Best Talent Reach (BTR) 2 Jobs Found for "network security"

Hiring? Post Your Job Here Join Our WhatsApp Channel

Top 10 Earners by Sharing Jobs To Other Platforms
Sort by:

CYBERSECURITY AND INFORMATION SECURITY INTERN @ INFOSEC NETWORKS

0 Negotiable or Not Mentioned Remote 26 days ago infosecnetworks.com 1675 Views

Infosec Networks is offering a Cybersecurity and Information Security Intern position, which features a structured 6-month program consisting of a 3-month paid training period followed by a 3-month professional internship. This opportunity is designed for students and fresh graduates who are eager to build a career in the cybersecurity industry. The program provides a rare blend of theoretical knowledge and hands-on application, ensuring that participants are well-prepared for the challenges of modern information security. During this period, candidates will have the chance to work on real-world projects and develop practical skills that are highly valued in the tech market. Throughout the internship, successful candidates will engage in critical security activities such as Vulnerability Assessment and Penetration Testing (VAPT), network security monitoring, and incident response. Interns will utilize industry-leading tools like Wireshark, Nmap, and Metasploit to conduct security research and produce professional-grade reports. Participants will benefit from direct mentorship from industry experts and receive an internship certificate upon completion. Furthermore, there is a strong potential for full-time employment opportunities with the company's client base for top-performing individuals. Work locations include remote options open to all, as well as on-site positions in Kollam, India. This role is offered with paid training.

Key Requirements

Vulnerability Assessment and Penetration Testing (VAPT) expertise. Proficiency in network security monitoring and analysis. Ability to perform incident response and threat analysis. Hands-on experience with security tools like Wireshark, Nmap, and Metasploit. Competency in security research and professional reporting. Foundational knowledge of networking protocols including TCP/IP, DNS, and HTTP. Familiarity with Linux environments, specifically Kali Linux. Demonstrated strong interest in ethical hacking and cybersecurity. Candidates must be current students or fresh graduates in a related field. Strong analytical thinking and problem-solving capabilities. Excellent written and verbal communication skills for technical reporting.
Similar Jobs

MOBILE DEVICE VULNERABILITY & CONFIGURATION COMPLIANCE ENGINEER @ MIC TALENT SOLUTIONS

0 Negotiable or Not Mentioned Remote 28 days ago mictalent.solutions 1363 Views

We are seeking a dedicated Mobile Device Vulnerability & Configuration Compliance Engineer to join our team on a contract basis. The primary focus of this role is to manage and secure mobile device environments by identifying vulnerabilities and ensuring all devices meet established configuration compliance standards. You will be responsible for conducting thorough assessments of mobile hardware and software, implementing security patches, and maintaining the integrity of the mobile fleet across the organization. This role involves working with cross-functional teams to integrate security best practices into the mobile lifecycle.

The successful candidate will leverage their expertise in mobile device management (MDM) systems and security protocols to proactively defend against potential threats. You will be expected to monitor industry trends, evaluate new security tools, and provide detailed reporting on compliance status to stakeholders. As a contract professional, you should possess a high degree of technical proficiency and the ability to work independently in a fast-paced environment. This is an excellent opportunity to contribute to a specialized security field and enhance the overall security posture of our mobile operations.

Key Requirements

In-depth knowledge of mobile device management (MDM) platforms. Proven experience in identifying and remediating mobile device vulnerabilities. Familiarity with configuration compliance standards such as CIS and NIST. Experience with iOS and Android operating system security architectures. Ability to perform automated and manual security configuration audits. Proficiency in using vulnerability scanning and assessment tools. Strong understanding of mobile application security and threat modeling. Excellent technical documentation and reporting skills. Solid grasp of network security protocols and encryption standards. Relevant professional certifications such as CISSP, CEH, or CompTIA Mobility+.
Similar Jobs