Cyber Warrior: Are you a passionately curious individual who possesses a steady and unshakable eye for detail? Are you not afraid of searching for a needle in the stack of hay? Do you think you have the skillset, knowledge, to be the first line of defense between cyber adversaries and the organization? Do you believe in working for a mission to protect your organization 365*24*7? If you are in love with the tools and technology that help you to solve this daunting challenge, then we are looking for you.
Who we are?
We are a bunch of young and passionate folks who are driven by the power of the latest and innovative technologies. We are on the mission of making the Cyberworld safe for every organization, product, and individual.
You Have All Our Desired Qualities, if:
-Minimum 2-3 years of experience in Information/ Cyber Security domain with at least 1 years as Threat Intelligence Analyst.
-Solid understanding of threat intelligence lifecycle, cyber kill chain and Mitre Attack.
-Solid understanding of network and host security concepts in on-prem and cloud environments.
-Strong Information Security fundamentals.
-Should have knowledge of cyber threats, malware, APTs, exploits etc.
-Familiarity with the Darknet, Deep Web, and other sources of cyber-criminal activity.
-Solid understanding of vulnerabilities, how they affect systems, organizations, and the internet as a whole and their corresponding context and severity (CVEs, CVSS, CPE and vulnerability disclosures).
-Strong experience analysing and synthesizing actionable threat intelligence via open-source tools.
-Ability to identify, create, execute, and adjust standard operating procedures for day-to-day operations.
-Ability to document technical analysis and articulate outcomes to non-technical audiences.
-Able to create high-quality Security Analysis reports.
-People skills, strong English communications with ability to communicate effectively with various clients with the ability to explain and elaborate on technical details.
-Understanding of current events in the security and threat intelligence world.
You Have All Our Desired Qualities, if:
-Ability to automate mundane tasks when needed.
-Understanding of contemporary scripting languages such as python, and familiarity with application programming interfaces (API).
-Experience in SOC environment.
-Experience with SIEM, EDR, NDR tools.
-Certification like CEH, OSCP.
Your everyday work will look like:
-The role is highly responsive, and responsible for identification, analysis, processing, and distribution of intelligence related to threats and vulnerabilities.
-Prioritize and use information derived from open / commercial intelligence disciplines to determine new / changes in actor activity, capabilities, intent, and resources.
- Analyze information regarding intrusion events, Security incidents and other threat indications and early-warning functions.
-Create customer-specific analytical reports based upon identified findings.
-Create weekly Security Trend reports.
-Review and analyze data from various sources such as OSINT/Darknet/TECHINT.
-Lead research efforts tracking threats and actors across industry verticals.
-Technical analysis of Tactics, Techniques and Procedures (TTPs) used in cyber incidents and campaigns: Analyzing attack vectors, finding adversary infrastructure, establishing intrusion chain, structured documentation of findings on the TIP.
-Focus on integration and automation of threat intelligence to security tools using STIX / TAXII.
-Providing Intelligence support to Incident Response teams in Security Operations, Cyber Security teams and Business
-Engage with IT and Security teams to apprise them of threats to the technology landscape and drive remediation.
-Writing reports on incidents, campaigns, emerging threats etc. for technical and Executive audience.
-Respond to requests for ad-hoc reporting and research topics from management as required.
-Stay up to date on the threat landscape.