evaluation showed that I am strong at analyzing information, writing clearly, and learning quickly. It also
    pointed out that I could improve my technical skills in some areas and be more confident when speaking with
    clients.This feedback was very encouraging. It confirmed that my hard work during the internship paid off and
    gave me clear ideas on how to keep improving.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    30
    11 Challenges Encountered and Solutions
    During the internship, I faced several challenges that tested my skills and encouraged growth. The main
    challenges and solutions are summarized below:
    Challenge Description Solution
    Data Overload /
    Information
    Overload
    The large volume of logs and threat
    intelligence sources was
    overwhelming. Initially, I struggled
    to identify what was important.
    Developed filtering criteria with guidance from my supervisor.
    Focused on high-impact threats by asking: Which systems are
    affected? Are attacks active? Who is the likely target? Prioritized
    quality over quantity.
    Encrypted Data Some logs contained encrypted
    payloads that could not be directly
    analyzed.
    Focused on traffic analysis using metadata such as packet timing,
    frequency, and size instead of content.
    Technical
    Learning Curve
    AlienVault SIEM is a complex tool,
    and some threats required technical
    knowledge I had not yet acquired.
    Used AlienVault documentation, practiced in a lab environment,
    and conducted self-directed learning. Consulted colleagues when
    needed.
    Analysis
    Paralysis
    It was challenging to know when
    analysis was sufficient.
    Learned to deliver analysis that was “good enough for the decision
    at hand” and document assumptions and confidence levels clearly.
    Writing for
    Different
    Audiences
    Explaining technical threats to non-
    technical stakeholders was difficult.
    Learned to tailor reports to different audiences, presenting risk in
    business terms for managers and detailed technical data for
    analysts.
    Key Takeaways:
     Effective intelligence is about focusing on what matters most, not covering everything.
     Analysts need broad technical awareness, but not deep expertise in every area.
     Timely, actionable analysis is more valuable than perfect analysis delivered too late.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    31
    12 Lessons Learned
    a) Code with Purpose
    During the internship, I learned that scripts in threat intelligence are not just written for functionality, but for
    speed and accuracy. Well-designed scripts help detect and respond to threats quickly, allowing analysts to act
    before potential attacks escalate.
    b) Context is Critical
    Individual log entries are merely isolated data points. It is the patterns and relationships across multiple logs
    that reveal meaningful information, such as targeted attacks, reconnaissance activity, or unusual behavior.
    Understanding context is essential to convert raw data into actionable intelligence.
    c) The Human Element Matters
    While SIEM tools and automation provide valuable assistance, the real intelligence comes from the analyst.
    Recognizing patterns, connecting seemingly unrelated events, and interpreting the significance of alerts
    requires human judgment and expertise.
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    32
    13 Conclusion
    My internship at Securex Global Services LTD was a highly valuable professional experience. I successfully
    combined software engineering techniques with threat intelligence operations.
    Through hands-on work with AlienVault, log analysis, and Python scripting, I developed a specialized skill set
    that is highly relevant to today’s cybersecurity-focused industry. This experience enhanced my technical,
    analytical, and professional skills, preparing me for a career in cybersecurity and IT security management.
    a. Appendix
    Appendix A: Python Script for Automated Log Filtering
    During the internship, I developed a Python script to automatically extract high-risk IP addresses from firewall
    logs. The script identified “frequent offenders” that triggered multiple deny actions within a short period.
    b. Script Overview:
     Libraries: pandas for data manipulation, re for IP pattern matching
     Input: Raw firewall CSV export (Source IP, Destination IP, Port, Action)
     Filtering: Keep rows where Action = ‘Deny’
     Aggregation: Count occurrences of each Source IP
     Output: Export the top suspicious IPs for further investigation in SIEM
    SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net
    33
    c. Sample Python Logic Script:
    import pandas as pd

Load the raw firewall log

data = pd.read_csv('firewall_logs_august.csv')

Filter for denied attempts

denied_traffic = data[data['Action'] == 'Deny']

Count occurrences of each Source IP

threat_counts = denied_traffic['Source_IP'].value_counts()

Identify IPs with more than 100 denied attempts

high_risk_ips = threat_counts[threat_counts > 100]

Export to CSV for SIEM cross-referencing

high_risk_ips.to_csv('suspicious_ips.csv')
Appendix B: Sample Log Analysis Data
The table below shows a simplified view of the firewall logs analysed during Week 6 using AlienVault and
Python scripts:
Date / Time Source IP Destination
Action SIEM Correlation / Threat Level
Port
14/09/2025 10:15 185.156.73.xx 22 (SSH) Deny Brute Force Attempt (High)
14/09/2025 10:16 185.156.73.xx 22 (SSH) Deny Coordinated Botnet
15/09/2025 14:22 45.33.12. xx 443 (HTTPS) Permit Normal Traffic
16/09/2025 09:05 91.241.19. xx 3389 (RDP) Deny Unauthorized Scan (Medium)
SecureX Global Services LTD | Karata, Limbe, P.O. Box 524, Cameroon | Contact: +237 678 34 12 61 | Email: info@securexglobal.net

Create a pier point from this

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions