Summer Intern in Vulnerability Research at Outpost24 Group
371 34 Karlskrona, Blekinge län, Sweden -
Full Time


Start Date

Immediate

Expiry Date

14 Jul, 25

Salary

0.0

Posted On

14 Mar, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Powershell, Hardening, Policy Management, Kubernetes, Openstack, Azure, Regular Expressions, Shell Scripting, Processing, Virtualization, Aws, Containerization, Fundamentals, Test Suites

Industry

Information Technology/IT

Description

OUR VULNERABILITY RESEARCH TEAM IS LOOKING FOR STUDENTS TO WORK WITH US!

This is an opportunity to be part of a dynamic, international team of cybersecurity experts who enjoy having fun at work while developing and researching digital vulnerabilities – both new and old.
At Outpost24, we envision solutions that identify risks that could disrupt our customers’ business before it happens. These solutions are flexible to any process or technology our customers’ businesses use. Our teams build these solutions in our beautiful office in Karlskrona, Sweden where the passion and expertise within IT Security is shown through our everyday work.
If your study area and interests are in Vulnerability Research, Software and Platform Identification, Test Automation in virtual lab environments, or Cloud Infrastructure Security, don’t hesitate to send in your application.

Some of the technologies and tools we use in our field of work, and are looking for proficiency with include:

  • Python scripting for automated vulnerability assessments, integration test suites, and web data scraping and processing
  • regular expressions
  • Linux-based development and production environments
  • shell scripting, both POSIX and PowerShell
  • containerization and virtualization in Kubernetes, OpenStack, Azure, and AWS
  • cloud security policy management and hardening

But most importantly, your willingness and ability to quickly learn new, unexpected technologies as the need arises.

Responsibilities

Please refer the Job description for details

Loading...