Through the Cybersecurity Talent Initiative, participants will connect with private sector cyber leaders.

At the end of their federal placements, participants from CTI cohorts recruited prior to 2023 (cohorts 1-4) have the opportunity to apply for roles with leading private sector companies affiliated with the program. If hired by a corporate partner, participants will receive substantial student loan assistance. The program’s corporate partners play a critical role in tackling global cybersecurity threats and accepted candidates will gain unparalleled cross-sector experience.

Want to become a sponsor of the Cybersecurity Talent Initiative? Contact Christine Carroll at to learn more.

See the private sector partners from previous CTI cohorts below (affiliations vary by cohort year):


A cybersecurity practice that grows every day. All of our clients worldwide—from governments to companies to nonprofits—rely on technology. They look to us to protect them from hackers who want to steal data or disrupt operations. So, we don’t sit back; we tackle the most critical security challenges head on. We blend offense and defense. And we give our team of people the freedom to rethink the entire security lifecycle to win.

Example Cyber Positions

  • Accenture – Security Analyst
    Ready to out-hack the hackers. You know security is a game of wits and you’re ready to show your smarts even before a threat is flagged. You are the kind of person who takes direction but is also known for thinking on your feet and offering up your own solutions. And because the bad guys are constantly evolving their strategies, you’re prepared to keep on learning new technologies and keep on adapting for yourself.
  • Security Information and Event Management (SIEM) Analyst
    A cybersecurity professional and enthusiast, who is seeking opportunities to evolve his/her craft by understanding latest cyber threats and help clients identify intrusion in their respective environments. In order to effectively do this, you leverage cutting edge Security Information and Event Management (SIEM) data analytics, as well as network/endpoint detection and response technologies for investigating any malicious activity in customer’s on-prem and cloud environments.
  • Information Assurance Engineer
    A risk-savvy and compliance-smart expert in the industry. You stay current with the latest cyber threats and help clients spot them before they happen. You work well across technology teams to implement the latest security frameworks and put security systems and processes in place. And, when it comes to creating IT risk assessments, you tackle the design and launch with ease.
  • Security Tools Engineer
    An innovator and problem-solver. You’re an expert when it comes to protecting on-prem and cloud-based systems. And you can configure and deploy any security tool that comes across your desk. While staying on your toes, you design customized and cutting-edge solutions. You know security solutioning requires knowledge of infrastructure, trusted applications, continuous monitoring, proper implementation of security appliances and virtual machines. You understand who or what is connecting to the network and how to properly implement security frameworks such as Access Control and Zero Trust.
  • Penetration Tester
    A Penetration Tester provides clients with thorough assessments that emulate real world attacks to ensure environments are secure. You go beyond vulnerability identification and provide clients with Security Control feedback and provide recommendations on how to best secure an environment.

Mastercard is the global technology company that designed the world’s fastest payments processing network to better facilitate worldwide commerce and connect more people to financial systems. As an employer, Mastercard works to ensure every employee has the opportunity to grow professionally and contribute to the company’s mission in a meaningful way.

Example Cyber Positions

  • Corporate Security, Monitoring and Response
    Develops, maintains or monitors security policies, standards and best practices, while implementing security monitoring procedures, responses and investigations.
  • Corporate Security, Risk Management
    Monitors system security and compliance and develops, delivers, maintains and monitors IT security policies, standards and best practices, while overseeing compliance and the implementation of disaster recovery procedures.
  • Corporate Security, Vulnerability Management
    Identifies, tests and reports security weaknesses in systems and applications, while overseeing efforts throughout the enterprise to secure vulnerabilities.
  • Corporate Security, Information Security Operations
    Implements risk management procedures, performs security threat assessments, manages user identities and access and oversees compliance of IT security policies, standards and best practices.

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

Example Cyber Positions

  • Security Threat Analyst
    Engages with partners across Microsoft to innovate new approaches for detecting and tracking threats, attacker techniques and their tools and infrastructure while using threat research and data science to hunt for real cyber threats and produce intelligence reports and analysis.
  • Security Service Engineer
    Detects and responds to threats across Microsoft’s internal- and external-facing products to protect customers from attacks while using design, coding and debugging skills to develop and implement security systems that monitor and protect products, solutions and/or cloud services around the globe.
  • Security Product Marketing
    Works with engineering leadership on investment priorities to design and develop guidance on products and services including positioning, messaging, branding and naming of Microsoft security services, solutions and products.
  • Cybersecurity Consultant (Services)
    Develops and provides technical leadership directly to customers who are deploying, maintaining or innovating solutions using the latest technology.

Workday is a leading provider of enterprise cloud applications for finance and human resources. Founded in 2005, Workday delivers financial management, human capital management, planning and analytics applications designed for the world’s largest companies, educational institutions and government agencies. Since day one, the company’s leaders have focused on fostering an employee-first culture where people are valued, heard, inspired and encouraged to bring their best selves to work. As a result, Workday has been recognized globally for its workplace culture, including its ranking as a top employer for several consecutive years on Fortune’s List of 100 Best Companies to Work For.

Example Cyber Positions

  • Security Risk Analyst
    Supports security risk management throughout the organization by working with various departments and stakeholders to assess security risk, align response strategy and communicate the risk assessment to business management.
  • Security Training and Awareness Analyst
    Supports the Workday Information Security Training & Awareness program by working cohesively with all organizations, at all levels, within Workday.
CyberVista (Technical Partner)

CyberVista is a cybersecurity workforce development company. The company mission is to build and strengthen organizations by providing cybersecurity professionals with the knowledge, skills and abilities needed to drive defense. Founded in 2016, CyberVista benefits from the rich 84-year history of Kaplan – one of the world’s premier training providers – as its sister company and ally. In 2018, CyberVista welcomed Transcender into the brand. Transcender brings over 25 years of helping organizations and practitioners build technical job skills across all areas of IT and cybersecurity.