<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:-apple-system;
panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">Hello, <o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"> The Department of Management Services offers internships for multiple collegiate programs across several universities here in Florida. Our office within the Division of Information Technology is pursuing the opportunity to integrate an
internship program into our Cyber Security team. <o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">As someone who has worked through the ranks over the years, and even changed career paths, I understand how difficult it is to gain experience in the cyber security sector. I welcome the opportunity to give back and provide our future Cyber
Security professionals opportunity to dive into “real world” cybersecurity events in order to further their knowledge and potential..<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">As we seek to build out internship opportunities within our program, we would like to gauge your University’s interest. Please let me know if you are interested so we can both learn more about how we can best serve such an opportunity.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Please advise as to your level of interest or call if it is more convenient.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Thanks in advance, <o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<div>
<p class="MsoNormal"><b><span style="font-size:13.0pt;color:black">Ryan May </span></b><span style="font-size:13.0pt;color:black">| Information Security Manager, CEH</span><span style="color:black"><o:p></o:p></span></p>
<p class="MsoNormal"><i><span style="color:black">Office of Information Technology</span></i><span style="color:black"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:black">850-274-5733 (Cell)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:black">Florida Department of Management Services <o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="color:black">We Serve Those Who Serve Florida</span></b><span style="color:black"><o:p></o:p></span></p>
<p class="MsoNormal" align="center" style="text-align:center"><span style="font-size:10.5pt;font-family:"-apple-system",serif;color:#262A33"><o:p> </o:p></span></p>
<p class="MsoNormal" align="center" style="text-align:center"><span style="font-size:10.5pt;font-family:"-apple-system",serif;color:red">***Confidential Information Disclosure***<o:p></o:p></span></p>
<p class="MsoNormal" align="center" style="text-align:center"><span style="font-size:10.5pt;font-family:"-apple-system",serif;color:#262A33">All information pertaining to Information Security Resources, vulnerabilities, assessments, plans and actions within
this medium should be considered confidential and protected under the Freedom of Information Act: FOIA 5 U.S.C. § 552(b)(2); The Computer Security Act of 1987, Pub. L. No. 100-235, 101 Stat. 1724 (1988) Section 6, 40 U.S.C. § 759 note (1982 & Supp. V 1987);
and as defined in Florida Statue's 119.011& 282.318 (5).<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>