Apply now
Bakgrundsbild jobb
CGI logo

CGI Part time Stockholm

Careers | CGI.com

Om denna position
Beskrivning av tjänsten:

From Autumn 2025 to spring 2026, we will be offering LIA students positions in the following areas/projects/teams.

We follow most schools’ LIA planning periods.
To be an integer part of the team or as part of a project to develop new functionalities in current systems and tools or if need be, develop a new set of tools.
Most of the work will be Office-based. All students will have at least one buddy or Team leader. In the case of projects, they will be managed by a Project manager and supervised by one of our managers. We also provide technical competence wherever needed.
We value: Competence, Ability to work in teams and your own drive to accomplish the task. As always, it is a combination of working alone to solve your assignment and to work in a team to build a great solution together.
All roles are subject to background checks as our customers demand that.

To apply:

In the application, please add what role/s you are interested in so we can handle all applicants as quickly as possible. You can add several roles of course – in the single application.

Do not forget to personalize your application, add things like hobbies, interests, what you do in your free time, and what motivates and drives you forward in your career.

Good luck with your application!

Dina framtida arbetsuppgifter:

Compliance

In this project we are looking for several positions.
Be a part of our LIA team to build our onprem AI platform.

• Continue with our PolicyPilot initiative to integrate all frameworks: ESMF and external NIS2, SOC2, DORA, ISOxxxx, etc…
o Separate PolicyPilot in an external part and an internal part – where different rules apply.
• Train the AI module to not hallucinate.
• Build a ready product and establish a functional production environment.
• Consulting

Roles:
• AI/ML students
• Datamanager, Dataengineer students
• Devekoper

Knowledge:
• AI/ML
• Linux
• Scripting, python
• Containers/Kubernetes
• Databases

Contracts

In this project we are looking for several positions.
Be a part of our Legal LIA project to digitalize and chunk all our contracts for better usage, automation, billing and understanding the Legal and Financial risk in these documents.

• With PolicyPilot extend to incorporate all our Supplier contracts as well as all Client contracts.
• Use AI / Data to find gaps, look for errors, risks in contracts (fines, SLA), collect valuable data like what services are included in the contract, number of users, servers – and add/compare/update that to CMDB data.

Needs:
• AI/Ml students
• Datamanager, Dataengineer students
• Project Manager student

Knowledge

• AI/ML
• Linux
• Scripting, python
• Containers/Kubernetes
• Databases

Data Management and Reporting

In this project we are looking for several positions.
Be a part of our Operations Support team to develop automated reporting for our management teams, add new features, combine reporting and automation tasks.

• Use data and AI to automate reporting like CaFss to Management power BI reports
• Develop and Incorporate Business Impact Register to Power BI + standard reporting
• Develop and merge Risk register from sharepoint…

Needs:
• Datamanager, Dataengineer students
• AI/ML students

Knowledge
• Linux
• Scripting, python
• Containers/Kubernetes
• Databases

Helix ITSM
In this project we are looking for several positions.
Be a part of our Helix ITSM team. To develop new functionalities using both built-in AI and on-prem AI in AI projects on our ITSM platform. For our upgrade and AIOPS + Helix GPT introduction, data structure, data cleaning etc... And, development of new dashboards using Helix components and data structure.

• AIOPS
• Helix-GTP
• Data cleaning, integrations etc…

Needs:
• AI/Ml students
• Datamanager, Dataengineer students

Knowledge
• Linux
• Scripting, python
• Containers/Kubernetes
• Databases
• Helix ITSM

Datacenter move

In this project we are looking for several positions.

