{"id":1753,"date":"2023-06-29T06:49:58","date_gmt":"2023-06-29T06:49:58","guid":{"rendered":"https:\/\/k3ylabs.com\/?p=1753"},"modified":"2023-08-29T09:59:04","modified_gmt":"2023-08-29T09:59:04","slug":"network-and-cybersecurity-developer-researcher","status":"publish","type":"post","link":"https:\/\/k3ylabs.com\/el\/career\/network-and-cybersecurity-developer-researcher\/","title":{"rendered":"Network and Cybersecurity Developer\/Researcher"},"content":{"rendered":"<div id=\"pl-1753\"  class=\"panel-layout\" ><div id=\"pg-1753-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1753-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1753-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #ffffff;\"><strong>Location:<\/strong> K3Y, Vas.Olgas 193 &amp; Zacharia Papantoniou 1,<\/span><br \/>\n<span style=\"color: #ffffff;\">546 46 Thessaloniki, Greece<\/span><\/p>\n<p><span style=\"color: #ffffff;\"><strong>Employment<\/strong>: Fix-term, full-time (40 hours)<\/span><\/p>\n<p><span style=\"color: #ffffff;\"><strong>Job Description<\/strong><\/span><br \/>\n<span style=\"color: #ffffff;\">K3Y is looking for a Network and Security Developer\/Researcher who will play a key role in our team with respect to the development of networking and cybersecurity applications in the context of European R&amp;D projects (Horizon 2020 and Horizon Europe projects) and commercial activities.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Basic Qualifications<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">Bachelor's degree in computer science or a related field<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Strong proficiency in Python programming<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Solid understanding of network infrastructure and network hardware<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Good knowledge of TCP\/IP, routing, and switching<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with network traffic analysis tools like Tcpdump, Wireshark and Scapy<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Proficiency in working with penetration testing tools and operating systems like Kali Linux, Scapy, Metasploit, Nmap, OpenVAS, Nessus, etc.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with firewalls and Intrusion Detection and Prevention Systems (IDPS) like Snort, Suricata, Bro, Ossec, etc.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Familiarity with deep packet inspection techniques and network flow analysers such as nDPI, NFStream, etc.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Familiarity with Software Defined Networking (SDN) technologies such as OpenFlow, Ryu, ONOS, OpenDaylight, and Open vSwitch<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Desirable Qualifications<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">MSc or PhD degree in cybersecurity or a relative field<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with Horizon 2020 and Horizon Europe Research and Development (R&amp;D) projects<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with virtualisation, containerisation and orchestration solutions, such as Network Function Virtualisation (NFV), Docker, Docker Compose, and Kubernetes<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with 5G Network Functions (NF), such as AMF, SMF, UPF, etc.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with honeypots<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with threat modelling<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with risk assessment methods<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with DevOps and CI\/CD best practices<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Certifications in network and cybersecurity (e.g., CCNA, CISSP, CEH) are highly desirable<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Excellent written and oral communication skills<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Responsibilities<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">Threat modelling and vulnerability analysis<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development of intrusion detection systems and honeypots<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development of SDN solutions<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development of threat intelligence mechanisms<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development of attack generators and penetration testing tools<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development and analysis of security logs<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development of intrusion detection datasets<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Supporting cybersecurity-related analytics and predictive models<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Editing, authoring and delivery of technical reports and deliverables<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Participation in technical meetings<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Staying up-to-date with the latest network and cybersecurity technologies, tools, and trends<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Benefits<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">Collaborative and innovative work environment with a strong European and international network<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Competitive salary and benefits package based on qualifications and experience<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Flexible working hours<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Opportunities for professional growth and development<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Equal Opportunities<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">K3Y\u00a0 is committed to providing equal employment opportunities and creating an inclusive workplace. We do not discriminate on the basis of race, colour, ancestry, religion, gender, national origin, sexual orientation, age, citizenship, marital status, disability, veteran status, or any other legally protected characteristics.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Preferred Starting Date<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">While there is no fixed application deadline, we are eager to fill this position as soon as possible. Qualified applicants can expect an interview invitation within a few days of submitting their application.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #ffffff;\">Please send your resume at info@k3ylabs.com<\/span><\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Location: K3Y, Vas.Olgas 193 &amp; Zacharia Papantoniou 1, 546 46 Thessaloniki, Greece Employment: Fix-term, full-time (40 hours) Job Description K3Y is looking for a Network and Security Developer\/Researcher who will play a key role in our team with respect to the development of networking and cybersecurity applications in the context of European R&amp;D projects (Horizon&hellip; <a class=\"more-link\" href=\"https:\/\/k3ylabs.com\/el\/career\/network-and-cybersecurity-developer-researcher\/\">\u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf <span class=\"screen-reader-text\">Network and Cybersecurity Developer\/Researcher<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":845,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-1753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network and Cybersecurity Developer\/Researcher - k3y<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/k3ylabs.com\/el\/career\/network-and-cybersecurity-developer-researcher\/\" \/>\n<meta