Are you passionate about backend development and eager to gain hands-on experience in a fast-paced environment? Join our team at Secnic Consultancy Services Private Limited as a Backend Development intern!
Key Responsibilities:
1. Develop and maintain RESTful APIs using Node.js and Express.js
2. Design and implement database solutions using MongoDB and MySQL
3. Write efficient and scalable code in Python, PHP, and Java
4. Collaborate with front-end developers to integrate user-facing elements with server-side logic
5. Debug and troubleshoot issues to ensure optimal performance and functionality
6. Stay up-to-date with industry trends and technologies to enhance our backend systems
7. Assist in testing and deploying applications to production environments
If you are a motivated and tech-savvy individual with a solid understanding of backend technologies, we want to hear from you! Apply now and take the first step towards a rewarding career in backend development with Secnic Consultancy Services Private Limited.
Skill(s) required
DjangoExpress.jsHTMLJavaMongoDBMySQLNode.jsPHPPythonREST API
Secnic Consultancy Services is a globally recognized information security consulting firm that offers IT security products and consulting services. The company has helped numerous clients from various domains worldwide to secure their businesses.
The Secnic service portfolio includes core security audits, such as web application security audits, network security audits, malware analysis, incident response, virtualization, cloud security, corporate security training, compliance security audits, and security gap analysis.
Security audit planning involves preventing physical intrusions, ensuring email security and filtering, creating backups, implementing identity and access management, implementing intrusion prevention, implementing network access controls, prioritizing assets and vulnerabilities, performing due diligence, and predicting the future, including creating a threat list. Defining the scope of the audit involves creating asset lists and a security perimeter.