Cyber security Openings
Great companies are built by great teams. When we discover the higher purpose of our work, we derive greater meaning from our jobs. In fact, work becomes a joy and each of us is then able to expand our capabilities and maximize our potential. At Network Intelligence, we strive to create such an atmosphere. With a tremendous focus on continuous learning, investments in training programs, freedom to switch teams, and strong encouragement for new ideas, we believe we are a great place to work for.
Join us on our mission to make the world a more secure place to live, transact and play. Send your resume to [email protected]
Senior Cybersecurity Analyst - Assessment
- Conduct vulnerability assessment and penetration testing for network, web applications, mobile applications and thick-client application
- Conduct configuration reviews for OS, DB, Firewall, Routers, Switches and other infrastructure components
- Conduct red-team assessments using social engineering, physical security compromise and other techniques
- Be well-versed with internal privilege escalation techniques
- Conduct source-code review using automated and manual approaches.
- Prepare detailed reports as per NII format.
- Ensure timely delivery of status updates and final reports to clients.
- Handle client queries
- Keep oneself updated on the latest IT Security news, exploits, hacks.
- Contribute technical content – chapter meetings, blogposts.
- Conduct internal and external trainings on various topics related to security assessment.
To apply, send your resume to [email protected]
Cybersecurity Analyst - Source Code - Assessment
- Perform security assessments of technology systems, application architecture, design from security standpoint
- Assess processes which will allow to identify business risks and recommend remedial action based on established security standards or industry-specific best practices
- Perform various types of tasks such as infrastructure VAPT, WIFI Pentesting, configuration reviews.
- Use of static code analysis tools such as Fortify, AppScan, Checkmarx, etc and Interactive Scanning tools like Contrast Security etc.
To apply, send your resume to [email protected]
Cloud Security Consultant – Assessment
- Encourage ‘Shift Left’ Mindset - Proactively embed security requirements, by influencing implementation of security & privacy patterns from the start of the development cycle
- Implement via Influence - Influence stakeholders such as Product Owners, Solution Architects, Developers, Testers, Engineers & others to include security patterns into features, epics and stories in order to build secure, innovative & superior digital products for customers and employees.
- Assessments – Perform security assessment and perform gap analysis to provide appropriate remediations to the teams for implementing the fixes.
- Key Skills – Application Security, Security Code review, API security, Platform security, IAST, SAST, DAST, Infrastructure security and Cloud Security – MS Azure
- Tools and Technologies – Expertise in Azure Security Center and Azure Policies, Burp Suite, Nessus, Checkmarx, Kubernetes, Docker, Jenkins, GitHub, OpenShift and good knowledge about microservice architecture and pipeline driven security.
To apply, send your resume to [email protected]
Cybersecurity Specialist - GRC
- Lead/Execute ISMS implementation
- Lead/Execute BCMS implementation
- Conduct IT Governance related audits
- Conduct IT infrastructure audits
- Conduct Process audits
- Lead/Execute ITSM implementation
- Conduct PCI DSS gap assessments and coordination for closure of gaps
- Conduct organization-wide Risk assessments – based on ISO 31000, NIST, ISO 27005,etc.
- Conduct application security reviews
- Perform audits based on various regulatory requirements including but not limited to RBI, IRDA, SEBI, NSE/BSE, TRAI, SWIFT.
To apply, send your resume to [email protected]
BCMS - GRC
- Work with all functional business areas to support relevant BC stakeholders in developing and maintaining a corporate wide BCM program that addresses business recovery and emergency response management
- Liaise with BC Coordinators to develop effective working relationships and documented BC plans
- Liaise with key infrastructure teams to drive improvements around identified gaps, set recovery time objectives, and conveyed business needs/expectations
- Assist BC stakeholders with business plans to Enterprise BC goals and working with business leaders on identification of critical functions and their recovery needs
- Assist with actioning designed and outlined BC goals, objectives, and scope for business plans and Crisis Management
- Support and assist in the development of BC planning and goals
- Support the BC stakeholders in aligning all BC planning, initiatives, and goals with Organizational
- goals and Infrastructure capabilities
To apply, send your resume to [email protected]
Incident Responder / Senior Incident Responder - SOC
- Maintain situational awareness of cyber activity by reviewing open source reporting for new vulnerabilities, malware, or other threats that have the potential to impact the organization.
- Perform cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communication networks, and participate in the coordination of resources during incident response efforts.
- Coordinate resources during enterprise incident response efforts, driving incidents to timely and complete resolution.
To apply, send your resume to [email protected]
Cybersecurity Specialist – Solutions
- Installation and implementation of CyberArk Core PAS, AAM and other components.
- Troubleshooting of the issues in CyberArk Core PAS
- Must have good understanding in incident handling process.
- Must have good knowledge on windows, Unix, DB and network.
- Should be able to handle client.
