Cutshort logo
My client is a Big4. logo
EDR Security Expert
My client is a Big4.'s logo

EDR Security Expert

3 - 7 yrs
₹5L - ₹15L / yr
Bengaluru (Bangalore)
Skills
Network Security
Web application security
Cyber Security
Description :

We are looking for candidates with the below experience.

- Mandatory experience on any of

a) Cylance Protect and Optics

b) Crowdstrike Falcon Insight

c) Sentinel One ActiveEDR

d) Carbon Black EDR

- Hands-on experience in security incident response lifecycle and its phases

- Should have experience in L1 and L2 in EDR

- Hands-on experience in event and log analysis on Windows endpoints

- Overall experience: 3-7 years, Relevant experience: 2+ years

Please note : Candidate should have experience in the below skills must :

- EDR Experience

- EDR Product Worked on and which level of support they are working on

- Incident Response

- Malware Analysis

- Flexible for shifts
Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About My client is a Big4.

Founded
Type
Size
Stage
About
N/A
Company social profiles
N/A

Similar jobs

Product Based IT Startup
Chennai
5 - 15 yrs
₹10L - ₹16L / yr
skill iconC
skill iconC++
skill iconGo Programming (Golang)
skill iconPython
Firewall
+13 more
  • Must have 6+ years of experience in C/C++ programming language.
  • Knowledge of Go programming language and Python programming language is a big plus.
  • Strong background in L4-L7 Internet Protocols TCP, HTTP, HTTP2, GRPC and HTTPS/SSL/TLS.
  • Background in Internet security related products such as Web Application Firewalls, API Security Gateways, Reverse Proxies and Forward Proxies
  • Proven knowledge of Linux kernel internals (process scheduler, memory management, etc.)
  • Experience with eBPF is a plus.
  • Hands-on experience in cloud architectures (SaaS, PaaS, IaaS, distributed systems) with continuous delivery
  • Familiar with containerization solutions like Docker/Kubernetes etc.
  • Familiar with serverless technologies such as AWS Lambda.
  • Exposure to machine learning technologies and distributed systems is a plus
  • B.E/B.Tech/MS degree in Computer Science, or equivalent
Read more
Remote, Hyderabad
8 - 12 yrs
₹35L - ₹50L / yr
Web application security
Network Security
Cyber Security
IT security
Security
+7 more

Job Summary:  

The Incident Response (IR) Lead manages a team of experts with diverse skill setsincluding Security Operations Center (SOC), Forensics, and technical Subject Matter Expert (SME) advisory. The IR Lead is specifically tasked with managing all aspects of an Incident Response engagement to include incident validation, monitoring, containment, log analysis, system forensic analysis, and reporting. The Incident Response Lead is also responsible for building the relationship with the client and client’s counsel and ensuring the engagement’s objectives and expectations are met and executed successfully as documented in the statement of work. You will leverage a solid foundation of technical expertise in Cybersecurity, Incident Response, and Digital Forensics to successfully execute your responsibilities.

 

ROLES AND RESPONSIBILITIES

· Accurately collects information from the client concerning the incident to include but not be limited to the client’s environment, size, technology, and security threats. In addition, the IR Lead is responsible for capturing all client’s expectations and objectives throughout the engagement to ensure successful delivery.

· The main point of contact manages and participates in all communications with the client and the client’s counsel during the engagement. The IR Lead sets the cadence for communications.

· Management and Coordination of all technical efforts for the IR engagement to drive the process forward through; tool deployment, ransomware decryption, restoration, and recovery efforts, system rebuilds, system, application, and network administration tasks.

· Coordinates with the Ransom Specialist when ransom negotiations are needed. Ensures updates regarding ransom status are delivered to the client and counsel in a timely fashion.

· Manages and coordinates the onsite efforts with the Onsite Lead or team ensuring they understand and can execute the objectives for the onsite work. Additional responsibilities with onsite efforts include ensuring communications are frequent and getting the daily onsite update communicating these back to the IR Director and/or IR Ops Associate for their Tiger Team.

· Ensures the Forensic Lead is coordinating the collection of data necessary for the investigation.

· Ensures SentinelOne is deployed on time and adding value.

· Communicates with sales when appropriate for SentinelOne, provide client contact.

· Communicates in tandem with the Forensic Lead pertinent findings to the client during the investigation.

