Cyber security Openings
Great companies are built by great teams. When we discover the higher purpose of our work, we derive greater meaning from our jobs. In fact, work becomes a joy and each of us is then able to expand our capabilities and maximize our potential. At Network Intelligence, we strive to create such an atmosphere. With a tremendous focus on continuous learning, investments in training programs, freedom to switch teams, and strong encouragement for new ideas, we believe we are a great place to work for.
Join us on our mission to make the world a more secure place to live, transact and play. Send your resume to [email protected]
Sr. Cybersecurity Analyst /Analyst- Assessment
- Conduct vulnerability assessment and penetration testing for network, web applications, mobile applications, and thick client applications.
- Conduct configuration reviews for OS, DB, Firewall, Routers, Switches, and other infrastructure components.
- Conduct red-team assessments using social engineering, physical security compromise and other techniques
- Be well-versed with internal privilege escalation techniques.
- Conduct source-code review using automated and manual approaches.
- Prepare detailed reports as per NII format.
- Ensure timely delivery of status updates and final reports to clients.
- Handle client queries
- Keep oneself updated on the latest IT Security news, exploits, hacks.
- Contribute technical content – chapter meetings, blogposts.
- Conduct internal and external trainings on various topics related to security assessment.
To apply, send your resume to [email protected]
Sr. Analyst/Specialist OT/ICS security - Assessment
- Good knowledge of control systems, electricals, PLCs, DCSs
- Direct experience in areas of OT penetration testing, exploitation & vulnerability scanning on SCADA systems & ICS/OT networks
- Hands on with ICS/SCADA Network Architecture review
- Hands on with SCADA/PLC/RTU/FRTU configuration review
- Knowledgeable on industry standards & best practices, especially related to industrial environments in the cybersecurity space i.e., NERC CIP and ISA-62443
- Well versed and hands-on experience in most phases of ICS cyber kill chain
- Experience in network/web/mobile penetration testing
- In depth knowledge of ICS protocols such as MODBUS, Profibus, Profinet, Ethernet-CIP, OPC, DNP, HART, RS-232, RS-485
- Well versed with ICS MITRE framework
- Basic knowledge on active directory exploitation
- Should be able to automate tasks using scripting/programming language (PowerShell, Python, Go, Perl, Ruby, etc.).
- Knowledge on developing or porting exploits/shellcode.
- Expertise in problem solving, conflict resolution, team building, client relationship
- In depth knowledge on OWASP, WASC, NIST, Mobile Security, Source Code analysis, Cloud security
- Expertise in penetration testing scanners, exploitation tools, technologies, scripting languages
- Documentation skills, reporting and dashboard creations
To apply, send your resume to [email protected]
Cybersecurity Analyst- MDR
- Monitor network traffic and security alerts for potential events/incidents.
- Conduct initial triage, declare events/incidents, create incident cases, gather evidence, track and update incident status, and identify additional action items. Handle P1 and P2 incidents under the direction of leads and specialists. Follow through to closure P3 and P4 incidents.
- Detect, document, respond to and escalate events and incidents in accordance with MSS Incident Handling policies and procedures.
- Demonstrate capabilities and techniques that can be used to mitigate Cyber-attacks and threats
- Demonstrate the capability to utilize the Security Tools to investigate and correlate events
- Develop reports and/or briefings for events/incidents. Conduct research on emerging security threats.
- Maintain shift logs for all SOC activities conducted during scheduled hours.
- Monitor, maintain, and respond to group email and distribution lists.
- Create tickets for necessary tasks that need to be executed by external teams. Ensure tasks are communicated via email to the respectable team(s), as well as documenting and tracking activities within tickets according to ticketing procedures and annotating in shift logs according to shift report procedures. Conduct systems and tools health checks.
- Recommend updates to the wiki with relevant content as it becomes known. Ensure that the phones are forwarded to the “On-Call” or appropriate individual when the office is unmanned.
- Maintain shift logs for all relevant SOC activities.
- Conduct internal and external trainings on various topics related to SOC.
To apply, send your resume to [email protected]
Sr. Cybersecurity Analyst- MDR
- Monitor network traffic and security alerts for potential events/incidents.
- Conduct initial triage, declare events/incidents, create incident cases, gather evidence, track and update incident status, and identify additional action items. Handle P1 and P2 incidents under the direction of leads and specialists. Follow through to closure P3 and P4 incidents.
- Detect, document, respond to and escalate events and incidents in accordance with MSS Incident Handling policies and procedures.
- Demonstrate capabilities and techniques that can be used to mitigate Cyber-attacks and threats.
- Demonstrate the capability to utilize the Security Tools to investigate and correlate events.
- Develop reports and/or briefings for events/incidents. Conduct research on emerging security threats.
- Maintain shift logs for all SOC activities conducted during scheduled hours.
- Monitor, maintain, and respond to group email and distribution lists.
- Create tickets for necessary tasks that need to be executed by external teams. Ensure tasks are communicated via email to the respectable team(s), as well as documenting and tracking activities within tickets according to ticketing procedures and annotating in shift logs according to shift report procedures. Conduct systems and tools health checks.
- Recommend updates to the wiki with relevant content as it becomes known. Ensure that the phones are forwarded to the “On-Call” or appropriate individual when the office is unmanned.
- Maintain shift logs for all relevant SOC activities.
- Conduct internal and external trainings on various topics related to SOC.
To apply, send your resume to [email protected]
Threat Hunter
- Perform Threat hunts on the EDR console and share inputs to operations teams for action
- Prepare Daily, weekly and Monthly security dashboards
- Share IOCs and Advisories received from SOC or other industry sources to Administration teams for configuration
- Review SOC performance and participate in weekly reviews
- Follow through on open points with SOC
- Documentation of SOP which would be followed by the resource for his activities for standardization
- Hunt for and identify threat actor groups and their techniques, tools and processes
- Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors on customer’s networks.
- Provide expert analytic investigative support of large scale and complex security incidents.
- Develop dashboards and reports to identify potential threats, suspicious/anomalous activity, malware, etc
- A passion for research, and uncovering the unknown about internet threats and threat actors
- Validate suspicious events and incidents by using open source and proprietary intelligence sources
- Document and manage incident cases in our case management system
- Report incidents to the customer using a ticketing system
- Interface with customers to resolve issues, provide additional information, and answer questions related to incidents and monitoring
- Keep up to date with information security news, techniques, and trends
- Become proficient with third-party threat intelligence tools as required
To apply, send your resume to [email protected]
Cybersecurity Consultant – Compliance and Audit
- To deliver PCI DSS, PA DSS consulting services to new and existing clients
- Performing onsite PCI DSS implementation for various industry verticals
- Assisting PCI QSAs in PCI DSS validation and deliverable preparation
- To deliver governance, risk, and compliance consulting services to new and existing clients
- Team collaboration and where necessary mentoring to other consultants Writing reports to a high standard and provide technical QA for the work of others.
To apply, send your resume to [email protected]
Full Stack Developer– Development
- resource from development background, enthusiastic to learn and work on information security profile
- (.Net Core, Angular, SQL Server, HTML, CSS3, JavaScript, etc)
To apply, send your resume to [email protected]
Backend Developer – Development
- Resource from development background, enthusiastic to learn and work on information security profile.
- .Net framework, SQL Server
To apply, send your resume to [email protected]
Front End Developer – Development
- Resource from development Frontend, enthusiastic to learn and work on information security profile.
- Angular, JavaScript, HTML, CSS3, SCSS
To apply, send your resume to [email protected]
Python Developer – Development
- Python, Linux / Unix Shell Scripting, Windows PowerShell
- Logic Building, XML, Regular Expressions
- For Integration with Palo Alto Cortex XSOAR & To build Tripwire Scripting capability
To apply, send your resume to [email protected]
Data Modelling - Assessment
- developing background, enthusiastic to learn and work on information security profile.
- The primary responsibilities will be implementing pre-defined changes to a data model used for automating security assessments.
- Should be familiar with neo4j cypher syntax, relational databases and Jira (since that is used for task tracking)
- Additionally, security knowledge is also useful (but not necessarily required) as it helps them understand what is being implemented
To apply, send your resume to [email protected]
Cloud Security Architecture - Assessment
- Architecture consulting to construct Security Architectures for a business unit or infrastructure Technology team in the Microsoft Azure and AWS space
- Areas covered:
- Authentication, Authorization, Auditing
- Application Security – Session Security, Vulnerability/Penetration Testing items, Input Validation
- Secure data transport and storage
To apply, send your resume to [email protected]
- In depth knowledge of application, network, and platform security vulnerabilities. Ability to explain these vulnerabilities to developers
- Experience in conducting Information Security, IT Security, Audit assessments. Presenting the outcomes of the assessment and obtaining buy in.