- Team Management
- Should have good communication / writing skill
To apply, send your resume to [email protected]
Inside Sales Executive – Sales and Marketing
- Maintaining long-lasting relationships with existing customers through exceptional after-sales service.
- Actively sourcing new sales opportunities through cold-calling and emailing.
- Developing in-depth knowledge of product features and benefits.
- Utilizing virtual meetings to build relationships with new customers.
- Advising customers on suitable Solutions selection based on their needs and specifications.
- Creating a sales pipeline to accurately reflect the relative placement of sales prospects in the purchasing process.
- Following up on sales inquiries that are made by potential customers through website chats, emails, and inbound calls.
- Setting up face-to-face meetings between potential customers and Outside Sales Representatives.
To apply, send your resume to [email protected]
Business Development - Compliance and Audit
- Identifying prospects and profiling them from domestic market and hunting them on emails, phone calls to fix online/face to face meetings.
- Understanding the pain points of the prospect, consult them on aligning Network Intelligence’s services to their business requirements.
- Draft customized proposals in-line with the requirement of the prospect.
- Constant Follow Ups with prospects.
- Liaise with the Project Management team & Accounts to track the project and get the invoicing done as per the agreed milestones.
- Follow up with the clients for collection of payments.
- Meet the allocated targets on a monthly, quarterly, and yearly basis.
- Taking up initiatives to market Network Intelligence in the region
To apply, send your resume to [email protected]
Employee Success Manager - MDR
- Develop and implement employee engagement and retention strategies.
- Analyze employee feedback and engagement data to identify trends and opportunities for improvement.
- Provide guidance and support to employees on HR-related issues, including performance management, compensation, and benefits.
- Collaborate with cross-functional teams to develop and execute programs and initiatives that support employee well-being and foster a positive workplace culture.
- Work closely with LOB head and team members to improve work relationships, build morale, and increase productivity and retention.
- Provide coaching and guidance to managers on best practices for employee engagement and management.
- Develop and execute interventions to manage attrition and increase retention.
- Counsel employees on career development and growth opportunities.
- Nurture a positive working environment.
- Review and analyze business and people metrics, including data on retention and employee experience, to recommend and bring about systemic improvements.
To apply, send your resume to [email protected]
EDR Lead – SOC
- Design and implement solutions on endpoint detection and response strategies and systems to ensure timely detection, investigation, and response to cyber threats.
- Understand and maintain the requirements on compliance.
- Be an SME for all the endpoint solution security related issues
- Leading and managing a team of security analysts and engineers to ensure that endpoint infrastructure is protected against advanced threats and vulnerabilities.
- Collaborating with cross-functional teams such as network and infrastructure teams to ensure a cohesive approach to endpoint security.
- Keeping up-to-date with the latest security technologies, threat intelligence, and best practices to ensure that the organization's endpoint security is at the forefront of the industry.
- Providing regular reports on endpoint security posture, including metrics on threat detection, investigation, and response times.
- Provides recommendations to leadership on significant threats and vulnerabilities.
- • Keeping up-to-date with the latest security technologies, threat intelligence, and best practices to ensure that the organization's endpoint security is at the forefront of the industry.
- Perform root cause analysis for intrusions on demand basis.
- Responsible for health check and upkeep of the endpoint solutions.
- Should have experience on multiple EDR and EPP solutions.
- Should be capable of working in multi-tenant environment and managing multiple customers at the same time. To apply, send your resume to [email protected]
Sr. Cybersecurity Analyst - SOC
- Daily Incident Review – Reviews all the incidents raised, analyses the False positive alerts and shares input for rule fine tuning wherever required
- Key Incidents of the day – Find the key incidents reported and summarize it to SOC Manager
- Review automated daily security reports of key security controls, identify anomalies and, escalate critical security events to the appropriate stakeholders and follow-up as require
- UAT Use Case Testing – Follow the defined change management process and Work with Innovation team to test all the newly defined use cases.
- Raise the genuine UAT alerts with Incident Handler SPOC along with suggested remediations
- Understand the feedback from IH and Fine tune alerts wherever required
- Use Case fine tuning – Analyze all the configured use cases and provide recommendation for fine tuning the current use cases
- Suggest new use cases for the integrated devices and propose them to Innovation team and SOC Manager
To apply, send your resume to [email protected]
SIEM Administrator (SOAR/Qradar/Splunk) - SOC
- SME for SOAR products such as IBM Resilient/Rapid Insight/Sentinel and SIEM products
- Good knowledge on TIP
- Design HLD\LLD for customers based on experience, best practices and understanding of customer environment
- Experience with SOAR implementation and playbooks configuration
- Installation, implementation, troubleshooting of SOAR & SIEM tools
- Deploying and maintaining SOAR & SIEM systems
- Log Baselining – Document the logging levels and baselines for supported log sources
- Coordinating and conducting security event collection
- Understand logs, log formats and should be able to identify appropriate information for Log parsing and SIEM rule creation
To apply, send your resume to [email protected]
Content Developer- SOC
- Should have experience of developing content on ELK platform.
