As a Creative Design intern at Secnic Consultancy Services Private Limited, you will have the opportunity to showcase your skills and creativity in a dynamic and collaborative work environment. You will work closely with our team of experienced designers to create visually stunning graphics and designs for various projects.
Key responsibilities:
1. Utilize Adobe Photoshop, CorelDRAW, Adobe Creative Suite, Adobe Illustrator, Adobe After Effects, Adobe Premiere Pro, and Adobe Indesign to create high-quality designs.
2. Collaborate with team members to develop innovative and engaging UI & UX designs for websites and applications.
3. Assist in the creation of marketing materials, including flyers, brochures, and social media graphics.
4. Contribute to the design and development of corporate branding materials, such as logos and business cards.
5. Stay up-to-date on industry trends and best practices in design to ensure the highest quality of work.
6. Work on multiple projects simultaneously and meet deadlines in a fast-paced environment.
7. Provide creative input and feedback during team meetings and brainstorming sessions to contribute to the overall success of the projects.
If you are a passionate and talented designer looking to gain valuable experience in the field, we encourage you to apply for this exciting opportunity with Secnic Consultancy Services Private Limited.
Secnic Consultancy Services is a globally recognized information security consulting firm that offers IT security products and consulting services. The company has helped numerous clients from various domains worldwide to secure their businesses.
The Secnic service portfolio includes core security audits, such as web application security audits, network security audits, malware analysis, incident response, virtualization, cloud security, corporate security training, compliance security audits, and security gap analysis.
Security audit planning involves preventing physical intrusions, ensuring email security and filtering, creating backups, implementing identity and access management, implementing intrusion prevention, implementing network access controls, prioritizing assets and vulnerabilities, performing due diligence, and predicting the future, including creating a threat list. Defining the scope of the audit involves creating asset lists and a security perimeter.