CAREERS

Research Associate


We are seeking talented and enthusiastic individuals to be part of our cybersecurity policy and client management internship program at ZRA. If you are interested in a career that involves shaping cybersecurity policies and managing client relationships, we invite you to explore the internship opportunities listed on our Careers page. Becoming a member of our Cybersecurity Policy and Client Management Talent Community is an excellent way to stay connected and informed about the latest developments in this field at ZRA. You can also submit your resume, and we will reach out to you when a position that aligns with your background and interests in cybersecurity policy and client management becomes available.

Our Guiding Principles

TAKE A LOOK

Our Guiding Principles

TAKE A LOOK

How To Apply

We are looking for talented and enthusiastic individuals with a passion for cybersecurity and strategy to join our team of experts. If any of our positions – Research Associate, Research Assistant, Communications Professional, Corporate Intern – sound like a good fit for you, reach out to us through our website. Use our "Register Your Interest” link and include your contact information and a brief description of what you are looking for in a work environment, as well as your previous work experience. We will contact you when a position matching your background and goals becomes available.

Committed to Understanding Unique Challenges and Providing Tailored Solutions

As a ZRA Research Associate, you will conduct research in your specific area of expertise and apply this by providing strategic guidance to your client. Through comprehensive research and analysis, you will utilize your skills to gain a deeper understanding of your clients’ unique cybersecurity challenges, as well as aligning their goals with the overarching objectives of ZRA. You will apply your variety of research skills and strategies, as well as your knowledge of company best practices, to develop effective risk assessment frameworks, identify vulnerabilities, and craft tailored risk mitigation strategies.