Cyber security Openings

Great companies are built by great teams. When we discover the higher purpose of our work, we derive greater meaning from our jobs. In fact, work becomes a joy and each of us is then able to expand our capabilities and maximize our potential. At Network Intelligence, we strive to create such an atmosphere. With a tremendous focus on continuous learning, investments in training programs, freedom to switch teams, and strong encouragement for new ideas, we believe we are a great place to work for.

Join us on our mission to make the world a more secure place to live, transact and play. Send your resume to [email protected]

Red Team Assessment - Assessment
Designation: Red Team Assessment - Assessment
Job Code: HR1149
Location: Noida
Experience: 3+ years
Job Description:
  • Perform red team assessments, social engineering assessments and other offensive engagements.
  • Perform security assessments of technology systems, application architecture, design from security standpoint.
  • Assess processes which will allow to identify business risks and recommend remedial action based on established security standards or industry-specific best practices.
  • Perform security review of application architecture, digital security methodologies and deployments and threat modeling.
  • Perform analysis of applications based on standard practices and secure development lifecycle.
  • Perform various types of tasks such as infrastructure VAPT, WIFI Pen testing, configuration reviews.
  • Use of static code analysis tools such as Fortify, AppScan, Checkmarx, etc and Interactive Scanning tools like Contrast Security etc.
  • Demonstrate team-oriented interpersonal skills, positive impactful communications, business partnership, and project management skills.
  • Work in collaborative environment to build stronger security posture of applications and infrastructure.
  • Agile thinking and analysis that leads to win-win and innovative solutions for the firm.
Analyst/ Sr. Cybersecurity Analyst - Assessment
Designation: Analyst/ Sr. Cybersecurity Analyst - Assessment
Job Code: HR1005
Location: Mumbai/Pune/Noida
Experience: 2+ years
Job Description:
  • Conduct vulnerability assessment and penetration testing for network, web applications, mobile applications, and thick client applications.
  • Conduct configuration reviews for OS, DB, Firewall, Routers, Switches, and other infrastructure components.
  • Conduct red-team assessments using social engineering, physical security compromise and other techniques.
  • Be well-versed with internal privilege escalation techniques.
  • Conduct source-code review using automated and manual approaches.
  • Prepare detailed reports as per NII format.
  • Ensure timely delivery of status updates and final reports to clients.
  • Handle client queries
  • Keep oneself updated on the latest IT Security news, exploits, hacks.
  • Contribute technical content – chapter meetings, blogposts.
  • Conduct internal and external trainings on various topics related to security assessment.
Cybersecurity Specialist/ Consultant - Assessment
Designation: Cybersecurity Specialist/ Consultant - Assessment
Job Code: HR1007
Location: Mumbai/Pune/Noida
Experience: 3.5+ years
Job Description:
  • Leading the team
      You will be expected to coach and mentor junior staff (team of 8-10 professionals) on functional expertise, support fast-paced delivery in challenging environments, function independently to support leaders.
  • Bring new ideas and automation
      You will be expected to solve problems by bringing in automation and new initiatives
  • Customer relationship management and project management
      You will be expected to maintain and manage customer relationships to solve problems faced by clients. Also, end-to-end manage projects which are assigned to you as a leader.
  • Threat Modeling and Application Security Risk Reviews
      You will be expected to conduct threat modeling exercises for the applications designed by the various teams of our clients and work within the requirements of the project to deliver exceptional value at your work.
  • Penetration Testing and Vulnerability Assessments
      You will be working on VAPT (Vulnerability Assessment and Penetration Testing) projects and will be required not just to adopt the given methodologies, but continuously enhance them and develop new tools and techniques for conducting VAPTs. You will also be engaged in security research to discover new vulnerabilities and write articles on information security, as well as maintain our honeypot and write on our blog - Checkmate.
  • Source Code analysis
      You will have to work on certain source code analysis projects or provide guidance to team members to conduct such activities.
  • Security Auditing
      You will also be involved in all other projects undertaken by the Security Assessment team, such as network architecture reviews, security audits, code reviews, application security design reviews, etc.
  • Training for Ethical Hacking and Security Auditing courses
      NII conducts several hacking and security courses, and you would be also pitching in with specific modules or the entire training course.
Cybersecurity Analyst- MDR
Designation: Cybersecurity Analyst- MDR
Job Code: HR1007
Location: Mumbai/ Remote
Experience: 1+ years
Job Description:
  • Monitor network traffic and security alerts for potential events/incidents.
  • Conduct initial triage, declare events/incidents, create incident cases, gather evidence, track and update incident status, and identify additional action items. Handle P1 and P2 incidents under the direction of leads and specialists. Follow through to closure P3 and P4 incidents.
  • Detect, document, respond to and escalate events and incidents in accordance with MSS Incident Handling policies and procedures.
  • Demonstrate capabilities and techniques that can be used to mitigate Cyber-attacks and threats.
  • Demonstrate the capability to utilize the Security Tools to investigate and correlate events.
  • Develop reports and/or briefings for events/incidents. Conduct research on emerging security threats.
  • Maintain shift logs for all SOC activities conducted during scheduled hours.
  • Monitor, maintain, and respond to group email and distribution lists.
  • Create tickets for necessary tasks that need to be executed by external teams. Ensure tasks are communicated via email to the respectable team(s), as well as documenting and tracking activities within tickets according to ticketing procedures and annotating in shift logs according to shift report procedures. Conduct systems and tools health checks.
  • Recommend updates to the wiki with relevant content as it becomes known. Ensure that the phones are forwarded to the “On-Call” or appropriate individual when the office is unmanned.
  • Maintain shift logs for all relevant SOC activities.
  • Conduct internal and external trainings on various topics related to SOC.
Sr. Cybersecurity Analyst- MDR
Designation: Sr. Cybersecurity Analyst- MDR
Job Code: HR1136
Location: Mumbai/ Kolkata
Experience: 2+ years
Job Description:
  • Monitor network traffic and security alerts for potential events/incidents.
  • Conduct initial triage, declare events/incidents, create incident cases, gather evidence, track and update incident status, and identify additional action items. Handle P1 and P2 incidents under the direction of leads and specialists. Follow through to closure P3 and P4 incidents.
  • Detect, document, respond to and escalate events and incidents in accordance with MSS Incident Handling policies and procedures.
  • Demonstrate capabilities and techniques that can be used to mitigate Cyber-attacks and threats.
  • Demonstrate the capability to utilize the Security Tools to investigate and correlate events.
  • Develop reports and/or briefings for events/incidents. Conduct research on emerging security threats.
  • Maintain shift logs for all SOC activities conducted during scheduled hours.
  • Monitor, maintain, and respond to group email and distribution lists.
  • Create tickets for necessary tasks that need to be executed by external teams. Ensure tasks are communicated via email to the respectable team(s), as well as documenting and tracking activities within tickets according to ticketing procedures and annotating in shift logs according to shift report procedures. Conduct systems and tools health checks.
  • Recommend updates to the wiki with relevant content as it becomes known. Ensure that the phones are forwarded to the “On-Call” or appropriate individual when the office is unmanned.
  • Maintain shift logs for all relevant SOC activities.
  • Conduct internal and external trainings on various topics related to SOC.
Incident Responder- MDR
Designation: Incident Responder- MDR
Job Code: HR1121
Location: Mumbai/ Remote
Experience: 1+ years
Job Description:
  • Manage day to day operation for the team
  • Drive team performance and measure key performance indicators.
  • Handle Incident escalations.
  • Collaborate across boundaries to identify scope of improvement in Incident Response.
  • Ensure incidents are handled with excellence.
  • Oversee and keep an eye on everyday progress on tasks & ensure daily governance
  • Recommend enhancement of the current detection rules.
  • Lead debriefs meetings for incidents.
SIEM Admin – MDR
Designation: SIEM Admin – MDR
Job Code: HR1044
Location: Mumbai
Experience: 2+ years
Job Description:
  • Act as the subject matter expert for the SIEM solution.
  • Maintain SIEM operations and document current environment.