· Follows up with the SOC Lead on SentinelOne alerts and encourages/coordinates client participation with the product.

· Accountable for final report review, ensuring the report is accurate, professional, and meets the objective of client counsel.

· Other duties as assigned.

DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties, and skills required personnel so classified.

 

 Role Description : Skills & Knowledge

1. Experience leading scoping calls

2. Strong background and practical hands-on experience with Windows or Linux System and Network Administration, Security DevOps, Incident Response and Digital Forensics, or Security Engineering

3. Practical experience performing in a functional role including but not limited to one or more of the following disciplines: computer forensics, Incident Response, data analytics, Security Operations, and Engineering, Digital Investigations

4. Possesses strong verbal and written communication skills

JOB REQUIREMENTS

· Bachelor's degree in Computer Science, Computer Engineering, Information Assurance, Forensic Sciences, or related technical field; Graduate degree preferred

· 10+ years experience leading full-cycle incident response investigations and communicating with the client/counsel/carriers

· Must be eligible to work in the US without sponsorship

WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job.

 

PHYSICAL DEMANDS

· No physical exertion is required.

· Travel within or outside of the state.

· Light work: Exerting up to 20 pounds of force occasionally, and/or up-to 10 pounds of force as frequently as needed to move objects.

Read more
Paramount Computer Systems
Mumbai
4 - 13 yrs
₹2L - ₹17L / yr
Technology Audit
Risk assessment
Computer Networking
Network Security
Firewall administration

Policies, Systems, Processes & Procedures


  •  Review and ensure the India information security policies are aligned with group policies and practices.
  •  Review and provide recommendations to India policies, standards, guidelines/ processes concerning RBI (Reserve Bank of India) regulatory requirements
  •  Coordinate with business units to define SLA for India
  • Formulate the security strategy and roadmap for India


Information Security


  •  Identify and ensure compliance to unique security requirements for RBI (Reserve Bank of India) related to RBI cyber security framework and RBI Guidelines on Information security.
  •  Establish contacts with RBI (Reserve Bank of India) regulators to receive security updates, circulars
  •  Coordinate for the group for various regulatory security audits at the Singapore location.
  •  Monitor and track all India open issues with IT and concerned international SPOCS
  •  Assist the GSO office and BU in attaining information security compliance objectives.
  •  Identify issues that could impact the bank and escalate any serious issues/ breaches/ violations; develop/monitor action plans for its closure in liaison with local, and overseas branches, and business groups.
  •  With the support of the Head office GSO team, perform risk assessments for locally implemented IT solutions and track open issues to closure
  •  Instigate and maintain contact with RBI Regulatory Authorities, Regulatory compliance department, and ensure good & healthy working relationships.
  •  Review new regulatory legislations; promptly communicate all regulatory notices/circulars to all concerned areas, provide interpretations if necessary; develop/monitor action plans towards its implementation.
  •  Assist Head office during Regulatory Examinations; ensure implementation/regularization of observations linked to compliance while meeting the deadline(s).
  • Respond to queries that are sought by local Regulatory Authorities / Law Enforcement Agencies Head Office & Overseas branches, in a timely manner with complete and accurate information.


Job Context


  •  Security Compliance requirements at the India location.
  •  Highlight security status & concerns to management.
  •  Consult with IT and information security staff to ensure that an implementation plan is established.
  •  Actively participate and contribute to GSO initiatives
  •  Track open Audit issues on information security to closure
  •  Risk assessments for local implementations
  • Inform HO of any new 3rd party technology vendor for vendor assessment



Read more
HSR Layout , Bangalore
2 - 6 yrs
₹4L - ₹10L / yr
Web application security
Penetration testing
Source Code review

1. Perform security assessment of web applications, Android, iOS mobile applications, Source Code Review

2. In-depth knowledge of security vulnerabilities not just limited to OWASP Top 10

3. False Positive removal and manual application testing      

4. Working exp of Python, Java, .Net etc         
5. Experience of using MF Fortify is a must

6. Proactively identify vulnerabilities and recommend fixes

7. Ownership of the tasks, Adapt to technologies/languages/platforms/frameworks of the time                                                                                     

8. Experience in using security tools to carry out manual as well as automated security assessments

9. Experience working with common product flows like payment gateway integration, authentication etc.                                                          

10. Client handling exp

11. Should be able to address client queries, work on proposals etc                                                        

12. Independent, self-motivated and comfortable working in a fast-paced environment with teams ranging from product to engineering teams

Read more
Drip Capital
at Drip Capital
4 recruiters
Vaibhav  Khode
Posted by Vaibhav Khode
Remote only
2 - 8 yrs
₹15L - ₹50L / yr
Design review
Vulnerability assessment
skill iconAmazon Web Services (AWS)
Web application security
Secure SDLC
+1 more

About Drip Capital & Tech Team

The engineering team at Drip Capital is responsible for building and maintaining the online global trade financing platform that supports the interactions between buyers, sellers, financing partners, insurance agents, global retail partners, trade agents, shipping & transportation companies, supply chain and warehousing companies worldwide. 

Our primary goal is to ensure that customers are provided time-critical capital and at the same time balance requirements related to risk, fraud management, and compliance. The services are accessed by customers worldwide and hence the engineering systems need to be policy-driven, easily reconfigurable, and able to handle multiple regional languages. We use machine learning for risk classifications/predictions, intelligent document parsing subsystems, robotic process automation, REST APIs to connect our microservices, and a cloud-based data lake and warehouse for data storage and analysis.

Our team comprises talent from top-tier institutions including Wharton, Stanford, and IITs with years of experience at companies like Google, Amazon, Standard Chartered, Blackrock, and Yahoo. We are backed by leading Silicon Valley investors - Sequoia, Wing, Accel, and Y Combinator. We are a global company headquartered in Silicon Valley along with offices in India and Mexico.

Your Role 

As an AppSec Engineer in Drip Capital’s engineering team, you will have the opportunity to take ownership of :

  • Contribute to and improve secure SDLC practice
  • Design architecture, methods, and controls required to meet security, compliance, and audit requirements.
  • Designing and implementing cloud and network security solutions.
  • Do comprehensive threat modelling for our applications and infrastructure in an Agile flow
  • Perform secure code review and security assessments of web, android and iOS applications, and cloud infrastructure (infrastructure as code).
  • Proactively identify vulnerabilities across our platform and work with developers in fixing them.
  • Automate and simplify security, as “Complexity is the enemy of Security”.
  • Handle Vulnerability Management and Patch Management processes.
  • Participate in the investigation related to Privacy/Security incidents and response activities.
  • Work with DevOps to implement the security tools and automation of the security tasks.
  • Mentor other engineers and evangelize security practices through cross-functional work with DevOps and engineering teams.
  • Testing the deployed security solutions to make sure they function as planned.

Our Checklist 

  • A minimum of 4 years of experience as an AppSec Engineer
  • Hands-on experience in secure design and architecture review of backend services, payments systems like payment gateways.
  • Hands-on experience in secure code review and automation of common security workflows.
  • Hands-on experience and a proven record of securing one or more of the cloud platforms: Azure, GCP, AWS and Hosted Cloud Solutions.
  • Good understanding of OWASP and SANS testing methodologies.
  • Good understanding of software security weaknesses and vulnerabilities.
  • Good knowledge in securing architecture of web, mobile applications and cloud infrastructure.
  • Ability to contribute as an individual and as part of a team
  • Working knowledge of any scripting language; Python or Go preferred
  • Experience in writing custom tools/scanners/extenders is a plus
  • Red teaming experience is a plus

If you love to explore the security aspects of a distributed system that makes decisions related to global trade finance, let's talk!

Read more
Bengaluru (Bangalore)
5 - 5 yrs
₹10L - ₹12L / yr
Information security
Network Security
IT security
IT security audit
ITGC
+12 more

Job description – Information Security (Network)

Roles and Responsibilities

Company will provide a professional opportunity to work in a dynamic environment where you will have the ability to develop process and Cyber security based skills

 

Work profile of individual

  • As part of the company cyber security consulting team, individual’s primary role would be to work with ISO 27k projects IT audits, ITGC audits, SSAE, SOC audits, IT Process Audit, Systems Audit, Gap assessment TPRM, GDPR, Infosec, GRC , ISMS , Cyber Security, SOX ITGC on customer engagements
  • Will address all aspects of security like physical, logical, data, access etc and review Information Security policy and suggest / recommend necessary changes to the same on customer engagements
  • Will be an active participant in internal / third party system security reviews and audits on customer engagements
  • Will perform internal audits on all aspects of IT and ensure compliance with the prescribed security norms on customer engagements and will be responsible for tracking the open audit findings and closure of the same
  • Will be responsible for implementation of new projects under Information Security Domain
  • Will be able to manage document tracking and updating - policies, processes, procedures, templates etc.
  • Will assist in development of proposals by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
  • Will engage with clients and(or) application development teams for implementation of cyber security & data privacy by design and data protection controls.
  • Will support the clients with ongoing design, implementation and maintenance of the data privacy framework for managing data protection risk including responding to legislation, devising and owning policies and training.
  • Will demonstrate ability to clearly and concisely communicate the privacy implications of technology and implementation.

 

Team work

  • Individual would be responsible for contributing to a strong team environment and promoting a positive working relationship with their colleagues.
  • Individual would predominately work with off-shore engagement teams and relevant  teams on presale and cyber security delivery.
  • Communication, written and verbal, with these teams would be expected.
  • Team members would be required to apply learning from trainings and on the job experience to work requests and support continuous process improvement.
  • Team members would be required to handle multiple tasks at the same time.
  • Detailed focus when performing work and good project management skills when managing workload and maintaining timelines will be necessary.

 

Desired Candidate Profile

  • Bachelors
  • Certifications (ISO 27001/ ISO 31000/ CISA/ CISSP/ CSX or equivalent and other relevant qualification/certification
  • Experience : 3-5 years

Knowledge Required:

  • Strong knowledge of information security concepts, risk and controls concepts. Strong understanding of security principals: audit, policies, guidelines, and compliance.
  • Good understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management and ITGC controls
  • Good understanding of technical security like network security, operating system, encryption, use of tools and technologies for various processes like logical access control, network security, security monitoring etc.
  • Sound knowledge of Internal Controls and Compliance. Must be able to recommend controls around people, process, and technology.
  • Sound knowledge on IT controls (especially IT risks). Good experience with control assessment, check the effectiveness of the implemented controls and recommend mitigation / improvements.
  • Good knowledge on Privacy, Governance and reporting
  • Experience with the Microsoft Office suite of products (i.e. Word, Excel, PowerPoint, Visio, etc.),
  • Strong verbal and written communication skills Knowledge / experience in fields of ITGC audits, Internal Audit, External Audit / Statutory Audit projects
  • Candidates should exhibit good client service skill collateral's with a strong focus on building relationships.

 

Additional Responsibilities:

 

  • Ability to assist in value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability
  • Good knowledge on software configuration management systems and license Management systems
  • Awareness of latest technologies and Industry trends
  • Logical thinking and problem solving skills along with an ability to collaborate
  • Understanding of the financial processes for various types of projects and the various pricing models available
  • Ability to assess the current processes, identify improvement areas and suggest the technology solutions
  • One or two industry domain knowledge
  • Client Interfacing skills
  • Project and Team management
Read more
company logo
Agency job
via WEN by Kamaljeet Kaur
Surat
6 - 7 yrs
₹1L - ₹6L / yr
Cyber Security
The roles and responsibilities of a Cyber Security engineer include:
• Evaluate the organization’s security needs and establish best practices and standards accordingly.
• Designing, implementing, maintaining, overseeing, and upgrading all security measures needed to protect organizations’ data, systems, and networks.
• Responding to all security breaches to the network and associated systems.
• Troubleshooting all network and security issues and incidents.
• Routinely conduct penetration testing.
• Taking appropriate security measures to ensure that the organization's infrastructure and existing data are kept safe.
• Conducting testing and scans to identify any vulnerabilities in the network and system.
• Taking an active role in the change management process.
• Assist in any security breach investigations.
• Handling routine daily administrative tasks such as reporting and keeping open lines of communication with the organization’s appropriate departments.
Read more
Dental Insurance
Remote only
6 - 9 yrs
$0.1K - $0.1K / yr
Cyber Security
Cloud Security
IT security
devsecops
HIPAA
+3 more
  • Max rate $85/hr
  • MUST HAVE- Application security covering micro services security and Restful API from technical and business process and architecture. 

  • MUST HAVE -Application security, penetration testing, red team tool (optional), development background, Should have done Application vulnerability Assessments.

  • GOOD TO HAVE - Infrastructure experience in Azure Cloud OR Microsoft 365 product implementations will be handy , network Architecture n design mostly in Azure space

  • GOOD TO HAVE - Enterprise platform – office 365 is plus and such implementation. 

  • Experience as a Azure DevSecOps engineer is desired 

  • Ability to communicate effectively with senior management as well as highly technical engineers to articulate security positions effectively. 

Read more
Infinity Labs India
at Infinity Labs India
1 recruiter
Piyush Agarwal
Posted by Piyush Agarwal
Remote, Noida, NCR (Delhi | Gurgaon | Noida)
4 - 8 yrs
₹12L - ₹18L / yr
TCP/IP
IPsec
Firewall
SSL
Network Security
+1 more

Position: - Professional Service Consultant

Location: - Noida

Company: - Infinity Labs Ltd

Website: - http://www.infinitylabs.in">www.infinitylabs.in

 

Job Description: -

Desired Experience:

Providing remote support/ consultation on security domain who can work in a 24/7 environment and collaborate with customers and accounts teams to deliver seamless services to large enterprises.

 

Education:

BE in Computer Science or equivalent education/training/experience.

 

Key Skills:

  • Excellent verbal and written communication skills.
  • Strong consulting skills.
  • Ability to multi-task and work in a fast-paced environment.
  • Ability to be self-starting and manage multiple tasks at a given time.
  • Ability to work individually and as a part of a team.
  • Effectively handle multiple projects and deliver the right solution to the customer.

 

Technical Skills

  • Advance understanding of internetworking, LAN, and WAN technologies.
  • Experience with network, security solutions, and technologies leading security solutions in large environments.
  • Expertise with Remote Access VPN solutions, IPSEC, PKI & SSL, TCP/IP, Authentication Protocols (LDAP, RADIUS etc.)
  • Experience with troubleshooting skills related to networking, routing, IP, NAT, IPSEC VPNs and knowledge of how these interact with applications and users.
  • Ability to independently debug broad, complex, and unique networks with mixed media and protocols required.
  • Experience with installation, configuration and operation of Palo Alto Networks products.
  • Experience working with a multi-factor authentication security system.
  • Experience on the Endpoint security.
  • Experience in Cloud technologies (AWS, Azure primarily, VMware NSX etc.)
Read more
Swiggy
at Swiggy
1 video
13 recruiters
Suresh Kaushik
Posted by Suresh Kaushik
Bengaluru (Bangalore)
3 - 12 yrs
₹25L - ₹60L / yr
Network Security
Penetration testing
skill iconProgramming
Security architecture
Computer Security
+2 more
Job Description Roles and Responsibilities: • Exploit security flaws and vulnerabilities with attack simulations on multiple application platforms like Android, iOS and Web. • Ability to flow from black box to grey box to white box tests. • Ability to effectively work with the engineering teams to provide technical risk. assessment of technologies in networks, applications, code reviews in the release management cycle. • Ability to perform vulnerability assessments and penetration testing, utilizing tools - commercial and open source. • Perform, review and analyze security vulnerability data to identify applicability and false-positives. • Conduct penetration testing in line with Open Web Application Security Project (OWASP) • Write technical reports that include suggested resolution for identified problem areas and perform operational risk assessment. Required Skills and Abilities: • OWASP top 10 • Security Pen Testing methodologies including automated scans and manual methods • Tools including Burp, Nexpose, NMap, Whois etc. is a plus • Good Hands-On with Linux Debian Flavors and security hardening of the same • Understanding of Web Servers and HTTP 1.0/1.1 Protocol • Troubleshooting web servers like Apache, Nginx and other reverse proxy platforms • Basic understanding of NodeJS, Python and JAVA • TCP/IP networking including IP classes, subnets, NAT • SSL Handshake and Certificates - Understanding • DNS, and DHCP, Network troubleshooting • Remote access methods • Backup and disaster recovery methodologies • Network analysis tools • Good Hands-on using Linux Debian Flavors • Experience with security issues in Cloud Technologies (AWS) is a plus • Ability to grasp new technology concepts quickly • Good documentation skills • Ability to work in a team environment and interact with people • Knowledge and understanding of basic information security principles • Should be aware of the latest Major Application Zero-day vulnerabilities • Should be able to understand security alerts and take necessary actions accordingly Education and Experience: • Bachelor’s degree in information technology related field
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos