We are seeking a highly skilled and detail-oriented Documentation Engineer to join our growing technical team. As a key member of our organization, you will play a critical role in ensuring the accuracy, clarity, and completeness of our technical documentation. We are looking for a motivated professional eager to collaborate with our superstar engineering team, work with cutting-edge technologies, and contribute to building world-class platforms and applications that redefine how people engage with cybersecurity. Roles and Responsibility Create, update, and maintain technical documentation, including user manuals, installation guides, and API references. Ensure that all documentation is accurate, up-to-date, and easily accessible to stakeholders. Work closely with development teams to understand technical details and ensure that documentation is comprehensive and up-to-date. Participate in code reviews to identify areas where documentation can be improved. Provide technical writing support to other teams as needed. Collaborate with cross-functional teams to identify and resolve documentation-related issues. Stay current with industry standards and best practices for technical writing, and continuously improve documentation processes and tools.
Role & responsibilities Provide IT Help-Desk support to internal users, including first-level support for hardware, software, and network-related issues. Maintaining Google workspace, Crowdstrike, Vsphere, Slack, Zoom & laptops & network devices. Install, configure, and maintain servers, desktop computers, laptops, peripherals, configuration of firewalls, EDR tools, switches, routers, Wi-Fi, Wi-Fi access points, VPN Checkpoint. Troubleshoot and resolve issues with Windows, macOS, and Linux operating systems, Microsoft Office 365 Suite, and other business-critical software. Assist with the setup and maintenance of printers, scanners, and other office equipment. Support remote users with VPN connectivity and remote desktop access tools. Perform routine maintenance and updates for desktops and laptops, including antivirus updates and patch management. Vendor coordination for the procurement of assets. Flexible for availability as per the need of hour considering working for global company. Maintain inventory of IT assets and ensure accurate records in asset management systems. Provide technical guidance and training to end-users on best practices and new systems. Preferred candidate profile Proven experience (4-6years) in IT support or a similar role. Strong knowledge of Windows, macOS, and Linux operating systems. Proficiency with Microsoft Office 365 Suite and other business-critical software. Experience with hardware installation, configuration, and maintenance. Understanding of networking concepts, including LAN/WAN, VPNs and network troubleshooting. Excellent problem-solving and troubleshooting skills. Strong communication and customer service skills. Go getter, positive and flexible
Role & responsibilities: Create and write strategic, technical, and tactical threat reports by analyzing intelligence data, identifying trends, and providing actionable insights. Collaborate with teams to ensure reports address business and technical needs while staying updated on emerging threats Identification of data sources from Open and Dark web for collection and modelling of Vulnerability and Threat Intelligence feeds Design and architect the data aggregation platform for collection of Threat and Vulnerability Intelligence feeds from open and dark web Analyze collected data to obtain, document and report actionable insights Responsible for new starter assimilation, ensuring appropriate training, mentoring is available for all staff and tracking execution against development plan. Stay abreast of the latest in offensive strategies and cybersecurity defenses, technologies, methodologies, policy, and breaches Identify Zero day and latest exploits, common vulnerabilities, various attack patterns and tactics Preferred candidate profile Good understanding of common vulnerabilities, general attack vectors and attack scenarios Experience in one or more scripting languages such as PowerShell, Bash, and Python is preferred Desire to learn, fostering a growth mindset, and sharing knowledge to others on the team Self-starter with the ability to work independently while supporting a team environment Excellent verbal as well as written communication skills Strong document writing, editing, and proofreading skills with attention to detail An understanding of the cyber security risks associated with various technologies and ways to manage them Seek out new information pertaining to security software developments and the latest trends in cyber threats Must have a positive attitude, good logical analytical skills, and out-of-box thinking