• Datacenter setup and management
• Physical setup of DC network, Infrastructure (Servers, Network, etc…)
• Cloud and Virtualization
• Part of team to design, build new platform and transfer load to the new platform
• Maintain current platform during migration phase

Needs:

• ICT students
• Cloud and Virtualization students with focus on private clouds

Knowledge

• Infrastructure and Datacenter
• Linux
• Scripting
• Containers/Kubernetes
• Databases

Private and Public cloud projects

In this project we are looking for several positions.
Be part of the team to build and develop our Private Cloud (Enterprise Cloud), build and manage automations, develop new features and functions.
Be part of our Public Cloud team and develop and Manage our client estates. Make best use of inhouse / built in features for Managing, Monitoring, Automation, standard reporting, Security.

Needs:

• Cloud and Virtualization students
• DevOps students
• Fullstack developer
• Datamanager, Dataengineer students

Knowledge

• Linux, Windows
• Scripting, python
• Containers/Kubernetes
• Vmware platform, RedHat openshift

Cloud & Virtualization

Onsite Technican
In this position we are looking for several positions.

• Work with Client team onsite for our external clients – with general PC, Print, Server, Application support and Management/Maintenance.

Needs:
• Onsite Technicans students
• Technical Operations Specialist students

Knowledge:
• Windows, Linux
• Service Management Tools and processes (ITIL – pref Incident, Problem, Change)
• M365 knowledge
• Basic Networking

Identity and Access Management (IAM)

Identity First is the core for cyber security and the zero-trust doctrine! If you don’t know who and what the person can access, then there is no security at all. Identity and Access Management (IAM), is one of the key areas when working with cyber security.

Our team is working with the three pillars of IAM:
• IGA – Identity Governance and Administration, to be in control of who can access what, how they got this access, who approved it and being able to prove that you are in control.
• Access Control, authentication, multifactor authentication, federation, level of assurance, in other words, to make sure the person is who he or she claims they are.
• PAM – Privileged Access Management, how to protect administrative or high privileged resources. Often combined with IGA and Access Control with a high level of assurance to raise the security for accessing critical capabilities in the organization.
The IAM area combines business knowledge with technology, and resources with this competence is scarce on the market. In our team you will find experts that happily share their knowledge and experience. If you show your dedication and fit the team, they will gladly be your future colleagues as well.

Needs:
• Cybersecurity students
• Identity and Access Management students

Knowledge
• Cybersecurity
• Databases
• A holistic perspective; business requirements - regulations - safety requirements - quality requirements - technical solution - business benefit

Security

The purpose of this internship is to provide the student with practical experience in the development, operation, and maintenance of log management and malware detection platforms.

The student has a strong personal interest in cybersecurity and IT security, and the internship aims to strengthen both technical and analytical skills through real-world applications.
Under supervision, the student will apply foundational knowledge, gain insight into system design and data flows, and become familiar with the tools, methods, and routines used in professional cybersecurity environments.

Needs:
• Cybersecurity students are the most suitable candidates. They understand IT infrastructure, threats, and security operations, and are motivated to work with malware detection, SIEM, and platform maintenance
• Data engineering students are a strong secondary fit. They bring skills in data pipelines, log processing, and analytics, making them valuable for managing and developing log ingestion and monitoring systems

Knowledge
• Introductory understanding of computer networks, protocols, and basic infrastructure (e.g., TCP/IP, DNS, VPN, firewalls)
• Basic familiarity with operating systems such as Windows and Linux.
• Awareness of cybersecurity fundamentals — common threats, vulnerabilities, and protection methods.
• Initial experience with scripting or command-line environments (PowerShell, Bash, or Python).
• Basic knowledge of log analysis and monitoring concepts (e.g., SIEM, IDS/IPS).
• Understanding of general IT security practices such as access control and patch management.

Together, as owners, let’s turn meaningful insights into action

 Join a company rooted in ownership, teamwork, respect and belonging. Be part of our company of owners, where you’ll benefit from the rewards of our collective success, while working side-by-side with colleagues and clients to solve complex issues. 

Apply now

For this position, the company has chosen to use an external application process. This means that you must apply on their site directly and cannot apply via Uptrail.

Uptrail AB • Korgmakargränd 6, 111 22, Stockholm
© 2014-2025