- Strong focus on reviewing technical designs and functional requirements to identify areas of Security weakness
- The candidate must have working experience in the following application/network security domains:
-
i. Authentication: SAML, SiteMinder, Kerberos,OpenId
ii. Entitlements and identity management
iii. Data protection, data leakage prevention and secure data transfer and storage
iv. App Security - validation checking, software attack methodologies.
v.Cryptography – encryption and hashing
- Knowledge of standard network model and the risks that present at each layer, the functions of network equipment such as switches, routers, firewalls, proxies, VPN, and load-balancers, and to understand network architecture.
- The candidate must have working knowledge of the primary operating systems (Unix, Windows, Mac OS), the configuration and management of that platform at an enterprise scale, the security risks to that platform, and how to mitigate those risks
- experience in testing tools, at least one of Veracode, Fortify, OunceLabs, AppScan, WebInspect, Burp
- In-depth knowledge of web technologies such as Web Browsers, Web Servers, Web Services
- Prepare the report which includes the business and technical details of the systems, services, application etc. along with issues observed if any and presenting to the Lead as per the defined process
- Participate in review discussion with System owners & Business owners
To apply, send your resume to [email protected]
Senior Cybersecurity Analyst/ Specialist - Assessment
- Hands on with Vulnerability Management using any automated tool (Preferred Qualys) and manual tools
- Knowledge of ASV scans
- Troubleshooting experience in Enterprise Network
- Hands on in Configuration Audit with automated and manual tools
- Pen testing Skills
- Optional plus points: - Knowledge of CMDB
- Excellent communication skills and key stakeholder management required
- Knowledge of Qualys
To apply, send your resume to [email protected]
Senior Cybersecurity Consultant- Assessment
- Compliance to organizational security policies in accordance with corporate global strategic directions
- Understanding of OWASP, CWE 25, Data Protection, Access management software vulnerabilities and best practices
- Design and threat modeling skills
- Design/maintain and build security tools and services across SAST, DAST, RASP, IAST, container security
- Focus on automation, CI/CD, and Product Application Security Operations and removing manual intervention from security teams
- Build tools and automation scripts that enable developers to easily consume security services
- Experience in security design and deployment experience for AWS/Azure cloud environments
- Good understanding of security architecture principles such as network segmentation, authentication, authorization, encryption, audit & logging.
- Experience in Azure – Azure API management, Azure security center, etc.
- Experience and understanding of various authentication and authorization mechanism such as SAML/OpenID/OAuth and using various Identity and Access management platform.
- Experience in Security architecture frameworks & design patterns
- Understand existing processes and identifying how to improve and streamline them in order to improve team efficiency and effectiveness
- Implement common principles and best practices across cloud platforms and provide mitigation and compliance with industry specific guidelines
- Conversant to effectively work with US global teams at US time zones as these roles are supporting APAC/ANZ region and global requirements.
To apply, send your resume to [email protected]
Senior Cybersecurity Analyst- Solutions
- Installation and implementation of CyberArk Core PAS, AAM, EPM etc.
- Troubleshooting of the issues in CyberArk Core PAS
- Must have good understanding in incident handling process
- Understanding the login incidents/attacks.
- Development of PSM connectors
- AAM installation and implementation.
- Basic knowledge on windows, Unix and database
- Should have good communication / writing skill.
To apply, send your resume to [email protected]
Cybersecurity Analyst (Microsoft SCCM)- Solutions
- Experience in managing Microsoft SCCM.
- Experienced in operating system patching.
- Experience in investigating the root cause analysis.
- Should have good communication / writing skill.
To apply, send your resume to [email protected]
Cybersecurity Analyst (Intune)- Solutions
- Should have good understanding on Microsoft Intune
- Adding devices under Intune.
- Monitoring of Intune Console for device compliance and device management .
- Resolving Level 1 users’ issues.
- Reports generation
To apply, send your resume to [email protected]
Cybersecurity Analyst (Firewall)- Solutions
- Experience in managing Firewall.
- Understanding on wireless technologies like Aruba.
- Understanding on Zscalar.
- Experience in investigating the root cause analysis.
- Should have good communication / writing skill.
To apply, send your resume to [email protected]