Are you a passionately curious individual who possesses a steady and unshakable eye for detail? Are you not afraid of searching for a needle in the stack of hay? Do you think you have the skillset, knowledge, to be the first line of defense between cyber adversaries and the organization? Do you believe in working for a mission to protect your organization 365*24*7? If you are in love with the tools and technology that help you to solve this daunting challenge, then we are looking for you.
Who we are?
We are a bunch of young and passionate folks who are driven by the power of the latest and innovative technologies. We are on the mission of making the Cyberworld safe for every organization, product, and individual.
What we look for outside work parameters?
-Your expertise is your primary qualification, not your degree or certification.
-Your publicly known contributions are your credentials.
-Your write-up and blogs reflect your interests and ethics.
You are a perfect technical fit if:
–At least 2 to 4 years of experience handling SIEM tools, Incident Response.
–Knowledge and Hands-on experience on Security appliances like (IPS, Proxy, EDR, Malware Protection, Anti-SPAM )
–Experience in host and network forensics.
–Experience in Security Orchestration and Automation.
–Have good experience in handling IT Security incidents
–Should have good knowledge of SIEM tools, Threat Intelligence, Malware triaging.
You Have All Our Desired Qualities, if:
–You like automating stuff
–You like writing tools
–You have excellent written and verbal communication skills and the ability to express your thoughts clearly
–You have the skill to articulate and present technical things in business language
–You can work independently as well as within a team
–You have strong problem solving, troubleshooting, and analysis skills
–You are passionate about your area of expertise and self-driven
–You are comfortable working in a dynamic and fast-paced work environment
–You are Self-driven, proactive, hardworking, team-player
–You are working on something on your own in your field apart from official work
Your everyday work will look like:
-Alert handling: Analyse and tune security alerts and interpret security events that may lead to incidents.
-Incident Response activities: Identity, investigate and respond to potential security incidents to minimize the operational and organizational impact.
-Threat hunting: Actively pursue an abnormal activity on assets that may be signs of compromise.
-Threat Intelligence: Leverage various threat intelligence sources and capabilities to enable an intelligence-driven response.
-Malware Analysis: Analyse and interpret malware, exploit, and insider threat activities.
-Forensics: Perform forensic analysis on memory, disk, and other system and network artifacts to identify indicators of compromise.
-Identify Gaps: Investigate and document gaps in controls, event data, and work with internal teams to resolve.
-Process Improvement: Execute, develop, and document Incident Handling Guides and processes.