Description
Waterfall is seeking an enthusiastic, collaborative and highly motivated QA student.
We are looking for someone who thrives in a fast-paced environment and welcomes new challenges every day.
In this position you will test a security system that includes various Networking Protocols.
Company location is Rosh Haayin.
Responsibilities
- The job entails of the system installation, as well as design, document and conduct the QA test, as part of the QA team.
- Performing manual testing for complex, mission critical security systems
- Working closely with Development team to define areas of testing
- Develop and execute automation scripts
Requirements
- At least 2 more years as a student - Must
- Studies to relevant degree (SW, Electrical Engineering) - Must
- Availability for at least 2 days a week - Must
- Very good English (read, write, speak) - Must
- Technological background – Advantage
- Networking basic knowledge with protocols like TCP/IP, HTTP, etc.– Advantage
- Linux and Windows knowledge – Advantage
Requirements
None
Top Skills
What We Do
Through our software-enabled hardware platforms, we enable secure and reliable operations, protecting against both today’s cybersecurity challenges and those yet to come.
Since 2007, Waterfall Security Solutions has been providing the highest level of protection for critical infrastructure and vital industries. With headquarters in Israel and offices in UAE, Singapore, USA, Europe, and Australia, Waterfall delivers the highest level of OT protection while enabling safe connectivity, visibility, and secure remote access for industrial systems.
Waterfall Security safeguards the most sensitive and critical infrastructures across a wide range of industries including Power, Oil & Gas, Water Utilities, Rail, Manufacturing, Facilities, and Mining & Metals.
As cyberattacks on critical infrastructure are on the rise, software alone is not able to deliver sufficient protections. Waterfall’s unidirectional technology uses an innovative approach, combining unique hardware paired with dedicated software that provides industrial systems with dedicated protection while still allowing remote visibility and remote access.
Attackers are physically restricted with a hardware enforced barrier that that stops OT cyberattacks and shields industrial controls from any outside attempts to plant malicious code or any other harmful activity.