Qureos

FIND_THE_RIGHTJOB.

2025 - 2026 | Fulltime Lab demonstrator - Cybersecurity

JOB_REQUIREMENTS

Hires in

Not specified

Employment Type

Not specified

Company Location

Not specified

Salary

Not specified

The demonstrator will be responsible for providing technical support and assistance in laboratory environments. Your role will involve conducting experiments, tests, and analysis to support research and development, as well as assisting faculty, researchers, and students in various lab activities.

Requirements

Duties and Responsibilities:

  • Set up, organize, and maintain laboratory hardware, software, and cybersecurity tools including subscriptions necessary for lab experiments
  • Ensure accessibility and functionality of needed resources, including relevant software, hardware, and materials
  • Adhere to safety protocols and guidelines, promoting a secure laboratory environment
  • Educate students on safety measures and emergency procedures specific to cybersecurity.
  • Assist students in troubleshooting technical issues related to experiments, including network configuration and security settings
  • Demonstrate the proper usage of cybersecurity tools, equipment, and software relevant to ongoing experiments
  • Evaluate student performance during lab sessions and provide constructive feedback
  • Grade assignments, lab reports, and projects in a timely and fair manner
  • Collaborate with faculty and fellow demonstrators to maintain consistency in lab content and evaluations
  • Perform other related duties as assigned by management

Qualifications & Experience Required:

  • Bachelor's degree in Cybersecurity or related field
  • Professional certification in a related field is desirable
  • Fresh graduates are encouraged to apply.

Skills and Competencies Required:

  • Knowledge of industry best practices and emerging trends in information technology
  • Ability to work independently and responsibly while managing numerous projects simultaneously
  • Familiarity with tools such as Wireshark, Metasploit, Nmap, and intrusion detection systems (IDS)
  • Ability to analyze different types of threats (malware, phishing, etc.)
  • Knowledge of encryption methods, cryptographic algorithms, and their applications in securing data
  • Skills in identifying and assessing vulnerabilities within systems and networks

Similar jobs

No similar jobs found

© 2025 Qureos. All rights reserved.