- Experience on ELK is must
- Should have strong understanding of network protocols.
- Knowledge on Linux systems and commands
- Experience of working on hybrid infra models - cloud and on prem
- Should have good understanding of AWS cloud security products and experience on building cloud specific use cases for SOC
- Responsible for building new Use Cases on various log sources such as but not limited to Cloud/SaaS/Linux/containers
- Propose fine tuning and development of existing Use Cases from time to time
- Support monitoring team in implementing suggested Use Cases
- Develop and maintain security rules, policies, procedures, and playbooks for ELK (SIEM) and SOAR
- Develop, customize, and maintain SIEM dashboards and reports
To apply, send your resume to [email protected]
Incident Responder Manager - SOC
- Maintain situational awareness of cyber activity by reviewing open source reporting for new vulnerabilities, malware, or other threats that have the potential to impact the organization.
- Perform cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communication networks, and participate in the coordination of resources during incident response efforts.
- Coordinate resources during enterprise incident response efforts, driving incidents to timely and complete resolution.
- Be well-versed with the cyber killchain and attacker tools, tactics and procedures.
- Employ advanced forensic tools and techniques for attack reconstruction, including forensic analysis and volatile data collection and analysis.
- Conduct malware analysis providing indicators for enterprise defensive measures.
- Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs).
To apply, send your resume to [email protected]
Sales-Corporate Training
- We are looking for a talented and competitive Sales Representative who cangenerate high quality sales leads for the business in a quick sales cycle environment.
- Source new salesopportunities through inbound lead follow-up and outbound cold calls and emails and Linkedinor previous customer relationships
- Close sales and achieve monthly/quarterly/yearlytarget
- Research accounts, identify key players and generate interestfor upcomingtrainings.
- Sense of ownership and pride in self performance and its impact on company’s success
- Proven track record of achievingthemonthly/quarterly/yearly target.
- Understanding customer needs and requirementsand skill to upsell or cross sell.
To apply, send your resume to [email protected]
Cybersecurity Trainer - CAPL
- Looking for a Cyber Security Trainer with decent Communication Skills and should have a sincere approach towards the assigned tasks.
- Candidate should have expertise in Cybersecurity and GRC.
- Responsible for interacting and mentoring Global candidates.
- Delivering highly interactive lectures offline/online.
- Candidate should be efficient in handling corporate training.
- Develop cutting edge and innovative content for classes to help facilitate delivery of classes in an interesting way.
- Continuously improve the delivery experience to ensure that the experience of students is world class.
- Should be efficient in creating the study material for trainings and should be updated with the latest development in Cybersecurity.
To apply, send your resume to [email protected]
Business Development Manager – Sales and Marketing
- Identifying prospects and profiling them from domestic market and hunting them on emails, phone calls to fix online/face to face meetings.
- Understanding the pain points of the prospect, consult them on aligning Network Intelligence’s services to their business requirements.
- Draft customized proposals in-line with the requirement of the prospect.
- Constant Follow Ups with prospects.
- Liaise with the Project Management team & Accounts to track the project and get the invoicing done as per the agreed milestones.
- Follow up with the clients for collection of payments.
- Taking up initiatives to market Network Intelligence in the region
- Meet the allocated targets on a monthly, quarterly, and yearly basis.
To apply, send your resume to [email protected]
Senior Cybersecurity Analyst
- Act as an L2 resource for managing Firewall (Checkpoint), Checkpoint EDR, Checkpoint IDS/IPS.
- Security Policy configuration, review, analysis and tuning
- Availability and Resource Monitoring
- Hands-on experience on FortiGate Firewall Configuration and also in checkpoint
- Knowledge on reviewing Firewall policy as per standard template define by Management (SOP)
- Configuration of a user access rule (internet or intranet) on a FortiGate firewall using FortiGate Manager and checkpoint.
- Mac address whitelisting on location firewall using FortiGate Manager.
- Indicator of compromise (IoC) Blocking on FortiGate/Checkpoint Firewall.
- Creation VPN Access on FortiGate 100 E and Checkpoint firewall.
- Creating Health reports and Dashboard Reports for Checkpoint & FortiGate Firewall.
- Follow audit procedure for reviewing location firewalls configurations whenever required.
- Creating tickets for issues that are being addressed using the Sapphire ticketing tool.
- Creation of different types of Firewall SOPs whenever required.
- Coordinating with locations users on phone for the issues raised related to internet access.
- Model used are 50 E and 61 F FortiGate firewall.
- Internet Link Monitoring using OP Manager tools whenever required.
- FortiGate Policy synchronizing is done whenever policy status is seen out of sync from FortiGate Manager.
- Raising tickets with OEM and product partner in case of any complex issues and following up till closure
- Documentation of SOP which would be followed by the resource for his activities for standardization.
To apply, send your resume to [email protected]