fbpx

JOB OPENING

Transfotech Academy is looking for an individual to join our team. Our ideal candidate is self-driven, motivated, and trustworthy.

Transfotech Academy Offers A Variety of Job Roles

If you are passionate about IT and knowledge sharing and if you are looking for a platform to connect with professionals and guiding them, then you are at the right place. Strategism believes in creating a pool of excellent domain experts and world-class trainers. When you train at Strategism, it means you have a larger audience, greater visibility and you will be training professionals worldwide.

Skills You'll Need

Explore common cyber career paths and the training that aligns with each.

Cyber Defense & Blue Team Operations

Is your organization looking for a quick and effective way to onboard new Security Analysts, Engineers, and Architects? Do your Security Operations Center (SOC) managers need additional technical perspectives on how to improve analysis quality, reduce turnover, and run an efficient SOC?

Offensive Operations

Offensive operations are operations conducted to defeat and destroyenemy forces and seize terrain, resources, and population centers. They impose the commander’s will on the enemy. In combat. operations, the offense is the decisive element of the full spectrum.

Digital Forensics and Incident Response

Digital Forensics and Incident Response (DFIR) is a field within cybersecurity that focuses on the identification, investigation, and remediation of cyberattacks.

Cloud Security

Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing.

ICS/SCADA Security

Industrial automation processes use industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems to control industrial processes locally or remotely and to monitor, gather, and process real-time data.  

Cybersecurity Leadership

Cybersecurity leadership and management are two high-level competences required to successfully administer a cybersecurity division that produces the essential level of security, trust and stability (STS) demanded by an organization.

HR Policy Of Transfotech Academy

The HR Policy of Transfotech Academy presents the standard personnel policies and procedures which apply to all employees of the organization. We are committed to developing a corporate culture by maintaining:

Continuously develop the capacity of the various role players to effectively manage employee relations

Cureent Open Position

Check out our newest listings – apply today, we want to hire you!

Graphic Designer

Career Counselor

Instructor

Secure Career

Transfotech Academy offers secure jobs. There are opportunities to develop your skills with our training and team support

Ontime Payment

We are aware of the financial needs of our employees. We always pay salary and wages timely.

Problem Solving Culture

As we have developed a team-supporting environment, employees get support from their seniors and teammates.  

Employees Speak

I have been associated with Transfotech Academy for the last five years, and my experience has been fantastic. The company has given me numerous opportunities to broaden my horizons. Great mentorship and encouragement from the leadership team have been a motivation for my consistent performance.

Terry Erikson

The interesting thing about working with Transfotech Academy for the past 8 years, I would say the nature of the work is the best part. I love, how every day I have a new challenge to conquer. I get real job satisfaction at the end of the day.

Untitled design (31)

Pamela Mitchell

The best thing about working with Transfotech Academy is the clear vision of the company. I am glad that I am part of a great organization and helping to achieve this vision. The interesting thing I see in my work is I am always pushed to do something new. 

Michael Hutson