ABOUT THE ROLE We are looking for a Security Analyst with in-depth expertise in IT security. You will function as a cybersecurity analyst in the DevSecOps lifecycle, providing the security life cycle for application and web teams. Your role will be working on the security strategy governing the application and cloud-based platform infrastructure. You will work closely with other DevOps and application engineers to understand and define clear guardrails, alerts, and Security as Code (SaC) deployments to provide protection from malicious traffic, vulnerabilities, and other attack vectors. RESPONSIBILITIES Develop and maintain documentation for security systems and procedures. Perform VAPT on cloud assets, deliver remediation recommendations, and provide knowledgeable assistance in resolving identified vulnerabilities. Assist with integration, implementation, and administration of security systems. Document incidents and generate reports for team members and key staff. Assess architectures and designs for security vulnerabilities and suggest and implement proper alternatives. Maintain an information security risk register and assist with internal and external audits relating to information security. Give advice and guidance to staff on issues such as spam and unwanted or malicious emails. REQUIREMENTS Preferred work experience with a minimum of 1 - 3 years on CyberSecurity. Strong knowledge of technology and security topics including network and application security, infrastructure hardening, security baselines, web server, and database security. Significant knowledge of any cloud platforms like AWS, Digital Ocean, or Google Cloud. Experience with cloud-based security management/IDS/IPS/SIEM tools like Splunk. Ability to perform Pen Test on Web Applications and simulating security breaches. Good report writing skills and general communication skills in order to liaise with colleagues and management around cybersecurity issues and strategy. Experience in developing, documenting, and maintaining security procedures. Ability to create disaster recovery and contingency plans in the event of any security breaches. Experience in evaluating security threats to your organization and perform a risk analysis of threats.
As a Senior Tech Lead: You will be part of a thought leadership team that will design and develop the leading cyber security solution that protects digital assets of corporations such as Apple & the US Federal Govt. This solution used by global Fortune 100 corporations will be massively scalable to secure their Global networks You will bring to the table: Domain: Networking and Network Security Primary Skills: Java, Spring & Hibernate Secondary Skills: Any one of Python / Java Script / Angular JS / Shell / ANTLR / Groovy Expertise - Excellent skills & experience in Java, Spring & Hibernate - Minimum 2 years of Experience in Networking and Network Security domain - Any Scripting language - Python / Java Script / Angular JS / Shell / ANTLR / Groovy - Strong object-oriented design skills, data structures, algorithms, and design patterns. - Tools Pivotal / GitHub / Jenkins - Good to have Database design and management experience. What you will do… - You will be hands on, writing high quality code and ensuring on-time delivery. - Provide guidance on software design, architecture, and interface choices. - Design highly scalable, reliable, secure and fault tolerant systems with minimal guidance. - Mentor engineers on design, coding, and troubleshooting. - Analyse requirements, problems and solve them with the best solution. - Create platforms, reusable libraries, and utilities wherever applicable. - Work in cross-functional team, collaborating with peers during entire SDLC. - Work as part of a team to solve complex technical problems. - Support customer queries, escalations, to keep high customer satisfaction. About Benison Benison Tech is a niche technology company that has been appointed by Intel, Broadcom, CISCO, Checkpoint, and Marvell to collaboratively spearhead the next generation Network Security, 5G and Wireless technologies. We help our mutual customers get to market faster by applying our core technical brilliance in solving complex engineering problems. We work with the world leading technology companies in the latest bleeding edge technologies from 5G enablement to real-time ML based network security systems. Our interview process isn’t easy, but necessary to ensure that we are a fit for each other. You will be working in a dynamic fast paced environment on cutting edge technologies, so roll up your sleeves and get ready for the challenge. We need people who are drawn to technology challenges rather than work in a plush corporate role. You are a fit for Benison if You want to work in the technologies of the future… Network Security, Cloud technologies, 5G and WiFi6. You have a deep-rooted desire to learn new technologies. You are driven by the passion of solving complex problems. You want to work with some of the best minds in the industry
