Cutshort logo
New Era India logo
Threat Intelligence/ Threat Hunting
Threat Intelligence/ Threat Hunting
New Era India's logo

Threat Intelligence/ Threat Hunting

Garima Rajput's profile picture
Posted by Garima Rajput
7 - 12 yrs
₹10L - ₹15L / yr
Threat analysis
Threat modeling
Security Information and Event Management (SIEM)
Malware analysis

Job Description

Cyber Threat Intelligence & Threat Hunting - Subject Matter Expert (B3-2)



Perform threat research, create actionable threat advisories, and derive hunting queries based on the evolving threat vectors.

Understand APT groups, Conduct deep dive technical analysis of cyber-attack tools, tactics, and procedures. Create hypothesis and perform active threat hunting.


Minimum Requirements:

10+ years of overall experience, 7+ years of experience in cyber threat intelligence, malware analysis (Reverse engineering)

Hands-on experience with writing threat hunting hypothesis & active threat hunting

Experience with YARA rule and OpenIOC signature creation.

Experience with multi-tiered mission-critical systems.

Experience in opensource sandbox and honeypots.


Preferred Certification

GIAC Cyber Threat Intelligence (GCTI)

C| TIA (Certified Threat Intelligence Analyst)


Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About New Era India

Founded :
Stage :
New Era India Consultancy (an en world Group Company) is a Top Recruitment consultancy firm in India. Specializing in Mid-Senior level for Permanent, Leadership & RPO in all domains.
Read more
Connect with the team
Profile picture
Uday Kumar
Profile picture
abhilash pulupula
Profile picture
Yukti Madan
Profile picture
Asha P
Profile picture
Niharica Singh
Profile picture
Poorti Punj
Profile picture
Garima Rajput
Profile picture
Jemcy Sunny
Profile picture
Garima Jain
Profile picture
Priya Esther
Company social profiles

Similar jobs

Foundation AI
Neha Sharma
Posted by Neha Sharma
2 - 5 yrs
₹5L - ₹15L / yr
Security awareness
Threat modeling
+4 more

Designation: DevSecOps Engineer

Location: Hyderabad

Work Mode: Office

Reporting to: Associate Director- DevOps

About the Role: As a DevSecOps Engineer at Foundation AI, you'll lead efforts to enhance security for infrastructure and products. You'll need technical expertise in identifying and addressing security vulnerabilities, ensuring compliance, and integrating security best practices across the development lifecycle. Your role also involves collaborating with cross-functional teams to embed security throughout the development process.


● WorkLocation Commitment: As a DevSecOps Engineer, you'll be expected to work from our office in Hyderabad. This reflects our preference for in-person collaboration and a commitment to team cohesion.

● Rich Industry Experience: You should possess a substantial 3-6 years of experience in DevSecOps and DevOps & should have worked for product-based companies (Startup/Scaleup). This extensive experience underscores your ability to navigate complex DevsecOps challenges effectively.

● Infrastructure as Code (IaC) Security: Ensuring that application configurations are secure and compliant with security policies. Performing security checks on infrastructure code (e.g., Terraform, CloudFormation) to ensure that resources are provisioned securely.

● Operating System Expertise: Your command over operating systems is particularly vital, with a strong emphasis on Linux. This expertise ensures a solid foundation for managing and optimizing system-level operations.

● DevSecOpsMethodology: By incorporating security into the DevOps workflow, DevSecOps aims to identify and mitigate security vulnerabilities more effectively, reduce the risk of security breaches, and accelerate the delivery of secure software.

● Static Application Security Testing (SAST): Scanning the code for security vulnerabilities using tools like SonarQube, Checkmarx, or Fortify as part of the build process.

● DynamicApplication Security Testing (DAST): Conducting security testing on running applications to find vulnerabilities that attackers can exploit. Tools like OWASP ZAP or Burp Suite can be integrated into the pipeline

. ● Effective Communication and Collaboration: Exceptional communication and collaboration skills are essential. You'll work closely with cross-functional teams, bridging the gap between development and operations, and ensuring smooth coordination.