  • Work with external teams to ensure all necessary logging sources are reporting to the SIEM.
  • Creation of technically detailed reports on the status of the SIEM to include metrics on items such as number of loggings sources, log collection rate, and server performance.
  • Assist in troubleshooting and problem solving a wide variety of client issues.
  • Content developer - develop custom parsers, use cases and other relevant content for SIEM
Splunk Admin – MDR
Designation: Splunk Admin – MDR
Job Code: HR1127
Location: Remote
Experience: 3+ years
Job Description:
  • Responsible to deploy, administer and fix Splunk components (ESM, ADP, Investigate and UBA)
  • Responsible for on-boarding of log sources for supported and un-supported devices
  • Responsible for creating flex-development connectors for un-supported devices
  • Design HLD\LLD for customers based on experience, best practices and understanding of customer environment
  • Responsible to work with SIEM – Splunk content engineer to enhance Security Use-cases for SOC Environment
  • Responsible for the completion of Splunk Roadmap along with other team members in the SOC
  • Responsible to work and integrate Automated Incident Smart Response in the SOC
  • Supports definition and implementation of protocols to govern security assessment during on-boarding of new log sources
  • Manage and report on the activities and performance of the regional SOC team
  • Provide input to the SOC policies and procedures and correspondingly evaluate and update regional SOC policies and procedures to ensure SOC personnel follow uniform processes
  • Verify all SIEM components are functioning optimally
  • Provides valuable insight and input to the identification of information security risk within the regional and brand enterprises and recommends priorities for risk mitigation
  • Assists with patching recommendations and solution for zero-day threats
  • Coordinates with stakeholders internal and customer
  • Communicates with management on Project progress and activities assigned
  • Responsible to mentor other team members
  • Responsible to conduct KT for client teams and internal SOC teams
  • Develop content, analytics and detection around threat actor’s tactics, techniques & procedures that is deliverable through our daily knowledge base updates
  • Integrate new devices and application with SIEM. Perform due-diligence with Company’s IT\OT\ICS architecture to ensure all business-critical assets are integrated with SIEM
  • Share integration pre-requisites for new assets and coordinate with device owners for integrating with SIEM
  • Troubleshoot and rectify any issue related to SIEM environment and escalate and coordinate with vendor for the support whenever required
  • Co-ordination with internal teams on implementing the necessary configuration on firewalls, web application firewalls, OT sensors, ICS systems etc., as required for enhancing the security
  • Participate in evaluating, recommending, implementing, and troubleshooting security solutions and evaluating IT security of the new IT Infrastructure systems
SOC Manager – MDR
Designation: SOC Manager – MDR
Job Code: HR1131
Location: Remote
Experience: 5+ years
Job Description:
  • Lead and manage Security Operations Center
  • Primarily responsible for security event monitoring, management and response
  • Ensure incident identification, assessment, quantification, reporting, communication, mitigation and monitoring
  • Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives
  • Revise and develop processes to strengthen the current Security Operations Framework, review policies and highlight the challenges in managing SLAs
  • Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Center
  • Management, administration & maintenance of security devices under the purview of ITRC which consists of state-of-the art technologies
  • Perform threat management, threat modeling, identify threat vectors and develop use cases for security monitoring
  • Responsible for integration of standard and non-standard logs in SIEM
  • Creation of reports, dashboards, metrics for SOC operations and presentation to Sr. Mgmt.
  • Co-ordination with stakeholders, build and maintain positive working relationships with them
Cybersecurity Consultant – Payment Security
Designation: Cybersecurity Consultant – Payment Security
Job Code: HR1097
Location: Remote
Experience: 3+ years
Job Description:
  • To deliver PCI DSS, PA DSS consulting services to new and existing clients
  • Performing onsite PCI DSS implementation for various industry verticals
  • Assisting PCI QSAs in PCI DSS validation and deliverable preparation
  • To deliver governance, risk, and compliance consulting services to new and existing clients
  • Team collaboration and where necessary mentoring to other consultants Writing reports to a high standard and provide technical QA for the work of others.