property=\"og:locale\" content=\"el_GR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network and Cybersecurity Developer\/Researcher - k3y\" \/>\n<meta property=\"og:description\" content=\"Location: K3Y, Vas.Olgas 193 &amp; Zacharia Papantoniou 1, 546 46 Thessaloniki, Greece Employment: Fix-term, full-time (40 hours) Job Description K3Y is looking for a Network and Security Developer\/Researcher who will play a key role in our team with respect to the development of networking and cybersecurity applications in the context of European R&amp;D projects (Horizon&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf Network and Cybersecurity Developer\/Researcher\" \/>\n<meta property=\"og:url\" content=\"https:\/\/k3ylabs.com\/el\/career\/network-and-cybersecurity-developer-researcher\/\" \/>\n<meta property=\"og:site_name\" content=\"k3y\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-29T06:49:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-29T09:59:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"795\" \/>\n\t<meta property=\"og:image:height\" content=\"518\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"deasytal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc\" \/>\n\t<meta name=\"twitter:data1\" content=\"deasytal\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 \u03bb\u03b5\u03c0\u03c4\u03ac\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/\"},\"author\":{\"name\":\"deasytal\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/e3d5f6d9755e4eaceec9213e18ca7128\"},\"headline\":\"Network and Cybersecurity Developer\\\/Researcher\",\"datePublished\":\"2023-06-29T06:49:58+00:00\",\"dateModified\":\"2023-08-29T09:59:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/\"},\"wordCount\":474,\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\",\"articleSection\":[\"Career\"],\"inLanguage\":\"el\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/\",\"name\":\"Network and Cybersecurity Developer\\\/Researcher - k3y\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\",\"datePublished\":\"2023-06-29T06:49:58+00:00\",\"dateModified\":\"2023-08-29T09:59:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/e3d5f6d9755e4eaceec9213e18ca7128\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/#breadcrumb\"},\"inLanguage\":\"el\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/#primaryimage\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\",\"contentUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\",\"width\":795,\"height\":518,\"caption\":\"K3Y R&D\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/network-and-cybersecurity-developer-researcher\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/k3ylabs.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network and Cybersecurity Developer\\\/Researcher\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/\",\"name\":\"k3y\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/k3ylabs.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"el\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/e3d5f6d9755e4eaceec9213e18ca7128\",\"name\":\"deasytal\",\"sameAs\":[\"http:\\\/\\\/wp-json\\\/wp\\\/v2\\\/users\\\/me\"],\"url\":\"https:\\\/\\\/k3ylabs.com\\\/el\\\/author\\\/deasytal\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network and Cybersecurity Developer\/Researcher - k3y","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/k3ylabs.com\/el\/career\/network-and-cybersecurity-developer-researcher\/","og_locale":"el_GR","og_type":"article","og_title":"Network and Cybersecurity Developer\/Researcher - k3y","og_description":"Location: K3Y, Vas.Olgas 193 &amp; Zacharia Papantoniou 1, 546 46 Thessaloniki, Greece Employment: Fix-term, full-time (40 hours) Job Description K3Y is looking for a Network and Security Developer\/Researcher who will play a key role in our team with respect to the development of networking and cybersecurity applications in the context of European R&amp;D projects (Horizon&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf Network and Cybersecurity Developer\/Researcher","og_url":"https:\/\/k3ylabs.com\/el\/career\/network-and-cybersecurity-developer-researcher\/","og_site_name":"k3y","article_published_time":"2023-06-29T06:49:58+00:00","article_modified_time":"2023-08-29T09:59:04+00:00","og_image":[{"width":795,"height":518,"url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","type":"image\/png"}],"author":"deasytal","twitter_card":"summary_large_image","twitter_misc":{"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc":"deasytal","\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2":"2 \u03bb\u03b5\u03c0\u03c4\u03ac"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/#article","isPartOf":{"@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/"},"author":{"name":"deasytal","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/e3d5f6d9755e4eaceec9213e18ca7128"},"headline":"Network and Cybersecurity Developer\/Researcher","datePublished":"2023-06-29T06:49:58+00:00","dateModified":"2023-08-29T09:59:04+00:00","mainEntityOfPage":{"@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/"},"wordCount":474,"image":{"@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","articleSection":["Career"],"inLanguage":"el"},{"@type":"WebPage","@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/","url":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/","name":"Network and Cybersecurity Developer\/Researcher - k3y","isPartOf":{"@id":"https:\/\/k3ylabs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/#primaryimage"},"image":{"@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","datePublished":"2023-06-29T06:49:58+00:00","dateModified":"2023-08-29T09:59:04+00:00","author":{"@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/e3d5f6d9755e4eaceec9213e18ca7128"},"breadcrumb":{"@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/#breadcrumb"},"inLanguage":"el","potentialAction":[{"@type":"ReadAction","target":["https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/"]}]},{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/#primaryimage","url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","contentUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","width":795,"height":518,"caption":"K3Y R&D"},{"@type":"BreadcrumbList","@id":"https:\/\/k3ylabs.com\/career\/network-and-cybersecurity-developer-researcher\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/k3ylabs.com\/"},{"@type":"ListItem","position":2,"name":"Network and Cybersecurity Developer\/Researcher"}]},{"@type":"WebSite","@id":"https:\/\/k3ylabs.com\/#website","url":"https:\/\/k3ylabs.com\/","name":"k3y","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/k3ylabs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"el"},{"@type":"Person","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/e3d5f6d9755e4eaceec9213e18ca7128","name":"deasytal","sameAs":["http:\/\/wp-json\/wp\/v2\/users\/me"],"url":"https:\/\/k3ylabs.com\/el\/author\/deasytal\/"}]}},"_links":{"self":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/1753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/comments?post=1753"}],"version-history":[{"count":6,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/1753\/revisions"}],"predecessor-version":[{"id":1995,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/1753\/revisions\/1995"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media\/845"}],"wp:attachment":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media?parent=1753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/categories?post=1753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/tags?post=1753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}