Description :We are looking for candidates with the below experience.- Mandatory experience on any ofa) Cylance Protect and Opticsb) Crowdstrike Falcon Insightc) Sentinel One ActiveEDRd) Carbon Black EDR- Hands-on experience in security incident response lifecycle and its phases- Should have experience in L1 and L2 in EDR- Hands-on experience in event and log analysis on Windows endpoints- Overall experience: 3-7 years, Relevant experience: 2+ yearsPlease note : Candidate should have experience in the below skills must :- EDR Experience- EDR Product Worked on and which level of support they are working on- Incident Response- Malware Analysis- Flexible for shifts
Job Responsibilities: Experience: 8 Yrs to 12 Yrs Hands-on expertise on performing Application pen testing (Mobile(Android, IOS),networking, web application pen testing), Should worked on IOT,AWS,Application Penetration Testing, Reverse Engineering, source code review, CI/CD Pipeline have done any submission on Bug crowd or Bug Bounty. have developed tools or scripts for web pen test on GitHub. Certified on OSCP Threat Modeling Network scan in stealth mode or simple scan using Nmap and Burp suite Implement security measures which monitor and protect sensitive data and systems from infiltration and cyber-attacks. Developing different ways to solve the existing threats and security issues. Configuring and implementing intrusion detection systems and firewalls. Security product development, testing, and implementation. Responsible for security technology research, penetration testing, and vulnerability scanning. Please follow the below inputs. The shift will starts from 03:00 PM to 12 AM (fixed for few months), OSCP certification(Not mandatory, preferable) Below are the primary key skills: Total Application Security Experience: Total Security Architecture Experience: IOT(optional) MOBILE WEB AWS(Mandatory) NETWORKING THREAT MODELS
Must have good exposure working in SOAR (Security, Orchestration, Automation, Response) Strong knowledge in End user/ point security. Good hands on Cyber security like SIEM, IAM, PAM. Sound Knowledge into automated incident management using Demisto (or similar technology) Hands on creating playbooks in Python Scripting.
Responsibilities1. Monitor the quality of results of the automated system in the detection of attacks,intrusions, and unusual, unauthorized or illegal activities.2. Build and maintain scripts that collect cyber threats data from external sources as well asfrom the in-house analytics engine, data quality inspection, and dataset creation for MLwith manual annotation.3. Assist Data Scientists & Machine Learning Engineers in developing systems thatautomate risk assessment/mitigation workflows.4. Keep up to date with the latest security and technology developments.5. Research and evaluate emerging cybersecurity threats and ways to manage them.Required skills1. Attention to details and a quality first mindset.2. Knowledge of current hacking techniques, vulnerabilities, and security analysistechniques.3. Basic programming experience, and the ability to automate tasks.4. Manual code review or source code analysis experience.Note: We are a startup, you will have much more responsibilities.Benefits1. A competitive salary.2. Health Insurance.3. An awesome team that will challenge and respect you.4. Lunch, Unlimited snacks and drinks.5. Top notch office in the heart of Bangalore City.
- Engage with LOB Delivery Managers to ensure compliance with all required assessments per the policy and procedures. - Drive all aspects of the application controls assessment and application development life cycle assessment of third party providers. - Assess completed questionnaire and supporting field work materials to ensure they are complete and meet required expectations. - Conduct the remote assessment, providing the overall IT Risk expertise. Identify control breaks and vulnerabilities with a third party application. - Document findings and work with the LOB Delivery Manager to resolve those findings through Control Breaks logged within internal risk management systems. - Escalate issues associated with third parties as needed - Identify opportunities for improving third party risk posture as well as third party risk management processes, including expanded monitoring, KRI tracking, etc. - Assist with various Third Party Risk Management program initiatives working closely with the Third Party Risk Management Leads. - Support internal education and best practices sharing with peers and colleagues, as well as third party education & awareness, as needed
