Q TECHNOLOGIES is developing high technology products about cyber security and financial industry. Main structure of the company divided into 5 parts:

 

 

  1. Software Development
  2. IT Consultancy
  3. Cyber Security Services
  4. Software Licenses
  5. E-commerce Business

Trainees are expected to work at least 30 hours per week and may have additional game day/event responsibilities (depending on department assignments). Trainees are paid 5000 Denars additionly Daily 150 denars for food . Trainees are benefit-eligible after 30 days (medical, dental, vision). Trainees will have both education and implementation hours. Depending on their performance in the first two months, they will be able to perform half of their working hours remotely.

Q Technologies needs long-time trainee students to be trained in the following specific areas:

NETWEORK ENGINEER

  1. Develop and update training collateral such as scripts and PowerPoint presentations
  2. Process incoming training requests and manage a training calendar
  3. They will attend face-to-face meetings with customers.
  4. Participate in the day-to-day network administration and provisioning activities
  5. Perform network devices installations, data cabling and provide end user connectivity;
  6. Performs implementation of Security Products (Such as ESET Secure Authentication)
  7. Performs implementation of replication tools such as Carbonite (aka DoubleTake)
  8. Perform capacity upgrades and hardware/software upgrades

SYSTEM ENGINEER

  1. Develop and update training collateral such as scripts and PowerPoint presentations
  2. Process incoming training requests and manage a training calendar
  3. Attend face-to-face meetings with customers.
  4. Participate in the day-to-day System administration and provisioning activities
  5. Performs implementation of Security Products to System Environments
  6. Windows 7 and Windows 8 Operating Systems Basics Installation Configuration Operation
  7. Installing And Configuring Windows Server 2012
  8. Windows Server 2008 R2 / 2012 Operating System Network Services Installation, Configuration, and Operation
  9. Vmware Workstation
  10. Active Directory Service Installation Configuration Design and Operation
  11. Administering Windows Server 2012 Introduction Installation, Key Features, Incoming Innovations and Managing
  12. Windows Server 2008 Active Directory and Services, Configuring Data Management
  13. Configuring Advanced Windows Server 2012 Services
  14. Exchange Server 2010
  15. Forefront TMG 2010 Installation Configuration and Management

             CYBER SECURİTY ENGİNEER

• Establishing the security infrastructure of the system infrastructure for the new structures of

the organization.

• Will work directly with management to achieve results.

• Security check of the network infrastructure for the organizations existing environments.

• Periodic control of the premises (Health Check).

• Integration of third-party security software into electronic payment systems [3D Secure,

Easypay]

• If needed , Reconstruction of all system and network infrastructure.

• Writing the organizations security policies.

• Establish and manage emergency processes.

• To analyze and project the requirements of information systems related to financial

processes of institutions.

 

COMMUNİCATİON CHANNEL DETAİLS

00389 070 643 191

0090 532 334 28 56

volkandortkardes@gmail.com

1