{"id":719,"date":"2019-05-06T09:48:47","date_gmt":"2019-05-06T09:48:47","guid":{"rendered":"https:\/\/firwl.qantumthemes.xyz\/installer\/?page_id=719"},"modified":"2024-02-01T07:00:16","modified_gmt":"2024-02-01T07:00:16","slug":"working-together","status":"publish","type":"page","link":"https:\/\/pyramidcyber.com\/?page_id=719","title":{"rendered":"Work With Us"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row firwl_container=&#8221;2&#8243; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;940&#8243; css_animation=&#8221;fadeIn&#8221; firwl_negative=&#8221;true&#8221; firwl_glitch=&#8221;true&#8221; css=&#8221;.vc_custom_1706013291912{padding-right: 15px !important;padding-left: 15px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; firwl_section=&#8221;true&#8221;]\t\t<div>\n\t\t\t<h2  class=\"firwl-element-caption firwl-caption  firwl-caption__xxl  \"><i class=\"firwl-decor\"><\/i><span  data-firwl-text=\"NETWORK SECURITY PENETRATION TESTING\" class=\"firwl-glitchtxt\">NETWORK SECURITY PENETRATION TESTING<\/span><\/h2>\t\t<\/div>\n\n\t\n\n\n\t\t[vc_column_text css=&#8221;.vc_custom_1705404766046{margin-top: 0px !important;margin-bottom: 22px !important;padding-top: 0px !important;}&#8221; el_class=&#8221;page-work-opening&#8221;][\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Enquiry About The Service&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; google_fonts=&#8221;font_family:Karla%3Aregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f5-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"5\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F719#wpcf7-f5-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"5\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f5-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<p><label>Your Enquiry<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"msg\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" name=\"msg\"><\/textarea><\/span>\n<\/p>\n<div class=\"firwl-row\">\n\t<div class=\"firwl-col firwl-m6\">\n\t\t<p><label> Your Name (required)<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-nm\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-nm\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"firwl-col firwl-m6\">\n\t\t<p><label> Your Email (required)<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-ml\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-ml\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n<\/div>\n<div class=\"firwl-row\">\n\t<div class=\"firwl-col firwl-m6\">\n\t\t<p><label> Phone Number (required)<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-pn\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-pn\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"firwl-col firwl-m6\">\n\t\t<p><label> Your Company (required)<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"company\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"firwl-col\">\n\t\t<p><label>&nbsp;<\/label><br \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner firwl-btn__full\" type=\"submit\" value=\"Send message\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"_wpcf7_ak_\"><label>&#916;<textarea name=\"_wpcf7_ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"_wpcf7_ak_js\" value=\"204\"\/><script>\ndocument.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );\n<\/script>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t[\/vc_column][\/vc_row][vc_row el_id=&#8221;learnmore-section&#8221; css=&#8221;.vc_custom_1558017050985{padding-right: 15px !important;padding-left: 15px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221; firwl_section=&#8221;true&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; firwl_container=&#8221;true&#8221;][vc_column_inner]\t\t\t<hr class=\"firwl-spacer-xs\">\n\t\t\t\t<div>\n\t\t\t<h3  class=\"firwl-element-caption firwl-caption  firwl-caption__l  \"><span  data-firwl-text=\"What does a network security audit cover?\" class=\"firwl-glitchtxt\">What does a network security audit cover?<\/span><\/h3>\t\t<\/div>\n\n\t\n\n\n\t\t[vc_column_text]Network Security Audit helps in finding out how well a particular part of the system complies to the standards set by the organization. Performing a network security audit is a good way to know where should we focus to ensure security. When and where users log on, access to the database, transfer of files is some of the items that are viewed in the network security audit.