Safeguards information system assets by identifying and solving potential and actual security problems.
Recognizes problems by identifying abnormalities; reporting violations.
Working to provide IT and cyber security services to ensure safety and security.
Support and contribute to security initiatives as required.
Working with critical cyber security solutions like SIEM, PAM, DLP, VAPT Tools, Endpoint, Server Security, Email Security and other solutions.
Working closely with customer for showcase cyber security solutions and services.
Working closely with the customer for installation, deployment and support services.
Conducting VAPT and other cyber security services.
Training and knowledge transfer to our customers.
Experience with vulnerability scanning solutions
Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security
In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk)
Experience developing and deploying signatures (e.g. YARA, Snort, Suricata, HIPS)
Familiarity with the DOD Information Assurance Vulnerability Management program.
Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware technology, and Unix and basic Unix commands
Employment Status
Full-time
Educational Requirements
Bachelor degree in IT or similar discipline
Master’s degree in Cyber Security or similar discipline
Preferred Professional Certification: CEH, Security+, SOC Analyst, CCNA Security etc
Experience Requirements
7 year(+)
The applicants should have experience in the following area(s):
LDAP/Active Directory, Application Security, Cyber Security, Endpoint Security, IT Security, IT System Management, Kali Linux, Network Engineer/ Network Administrator, Penetration testing, VAPT
The applicants should have experience in the following business area(s):
Computer Hardware/Network Companies, ISP, IT Enabled Service, Technical Infrastructure
Additional Requirements
Age at most 42 years
Results-oriented, tenacious, self-starter who strategically plans for success.
Ability to influence and manage challenging situations through successful resolution and deliver results under pressure.
Understanding of fundamental IT concepts with good ideas about IT and Cyber Security.
Logical thinking capability with time management and prioritization skills.
Ability to work both independently and cooperatively as part of a team.
Self motivated, autonomous and able to work independently.
Effective team player with ability to build and maintain positive relationships.
Strong technical and positive attitude.
Application Security, IT Security, Kali Linux, metasploit, Network Security, PCI DSS, Penetration testing, Forensics, IT Audit, OWASP