About LINC EducationLINC Education (www.linceducation.com), based in Singapore, is a global pioneer in providing high-touch, high-quality educator-led support services to universities around the world. Its specialist services are highly sought after by university managements and faculty to retain and grow their online student enrolments. LINC’s services are customized for each university, and delivered using a cutting-edge technology platform (LINCtrac) to provide a superior and effective learning experience to students.LINC is managed by education sector professionals with more than 30 years of combined experience and overseen by an advisory board of the best academic professionals in the world. Dr. M Rammohan Rao (ex-Dean, Indian School of Business and ex-Director, IIM Bangalore) and Deepak Chandra (Secretary – Education, Rajiv Gandhi Foundation and ex-Deputy Dean, Indian School of Business) are members of the LINC Board of Advisors.Position SummaryAs an experienced Business Faculty Member (LINC Fellow), the candidate will serve students in Masters-level programs studying at premier Australian universities. LINC Fellows will be the single point-of-contact for the unit-in-charge for student academic matters. The role will be part time (15-20 hours per week) with scheduled weekend availability. LINC Fellows will be “actively engaged” when a unit (subject) is assigned. A unit will range from 7 to 14 weeks at a time. LINC Fellows are required to provide 2-3 hrs each afternoon (between noon to 5pm) every day when they are supporting students. Candidate will have flexibility to work from location of his/her convenience. What’s on offer?The role offers a competitive remuneration between INR 30,000-50,000 per month (based on committed weekly time, batch size and experience level of the LINC Fellow) when actively engaged, plus performance-based incentives.The position is based out of Mumbai, Pune, NCR and Bangalore.The professional benefits include: Interacting with high-quality global university faculty Working with a diverse range of international students Developing deeper subject understanding Gaining richer academic exposure Improving interpersonal and cross-cultural skills Desired candidate profile: PG/Doctoral degree with distinction or first-class from a top university in India 5-10 years of corporate experience and/or teaching experience in the fields like Marketing, Finance, Operations, Organization/HR, Data Analytics, Project Management, Strategy and Ethics at a leading university or college (note: at least 1 year formal teaching experience at a university of college is a MUST). Empathetic, ambitious, warm and outgoing personality willing to work closely with people from diverse culture Proficient in English language Must possess a working laptop and have access to high-speed (>2 MBPS) stable internet connection Ability to quickly learn and use technology platforms for interacting with student including host university’s Learning Management System and LINC's technology platform (training on these platforms will be provided) Job Type: Part-timeSalary: ₹30,000.00 to ₹50,000.00 /month
• Design secure solutions in line with the business strategy and security requirements • Contribute to the enterprise security architecture through developing Strategies, Reference Architectures, Roadmaps, Architectural Principles, Technology Standards, Security Non-Functional Requirements, Architectural Decisions and Design Patterns. • Deliver cyber security architectural artifacts such as High Level Designs and Solution Blueprints. • Ensure the enforcement of security requirements in solution architecture • Contribute to educating other architects and engineering teams in designing and implementing secure solutions Technologies The candidate should have knowledge and experience in designing and implementing the following technologies and related domains • Cloud security • Identity and Access Management • Encryption, Masking and Key Management • Data Classification, Data Privacy and Data Leakage Prevention • Infrastructure security (Network/Servers/Virtualization) • Application Security • Endpoint Security • SIEM and Log Management • Forward and Reverse Proxy • Big Data Security • IoT Security • SAP Security (Preferred) Architecture Skills • Solid experience in developing security solution architecture • Solid experience and knowledge in TOGAF and SABSA or other Enterprise Architecture frameworks. • Strong experience in developing architectural artifacts including reference architectures, roadmaps, architectural principles, technology standards, security non-functional requirements, architectural decisions and design patterns • Strong experience in documenting existing, transition and target architectures. Cyber Security Skills • Solid experience in performing security risk assessments and controls implementation • Strong experience in designing and implementing security controls by utilizing the technologies mentioned in the technologies section above • Strong knowledge in offensive and defensive aspects of cybesecurity with solid understanding of attack techniques and abuse cases. • Strong knowledge and implementation experience of cyber security standards, frameworks and regulations such as ISO27001, NIST CSF, CSA CCM, PCI-DSS, GDPR
• Lead development teams in implementation of GRC solutions within ServiceNow platform including: • Policy & Compliance Management • Risk Management • Vendor Management • Audit Management • Perform fit-gap analysis to identify fitment of defined business to the technical capabilities of the ServiceNow platform. Identify level of effort required in customizing the solution to meet the requirements which have been identified as gaps. • Participate in the functional requirement & design workshops and assist in the development of the functional requirements and technical design documents • Coordinate technical tasks and work effort • Act as an escalation point of contact for technical issues and support • Lead the team in the development, unit testing, defect fixing and deployment of update sets. • Assist the project manager in ensuring overall quality of deliverables, alignment to SDLC best practices
