CAREERS

Research Assistant


We are seeking talented and enthusiastic individuals to be part of our cybersecurity policy and client management internship program at ZRA. If you are interested in a career that involves shaping cybersecurity policies and managing client relationships, we invite you to explore the internship opportunities listed on our Careers page. Becoming a member of our Cybersecurity Policy and Client Management Talent Community is an excellent way to stay connected and informed about the latest developments in this field at ZRA. You can also submit your resume, and we will reach out to you when a position that aligns with your background and interests in cybersecurity policy and client management becomes available.

Our Guiding Principles

TAKE A LOOK

Our Guiding Principles

TAKE A LOOK

How To Apply

We are looking for talented and enthusiastic individuals with a passion for cybersecurity and strategy to join our team of experts. If any of our positions – Research Associate, Research Assistant, Communications Professional, Corporate Intern – sound like a good fit for you, reach out to us through our website. Use our "Register Your Interest” link and include your contact information and a brief description of what you are looking for in a work environment, as well as your previous work experience. We will contact you when a position matching your background and goals becomes available.

Committed to Understanding Unique Challenges and Providing Tailored Solutions

As a ZRA Research Assistant, you will assist in aligning our clients’ cybersecurity initiatives, as well as their objectives in the federal government sector. By assisting our team of associates, you will utilize your expertise to conduct extensive and specific research, craft insightful literature reviews, analyze cybersecurity trends, and assist in the development of risk assessment methodologies. By providing valuable insights and supporting our team, you will assist clients in gaining a comprehensive understanding of their cybersecurity landscape and identifying vulnerabilities that may impact their strategic objectives.