[\/vc_column_text]\t\t\t<hr class=\"firwl-spacer-xs\">\n\t\t\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row firwl_container=&#8221;1&#8243; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1558017493441{border-bottom-width: 1px !important;padding-right: 15px !important;padding-left: 15px !important;background-color: #ffffff !important;border-bottom-color: #dddddd !important;border-bottom-style: solid !important;}&#8221;][vc_column firwl_section=&#8221;true&#8221;]\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t[vc_row_inner gap=&#8221;30&#8243; firwl_container=&#8221;true&#8221;][vc_column_inner width=&#8221;1\/2&#8243;]\t\t<div>\n\t\t\t<h3  class=\"firwl-element-caption firwl-caption  firwl-caption__l  \"><span  data-firwl-text=\"What does a network security audit cover?\" class=\"firwl-glitchtxt\">What does a network security audit cover?<\/span><\/h3>\t\t<\/div>\n\n\t\n\n\n\t\t[vc_column_text]Network Security Audit helps in finding out how well a particular part of the system complies to the standards set by the organization. Performing a network security audit is a good way to know where should we focus to ensure security. When and where users log on, access to the database, transfer of files is some of the items that are viewed in the network security audit.[\/vc_column_text]\t\t<div class=\"firwl-herolist \">\n\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> Our audit covers policies such as password requirements, if and how users can use their own devices on the network, privacy rules, and more.<\/p>\n\t\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> Our security audit ensures that users understand best practices for accessing the network, including how to protect themselves from threats.<\/p>\n\t\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> Ensure that the servers are working well, that the operating systems are current and that the physical hardware is in warranty<\/p>\n\t\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> The most important thing is that we ensure that we schedule regular audits and take action if we uncover problems.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;1771&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row firwl_container=&#8221;1&#8243; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1558017501346{border-bottom-width: 1px !important;padding-right: 15px !important;padding-left: 15px !important;background-color: #f7f7f7 !important;border-bottom-color: #dddddd !important;border-bottom-style: solid !important;}&#8221;][vc_column firwl_section=&#8221;true&#8221;]\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t[vc_row_inner gap=&#8221;35&#8243; firwl_container=&#8221;true&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_round_chart style=&#8221;custom&#8221; stroke_width=&#8221;2&#8243; values=&#8221;%5B%7B%22title%22%3A%22Backend%20Development%22%2C%22value%22%3A%2210%22%2C%22color%22%3A%22blue%22%2C%22custom_color%22%3A%22%2328f0ff%22%7D%2C%7B%22title%22%3A%22Frontend%20Development%22%2C%22value%22%3A%2215%22%2C%22color%22%3A%22turquoise%22%2C%22custom_color%22%3A%22%232774f9%22%7D%2C%7B%22title%22%3A%22Stats%20Analyst%22%2C%22value%22%3A%2275%22%2C%22color%22%3A%22sky%22%2C%22custom_color%22%3A%22%237200ff%22%7D%5D&#8221;]\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]\t\t<div>\n\t\t\t<h3  class=\"firwl-element-caption firwl-caption  firwl-caption__l  \"><span  data-firwl-text=\"Why is Network Security Audit necessary?\" class=\"firwl-glitchtxt\">Why is Network Security Audit necessary?<\/span><\/h3>\t\t<\/div>\n\n\t\n\n\n\t\t[vc_column_text]Lorem ipsum <strong>dolor sit amet<\/strong>, consectetur adipiscing elit. Proin porttitor rutrum tellus a vestibulum. Ut orci nisi, blandit pretium sollicitudin eu, feugiat id turpis. In hac habitasse.[\/vc_column_text]\t\t<div class=\"firwl-herolist \">\n\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> To find the flaw in the network<\/p>\n\t\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> To protect the system from threats<\/p>\n\t\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> To save the cost which would be incurred in resolving the system after an attack<\/p>\n\t\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> IT issues management<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row firwl_container=&#8221;1&#8243; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1558017508446{border-bottom-width: 1px !important;padding-right: 15px !important;padding-left: 15px !important;background-color: #ffffff !important;border-bottom-color: #dddddd !important;border-bottom-style: solid !important;}&#8221;][vc_column firwl_section=&#8221;true&#8221;]\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t[vc_row_inner gap=&#8221;35&#8243; firwl_container=&#8221;true&#8221;][vc_column_inner width=&#8221;1\/2&#8243;]\t\t<div>\n\t\t\t<h3  class=\"firwl-element-caption firwl-caption  firwl-caption__l  \"><span  data-firwl-text=\"Data scientist\" class=\"firwl-glitchtxt\">Data scientist<\/span><\/h3>\t\t<\/div>\n\n\t\n\n\n\t\t[vc_column_text]Lorem ipsum <strong>dolor sit amet<\/strong>, consectetur adipiscing elit. Proin porttitor rutrum tellus a vestibulum. Ut orci nisi, blandit pretium sollicitudin eu, feugiat id turpis. In hac habitasse.[\/vc_column_text]\t\t<div class=\"firwl-herolist \">\n\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> Required scientifical degree<\/p>\n\t\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> Good teamwork abilities<\/p>\n\t\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> Good communication skills<\/p>\n\t\t\t\t\t\t\t\t\t<p><span class=\"firwl-btn firwl-btn__r\"><i class=\"material-icons\">check<\/i><\/span> Ping pong lover!<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_round_chart type=&#8221;doughnut&#8221; style=&#8221;custom&#8221; stroke_width=&#8221;2&#8243; values=&#8221;%5B%7B%22title%22%3A%22Backend%20Development%22%2C%22value%22%3A%2210%22%2C%22color%22%3A%22blue%22%2C%22custom_color%22%3A%22%2328f0ff%22%7D%2C%7B%22title%22%3A%22Frontend%20Development%22%2C%22value%22%3A%2215%22%2C%22color%22%3A%22turquoise%22%2C%22custom_color%22%3A%22%232774f9%22%7D%2C%7B%22title%22%3A%22Stats%20Analyst%22%2C%22value%22%3A%2275%22%2C%22color%22%3A%22sky%22%2C%22custom_color%22%3A%22%237200ff%22%7D%5D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_section css=&#8221;.vc_custom_1705649029601{padding-right: 15px !important;padding-left: 15px !important;}&#8221;][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row firwl_container=&#8221;2&#8243; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;940&#8243; css_animation=&#8221;fadeIn&#8221; firwl_negative=&#8221;true&#8221; firwl_glitch=&#8221;true&#8221; css=&#8221;.vc_custom_1706013291912{padding-right: 15px !important;padding-left: 15px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; firwl_section=&#8221;true&#8221;][vc_column_text css=&#8221;.vc_custom_1705404766046{margin-top: 0px !important;margin-bottom: 22px !important;padding-top: 0px !important;}&#8221; el_class=&#8221;page-work-opening&#8221;][\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Enquiry About The Service&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; google_fonts=&#8221;font_family:Karla%3Aregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221;][\/vc_column][\/vc_row][vc_row el_id=&#8221;learnmore-section&#8221; css=&#8221;.vc_custom_1558017050985{padding-right: 15px !important;padding-left: 15px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221; firwl_section=&#8221;true&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; firwl_container=&#8221;true&#8221;][vc_column_inner][vc_column_text]Network Security Audit helps in finding out how ...<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"om_disable_all_campaigns":false,"footnotes":""},"class_list":["post-719","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Work With Us - Pyramid Cyber Security &amp; Forensic<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pyramidcyber.com\/?page_id=719\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Work With Us - Pyramid Cyber Security &amp; Forensic\" \/>\n<meta property=\"og:description\" content=\"[vc_row firwl_container=&#8221;2&#8243; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;940&#8243; css_animation=&#8221;fadeIn&#8221; firwl_negative=&#8221;true&#8221; firwl_glitch=&#8221;true&#8221; css=&#8221;.vc_custom_1706013291912{padding-right: 15px !important;padding-left: 15px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; firwl_section=&#8221;true&#8221;][vc_column_text css=&#8221;.vc_custom_1705404766046{margin-top: 0px !important;margin-bottom: 22px !important;padding-top: 0px !important;}&#8221; el_class=&#8221;page-work-opening&#8221;][\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Enquiry About The Service&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; google_fonts=&#8221;font_family:Karla%3Aregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221;][\/vc_column][\/vc_row][vc_row el_id=&#8221;learnmore-section&#8221; css=&#8221;.vc_custom_1558017050985{padding-right: 15px !important;padding-left: 15px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221; firwl_section=&#8221;true&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; firwl_container=&#8221;true&#8221;][vc_column_inner][vc_column_text]Network Security Audit helps in finding out how [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pyramidcyber.com\/?page_id=719\" \/>\n<meta property=\"og:site_name\" content=\"Pyramid Cyber Security &amp; Forensic\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-01T07:00:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?page_id=719\",\"url\":\"https:\\\/\\\/pyramidcyber.com\\\/?page_id=719\",\"name\":\"Work With Us - Pyramid Cyber Security &amp; Forensic\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/#website\"},\"datePublished\":\"2019-05-06T09:48:47+00:00\",\"dateModified\":\"2024-02-01T07:00:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?page_id=719#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pyramidcyber.com\\\/?page_id=719\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?page_id=719#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pyramidcyber.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Work With Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/#website\",\"url\":\"https:\\\/\\\/pyramidcyber.com\\\/\",\"name\":\"Pyramid Cyber Security &amp; Forensic\",\"description\":\"NextGen Cyber Security &amp; Forensic\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pyramidcyber.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Work With Us - Pyramid Cyber Security &amp; Forensic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pyramidcyber.com\/?page_id=719","og_locale":"en_US","og_type":"article","og_title":"Work With Us - Pyramid Cyber Security &amp; Forensic","og_description":"[vc_row firwl_container=&#8221;2&#8243; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;940&#8243; css_animation=&#8221;fadeIn&#8221; firwl_negative=&#8221;true&#8221; firwl_glitch=&#8221;true&#8221; css=&#8221;.vc_custom_1706013291912{padding-right: 15px !important;padding-left: 15px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; firwl_section=&#8221;true&#8221;][vc_column_text css=&#8221;.vc_custom_1705404766046{margin-top: 0px !important;margin-bottom: 22px !important;padding-top: 0px !important;}&#8221; el_class=&#8221;page-work-opening&#8221;][\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Enquiry About The Service&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; google_fonts=&#8221;font_family:Karla%3Aregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221;][\/vc_column][\/vc_row][vc_row el_id=&#8221;learnmore-section&#8221; css=&#8221;.vc_custom_1558017050985{padding-right: 15px !important;padding-left: 15px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221; firwl_section=&#8221;true&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; firwl_container=&#8221;true&#8221;][vc_column_inner][vc_column_text]Network Security Audit helps in finding out how [...]","og_url":"https:\/\/pyramidcyber.com\/?page_id=719","og_site_name":"Pyramid Cyber Security &amp; Forensic","article_modified_time":"2024-02-01T07:00:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pyramidcyber.com\/?page_id=719","url":"https:\/\/pyramidcyber.com\/?page_id=719","name":"Work With Us - Pyramid Cyber Security &amp; Forensic","isPartOf":{"@id":"https:\/\/pyramidcyber.com\/#website"},"datePublished":"2019-05-06T09:48:47+00:00","dateModified":"2024-02-01T07:00:16+00:00","breadcrumb":{"@id":"https:\/\/pyramidcyber.com\/?page_id=719#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pyramidcyber.com\/?page_id=719"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pyramidcyber.com\/?page_id=719#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pyramidcyber.com\/"},{"@type":"ListItem","position":2,"name":"Work With Us"}]},{"@type":"WebSite","@id":"https:\/\/pyramidcyber.com\/#website","url":"https:\/\/pyramidcyber.com\/","name":"Pyramid Cyber Security &amp; Forensic","description":"NextGen Cyber Security &amp; Forensic","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pyramidcyber.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=719"}],"version-history":[{"count":49,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/719\/revisions"}],"predecessor-version":[{"id":1692,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/719\/revisions\/1692"}],"wp:attachment":[{"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}