• Design and develop typical GRC solutions like risk management (enterprise and information technology risk), compliance management, issue and corrective action plan management, exception management, policy life cycle management, third-party risk management, audit management, threat and vulnerability management, enterprise asset management, and security operations management • Define, enhance, and implement enterprise risk management frameworks based on industry standards and frameworks (e.g., ISO 27001, COSO, COBIT, PCI, NIST, HIPAA, etc.) on GRC technologies, such as RSA Archer. • Assist in gathering and documenting business requirements and identifying gaps within existing systems and processes • Define the architecture and design elements for implementation of GRC solution (including design data/object models, technical workflows diagrams, access control models, etc.) • Lead build/configuration of GRC solutions on RSA Archer as per defined business requirements and design • Lead software development life cycle (SDLC) efforts for successful build, test, and roll-out of GRC solution into production use • Assist in developing GRC governance and operating model for the setup and sustainment of the GRC program
We are looking for Part-time Cuber Security Trainer to train our students at Marathahalli, Bengaluru. Daily morning/evening batches and weekend batches Min 3-7yrs experience in cyber security and other related.
Who you are• An analyst, a Red-Team-Blue-Team thinker, an autodidact, a threat hunter, or a researcher like none other • An always-on Security enthusiast and the go-to for news and views about vulnerabilities and malware, active threats, attack vectors, and zero-days exploited in the wild• An Eagle for detail and spotting the 'known' in the unknown• Passionate about Cyber Security and a believer in defending against the bad guys • Communicator at par in verbal, textual, and graphical mediums • A Bachelor or Master of Engineering or Technology in Computers, Information Science, or Information Technology or a Master of Computer ApplicationsWhat you'll do• Work cross-functionally with Cyber Threat Intelligence and Cyber Security Operations teams to build out our ever-evolving threat intelligence platform• Ideate and define ways to present vulnerability intelligence, preferably via dashboards and reports• Identify factors contributing to higher client-side impact of vulnerabilities and be the domain expert for our impact scoring mechanism• Track and monitor vulnerability lifecycles from zero-day discovery to CVE-ID allocation• Profile and monitor specific cyber threat actors --- including nation-states and hacktivists ---, groups, and campaigns to understand adversarial tradecraft along with tactics, techniques and procedures (TTPs)• [BROWNIES] Clearly communicate findings in written reports in English and visualsWhat you got• Between two and five years’ experience in Cyber Security• Hands-on understanding of vulnerabilities, computer intrusions, malicious code and patching mechanisms for Windows, Linux, and critical apps• Working knowledge and understanding of CVSS v2 or v3 • Proven abilities to associate vulnerabilities with CWEs• Able to analyze network protocols for vulnerability identification • Familiarity with network-based exploitation and its mitigation• Familiarity with Snort and Suricata• [HUGE PLUS] Experience or familiarity with vulnerability assessments
Security Content Developer * As a security content author, this role involves hands on security and compliance stuff. Prior experience with security tools (exploit development, port scanner and so on), scanner (OVAL, SCAP, Nessus, OpenVAS) would be a plus. As a member of security content team, you will be asked to develop and manage the security content, assume the full responsibility towards handling the content quality for the cloud services, with your value added knowledge that comes from your prior experience. You'll be asked to adhere to Redlock standards and procedures while developing the content. * Well known exposure to common vulnerabilities and knowledge on vulnerability common standards such as CVE, CVSS and CCE. * Expertise in authoring/mapping content for various security compliance standards both including regulatory (PCI, HIPAA, SoC2, SoC3, GDPR so on) and standard compliance frameworks such as NIST-800-53, CIS and so on is a must. * This role requires that, you've prior experience and hands on cloud services AWS, Azure and GCP (one of the 3 at least). * Expertise towards remediation of vulnerabilities or compliance (misconfiguration alerts), both via procedural and CLI methods.
We a specialized software product and services development company. Currently, we are looking for smart engineers who are willing to work on blockchain technology and crypto currency.