● Cloud-Native Proficiency: Knowledge of security tools specific to cloud-native environments, such as container security scanners, cloud security posture management (CSPM) tools, and cloud workload protection platforms (CWPP).

● Understanding Distributed Computing: A solid grasp of Distributed Computing principles is fundamental. It enables you to design and implement systems that can handle complex, distributed workloads effectively.

● CodingProwess: Your coding skills, particularly in Bash Shell Scripting and Python, will play a pivotal role. These skills empower you to automate tasks and develop tools to enhance system reliability and efficiency.


● AssistSDEsandDevOpsteamsonsecuredeploymentandbestpractices. ● CreateaKnowledgebaseonsecurityvulnerabilitiesandtestcases.

● PerformsecuritytestingonWebandMobileassetsthroughachecklist

● WorkcloselywiththeProduct teamandSDE/QAtofixvulnerabilities/ issues faced by customers

● Performredteamandphishingexercisestoimprovesecurityposture

● Assist/mentor teammates on security test cases and day-to-day activities

● Workonincidentmanagementandthird-partysecurityreports

● Initiateandimproveresponsibledisclosure/Bugbountyprogram

●Brownbagsessionsandpresentationstothetechteamonsecuritybestpractices and improvements

● Work closely with business stakeholders and influence the security policy of the org .

Read more
at Shipsy
4 candid answers
1 video
Reshika Mendiratta
Posted by Reshika Mendiratta
Bengaluru (Bangalore)
Upto ₹70L / yr (Varies
Cyber Security
skill iconAmazon Web Services (AWS)
Security Information and Event Management (SIEM)
Security operations
+2 more

About Shipsy

At Shipsy, we aim to revolutionize the logistics and supply chain industry through our innovative SaaS platform. We leverage cutting-edge technology to deliver solutions that enhance efficiency, improve sustainability, and create positive impacts across global supply chains.

Position Overview

We are seeking a skilled Security Operations Engineer to join our security operations team. This role is crucial for protecting our company’s assets, data, and IT infrastructure. The ideal candidate will possess a solid foundation in cybersecurity, experience with incident response, full stack development experience and a proven ability to work effectively within a team environment.

Key Responsibilities:

  • Work with the product, devops, and development teams to identify the right security architecture for implementing new solutions, products, and features. Help develop, implement, and support product security strategy.
  • Work closely with product management, engineering, and DevOps teams to implement, identify, and embed cybersecurity in a secure connected architecture. Deliver general security concepts in the software development lifecycle (Identity and Access Management, encryption, web application security, security logging, pen-testing processes, etc. ).
  • Support security initiatives and serve as a point of contact to build and securely scale cloud platforms (EX. AWS, GCP & AZURE).
  • Manage program risks through effective identification, mitigation, tracking, and reporting of the identified risks.
  • Present strategies, project plans, and more to cross-functional teams delivering risk management solutions that add value.
  • Experience in introducing security testing into software delivery pipelines (CI/CD)
  • Understanding of secure and defensive coding principles, especially OWASP top 10 or similar guidance frameworks
  • Understanding of cloud-native applications and how to deploy them securely
  • Create design specifications and prepare technical documentation and run-books.
  • Support the development of standards by creating templates and patterns for ease of use and increase the productivity of the security program


  • 8 years of industry experience with at least 4 years experience in DevSecOps automation and tooling. 
  • Proven experience with Amazon Web Services (AWS), including IAM, AWS Shield, AWS WAF (Web Application Firewall), and Amazon Inspector to enhance security measures and compliance within the cloud environment.
  • Expertise in security tools and technologies, such as vulnerability scanners, penetration testing tools, and security information and event management (SIEM) systems. 
  • Strong understanding of DevSecOps principles and practices. 
  • Excellent communication, collaboration, and problem-solving skills. 
  • Ability to work independently and as part of a team. 
  • Experience collecting metrics, measuring systems, and interpreting data to make decisions. 


  • Bachelor's degree in Computer Science, a related technical field, certifications, or equivalent practical experience

Good to have:

  1. Experience in JavaScript, Node, React , Python & Database administration.
  2. AWS Management, Security, Scalability, Reliability, Cost Optimization Education and Certifications
  3. AWS Certified Security – Specialty or equivalent practical experience

Read more
at HappyFox
1 video
6 products
Lindsey A
Posted by Lindsey A
Chennai, Bengaluru (Bangalore)
5 - 12 yrs
₹10L - ₹15L / yr
IT security
Network Security
Threat modeling
Exploratory testing
+4 more

About us:

HappyFox is a software-as-a-service (SaaS) support platform. We offer an enterprise-grade help desk ticketing system and intuitively designed live chat software.


We serve over 12,000 companies in 70+ countries. HappyFox is used by companies that span across education, media, e-commerce, retail, information technology, manufacturing, non-profit, government and many other verticals that have an internal or external support function.


To know more, Visit! -



  • Perform manual and automated application penetration tests and provide suggestions to harden our products
  • Participate regularly in the development and release process to identify and report security vulnerabilities in the code being shipped
  • Conduct regular audits on all Features/APIs of the product and reports vulnerabilities to the development team
  • Keep up with industry trends in the security space
  • Triage inbound vulnerability reports with an appropriate level of urgency and track them until they are resolved by Engineering teams
  • Should be able to understand different elements of our NodeJS, Python and similar stacks and provide guidance on secure software development practices to the team
  • Scale our application security engineering team



  • Strong verbal and written communication skills
  • Has worked on Web Application Security Testing for a reasonably complex application. The mobile experience is a plus
  • Good knowledge of secure software development guidelines from authoritative bodies like NIST, OWASP, SANS
  • Hands-on experience in performing manual/automated security assessments with open-source/commercial security tools


Read more
Bengaluru (Bangalore)
6 - 10 yrs
₹18L - ₹25L / yr
Security Information and Event Management (SIEM)
Security operations
Cyber Security
+1 more

1.Triage of security alerts that includes but not limited to malware, denial of service, unauthorized access, etc.

2. Conduct incident investigations on SIEM tools.

3. Perform threat hunting on networks to detect and isolate threats.

4. Knowledge of various security methodologies and processes, and technical security solutions (firewall, packet analysis, SIEM and intrusion detection systems)

5. Continuous optimization, tuning and monitoring of SIEM solution

6. Hands on experience around administrating and threat hunting on EDR, XDR, DLP and SIEM tools.

7. Ability to analyze endpoint, network, and application logs

8. Identify false positives, analyse reported spam, phishing, and suspicious emails and understanding of email security concepts: SPF, DMARC, DKIM

9. Immediate Joiners

Read more
at Ongrid
3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
4 - 8 yrs
₹10L - ₹18L / yr
Information security
Cyber Security
Policies and procedures
Vulnerability assessment
+2 more
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks

- Routinely performing threat analysis, system checks, and security tests

- Defining and updating information security criteria and validation procedures

- Effectively discuss to understand safety and security and fix the problems along with different stakeholders

- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.

- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001

- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.

- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response

- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer

- Operate vulnerability scanning and compliance tools to identify system weaknesses

- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field

- Relevant experience working with ISO Policies, and GDPR guidelines.

- Strong knowledge of network architecture and security concepts related to routing

- Exceptional attention to detail

- Excellent analytical and problem-solving skills

- Great team player and able to work efficiently with minimal supervision

- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.

- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
Statestreet HCL Services
at Statestreet HCL Services
5 recruiters
Mansi Lakhanpal
Posted by Mansi Lakhanpal
Delhi, Gurugram, Noida, Ghaziabad, Faridabad, Chennai, Gaziabad
10 - 15 yrs
₹1L - ₹18L / yr
Malware analysis
Security Information and Event Management (SIEM)
Threat analysis
Risk analysis
+4 more


• Handling critical incidents/escalations, reviewing incidents and tracking towards closure

• Good experience in SIEM tools, event logging and event analysis

• Good knowledge in enterprise security products like Firewalls, IPS, Web/content Filtering tools, Compliance tools

• Team Management, performance monitoring and prepare reports on weekly, monthly basis and share to stakeholders as needed

• Good knowledge about common security attacks, targeted attacks

• Good experience in forensic analysis, Packet Analysis tools like Wireshar
• Knowledge on compliance requirements and audits

• Assisting, mentoring L2/L3 analysts and groom them to move to next level

• Contribute to continue monitoring and improvement of security posture of the organization

• Having experience of managing team of 25+ team members across multiple locations.



• Primarily responsible for security event monitoring, management and response

 • Ensure incident identification, assessment, quantification, reporting, communication, mitigation and monitoring
 • Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives

• Revise and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in managing SLAs

• Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Center

 • Management, administration & maintenance of security devices under the purview of SOC which consists of state-of-the art technologies

• Perform threat management, threat modeling, identify threat vectors and develop use cases for security monitoring

• Responsible for integration of standard and non-standard logs in SIEM

• Creation of reports, dashboards, metrics for SOC operations and presentation to Sr. Mgmt.

• Co-ordination with stakeholders, build and maintain positive working relationships with them


Read more
US based company
US based company
Agency job
via MNR Solutions by Geetanjali Kumari
7 - 13 yrs
₹20L - ₹30L / yr
skill iconAmazon Web Services (AWS)
Cyber Security
Penetration testing
Threat modeling
Computer Security
+1 more

Job Responsibilities:


Experience: 8 Yrs to 12 Yrs


  1. Hands-on expertise on performing Application pen testing (Mobile(Android, IOS),networking, web application pen testing),
  2. Should worked on IOT,AWS,Application Penetration Testing, Reverse Engineering, source code review, CI/CD Pipeline
  3. have done any submission on Bug crowd or Bug Bounty.
  4. have developed tools or scripts for web pen test on GitHub.
  5. Certified on OSCP
  6. Threat Modeling
  7. Network scan in stealth mode or simple scan using Nmap and Burp suite


Implement security measures which monitor and protect sensitive data and systems from infiltration and cyber-attacks.


Developing different ways to solve the existing threats and security issues.


Configuring and implementing intrusion detection systems and firewalls.


Security product development, testing, and implementation.


Responsible for security technology research, penetration testing, and vulnerability scanning.


Please follow the below inputs.


The shift will starts from 03:00 PM to 12 AM (fixed for few months),



OSCP certification(Not mandatory, preferable)


Below are the primary key skills:


Total Application Security Experience:

Total Security Architecture Experience:









Read more
Banyan Data Services
at Banyan Data Services
1 recruiter
Sathish Kumar
Posted by Sathish Kumar
Bengaluru (Bangalore)
4 - 10 yrs
₹8L - ₹20L / yr
Information security
Cyber Security
IT risk management
IT security audit
+9 more

Information Security Specialist

Notice Period: 45 days / Immediate Joining


Banyan Data Services (BDS) is a US-based data-focused Company that specializes in comprehensive data solutions and services, headquartered in San Jose, California, USA. 


We are looking Information Security Specialist who has the expertise and deep knowledge of Information security regulations, compliance, and SIEM tools, and the ability to develop, describe and implement Security Baselines and Policies.


It's a once-in-a-lifetime opportunity to join our rocket ship startup run by a world-class executive team. We are looking for candidates that aspire to be a part of the cutting-edge solutions and services we offer that address next-gen data evolution challenges. 


Key Qualifications


· Design, deploy, and support Information Security Solutions provided by BDS


· Assist clients to carry out the IT Risk Management assessment on both on-prem and cloud platforms


· Provide subject matter expertise on IT security compliances during the security audits to meet various security governances.


· Research and strategic analysis of existing, and evolving all IT and data security technologies


· Establish baselines to define required security controls for all infrastructure components and application stack


· Follow latest vulnerabilities and threats intelligence updates across a wide range of technologies and make recommendations for improvements in the security baselines.


· Overseeing security event monitoring, understand the impact, and coordinate remediation efforts


· Create and optimize the SIEM rules to adjust the specification of alerts in responding to incident follow up


· Must be able to work a flexible schedule during off-hours


Key Skills & Qualification


· Minimum of 4 years relevant work experience in information/cyber security, audit, and compliance


· Certifications in any of technical security specialty (e.g., CISA, CISSP, CISM)


· Experience in managing SIEM products like Arcsight, Qradar, Sumo Logic, RSA NetWitness Suite, ELK, Splunk


· Exposure of the security audit tools on public cloud platforms


· Solid understanding of the underlying LINUX/UNIX and Windows OS security architecture


· Certified Ethical Hacker would be a plus


· Handling of Security audits is a must


· Proven interpersonal skills while contributing to team effort by accomplishing related results


· Passion for learning new technologies and the ability to do so quickly." target="_blank"> 

Read more
travelopia UK
travelopia UK
Agency job
via Recruitment RIghtt by Harish Rajan
Bengaluru (Bangalore)
8 - 9 yrs
₹10L - ₹15L / yr
IT security
Network Security
Information security
Cyber Security
Security Information and Event Management (SIEM)
+5 more

What you will be doing:

  • Participate in network and security initiatives, network designs, project plans, and deployments as well as coordinating technical issues with vendors and internal teams
  • Contribute to design, installation, maintenance, vulnerability remediation, and monitoring of network and security systems
  • Responsible for expert-level troubleshooting of any problems relating to global issues - participation in security incident management and response.
  • Providing support and guidance to Technology teams across network and security technologies.
  • Adhere to IT access-management incident response and change control procedures (ITIL)
  • Continuous documentation of the IT network infrastructure including technical specifications, design documents, roll-out, and disaster recovery plans

What we are looking for:


A Network Security engineer with a solid comprehensive background in:

  • Ability to manage, supervise and delegate multiple tasks
  • Strong experience with SIEM and log management
  • EDR (Endpoint Detection and Response - especially in Microsoft ATP, Defender or SentinelOne) configuration and management.
  • Vendor management; including SOC (Security Operations Centre) providers
  • Global Security Incident management support
  • Experience in SD-WAN (Meraki) management and troubleshooting
  • Knowledge of network security, hardening network equipment, and vulnerability scans
  • Experience in Microsoft security and endpoint management tooling such as MCAS and MEM
  • Excellent troubleshooting skills. Ability to rapidly identify respond to and resolve issues
  • Proven experience in remote access technologies (ZScaler an advantage)
  • Excellent communication skills (written and verbal).
  • An ability to work under pressure and take ownership of tasks and customer issues.
  • Ability to work individually and as part of a global Infrastructure Technology team with regional teams in India, UK and North America.
Read more
EZEU (OPC) India Pvt Ltd
at EZEU (OPC) India Pvt Ltd
2 recruiters
HR Ezeu
Posted by HR Ezeu
Bengaluru (Bangalore)
8 - 12 yrs
₹20L - ₹22L / yr
Cyber Security
Security Information and Event Management (SIEM)
Security architecture
+14 more

Security Monitoring and Operations (SIEM)
Security Solutions design and deployment
IDAM - Identity and Access Management Experience
Network Monitoring and Management Experience
VAPT - Vulnerability Assessment and Penetration Assessment
Experience on DLP and Endpoint Security
Knowledge on Encryption 
Experience in performing Maturity Assessment for identifying the security gaps and recommending measures to fix the gaps
Experience in Audit controls and applying security measures (ISO, PCI etc..)
Knowledge in automation and scripting

Read more
Why apply to jobs via Cutshort
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
Matches delivered
Network size
Companies hiring
Did not find a job you were looking for?
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos