We are seeking a dynamic and technically proficient
Cyber Security Consultant cum Trainer
with proven hands-on experience in ethical hacking, cybersecurity consulting, and technical training. This dual-role position blends
real-world cybersecurity operations
(Vulnerability Assessment & Penetration Testing, SOC analysis, Digital Forensics, etc.) with
mentoring and advanced training responsibilities
for students and professionals in cybersecurity.
The ideal candidate is passionate about securing digital ecosystems, continuously researching emerging threats, and sharing real-world insights through interactive and practical learning sessions.
Vulnerability Assessment and Penetration Testing (VAPT)
across web, mobile, and network infrastructures.
Perform
threat analysis, incident response, and digital forensics
for client engagements.
Support
SOC operations
, monitor alerts, analyze logs, and assist in mitigation of potential threats.
Research and document the latest cybersecurity vulnerabilities, exploits, and defense strategies.
Collaborate with technical teams to enhance
security architecture, hardening, and compliance frameworks
.
Participate in
bug bounty and responsible disclosure programs
to identify and mitigate critical vulnerabilities.
2. Training & Mentoring Responsibilities
Design and deliver
interactive training sessions, workshops, and labs
on cybersecurity topics including Ethical Hacking, Digital Forensics, Threat Intelligence, and Incident Response.
Mentor and guide
students, interns, and professionals
on practical cybersecurity projects and simulations.
Develop and continuously update
training modules, labs, and assessments
aligned with industry standards.
Evaluate participants' performance and provide personalized feedback to enhance learning outcomes.
Lead
Capture-the-Flag (CTF)
events, cybersecurity awareness programs, and technical bootcamps.
Required Skills and Competencies
Strong knowledge of
Networking, Operating Systems (Windows/Linux), and Web Technologies
.
Proficient in
Penetration Testing methodologies
and
OWASP Top 10
exploitation techniques.
Hands-on expertise with tools such as
Burp Suite, Nmap, Metasploit, Nessus, Wireshark, Kali Linux, IDA, and Splunk
.
Excellent communication, presentation, and public speaking skills.
Ability to simplify complex cybersecurity concepts through real-world analogies and live demonstrations.
Strong analytical, documentation, and problem-solving skills.
Passion for
continuous learning, research, and community contribution
.
Preferred Qualifications
Bachelor's degree in
Computer Science / IT / Cyber Security
or related discipline.
Professional certifications such as
CEH, OSCP (Beginner/Intermediate), CompTIA Security+, or similar
.
Prior experience in
cybersecurity consulting, ethical hacking, or as a corporate/university trainer
.
Perks & Benefits
Opportunity to work on
live cybersecurity projects
and interact with corporate clients.
Exposure to
advanced security assessments, research, and training programs
.
Continuous learning support for
industry-recognized certifications
.
Growth path toward
Senior Consultant / Lead Trainer / Cybersecurity Evangelist