This is a remote position available for Final Year University students specializing in BSc/Btech or MSc/Mtech in Electronics, Embedded Systems, IOT, or Instrumentation, as well as Freshers and housewives. We welcome passionate students who are eager to learn and enhance their skills to apply for this opportunity. Selected candidates will undergo a technical selection/interview process. Those who are chosen will receive full-time training and grooming in Electronic Design or Embedded Programming over a 6-month period. After completion of the training, they will be absorbed into the workforce or assisted in job placement. For individuals who are not selected, we offer soft skills training, career path guidance, and training with certification guidance. This internship position offers no stipend for a duration of 3-6 months. Upon successful completion, interns will receive a Certificate of Internship. The location for this opportunity is globally remote. If shortlisted, candidates will proceed to the technical selection/interview process. Successful candidates will undergo full-time training and grooming in Electronic Design or Embedded Programming over a 6-month period, leading to job placement assistance. Those who are not selected will receive support in defining their career path and training with certification guidance.,
As an incident responder for one of our Indian clients with operations in 39 countries, you will play a crucial role in coordinating Level 3 Incident Response (IR) activities alongside the internal 24*7 SOC IR team. Your responsibilities will include conducting L3 IR, threat hunting, and digital forensics analysis, as well as identifying and mitigating cyber threats. Furthermore, you will be tasked with preparing and delivering reports and recommendations, and engaging with both internal and external stakeholders. Staying abreast of the latest trends, tools, and techniques in threats, digital forensics, and incident response will be a key aspect of your role. You will be expected to proactively identify and address threats within the organization's network, engage in threat hunting activities, and leverage threat intelligence feeds. Proficiency in analyzing network traffic, understanding various network protocols, and utilizing tools like Wireshark or tcpdump will be essential. In terms of digital forensics, you will be responsible for conducting examinations on various devices and services, utilizing a range of tools and techniques. It will be important to collect, preserve, and document digital evidence in compliance with legal standards. Additionally, you will need to present incident reports and forensic findings, incorporating technical details, recommendations, and lessons learned. To qualify for this role, you should hold a Bachelor's degree in computer science, cybersecurity, or a related field, along with at least 8 years of experience in the cybersecurity domain. Specifically, you should have a minimum of 5 years of incident response experience, 3 years in threat hunting, and 2 years in digital forensics. Proficiency in using various tools related to IR, threat hunting, and forensics is required, as well as knowledge of operating systems, file systems, network protocols, and encryption methods. Possessing relevant certifications such as GCIH, GCTI, GCFE, among others, will be advantageous. This position entails full-time employment with a CTC of INR 25-30 lacs, and the selected candidate must be prepared to join by 28th February. Alternatively, a contract role that transitions to full-time employment within 3 months is also available. The successful candidate should be willing to work on-call and beyond regular business hours when necessary, exhibit the ability to handle complex cases under pressure, and demonstrate excellent communication, analytical, and problem-solving skills.,
This is a remote position. There are internships available for final year university students (BSc/BCA/BTech or MSc/MCA/MTech in computers/cybersecurity) as well as freshers. We welcome passionate students who are willing to learn and hone their skills to apply for this opportunity. You will be working directly with an MSSP entity providing SOC IR services. Shortlisted candidates will have to go through an interview process. Hands-on training will be provided for the SOC L1 role. Post-internship, eligible candidates will be considered for full-time positions (*terms apply). Requirements: - Mandatory expertise in Splunk or ELK Stack Benefits: - Stipend: nil (for 3-6 months) - Certificate of internship - Fees: nil Location options: - Global Remote - Anantapuramu @AIC-SKU office (AP) and onsite (Bengaluru) - Onsite (Dubai),
Role Overview: As an incident responder for the Indian client operating in 39 countries, your primary responsibility will be to coordinate Level 3 Incident Response (IR) activities with the internal 24*7 Security Operations Center (SOC) IR team. This role entails performing L3 IR, threat hunting, and digital forensics analysis, identifying and mitigating cyber threats, preparing reports and recommendations, and collaborating with internal and external stakeholders. You are expected to stay updated on the latest trends, tools, and techniques in the field of threats, digital forensics, and incident response. Key Responsibilities: - Perform incident response activities like containment, eradication, recovery, and reporting following established procedures and best practices. - Review and update SOC playbooks and use cases for threats and emerging risks, collaborating closely with the in-house 24*7 SOC team. - Coordinate with global clients via the Global Client Center (GCC) to respond to security incidents raised by the internal SOC or global clients. - Collaborate with other security teams, IT staff, and external partners to ensure timely and effective response and recovery. - Adopt a systematic approach to proactively identify and mitigate threats within the organization's network. - Engage in threat hunting activities by analyzing data and searching for potential threats based on hypotheses. - Utilize threat intelligence feeds in proactive hunting activities and research Advanced Persistent Threats (APTs) and their Tactics, Techniques, and Procedures (TTPs). - Analyze network traffic, understand network protocols, and utilize tools like Wireshark or tcpdump. - Conduct digital forensics examinations on various devices and services using appropriate tools and techniques. - Collect, preserve, and document digital evidence following the chain of custody and legal standards. - Prepare and present incident reports and forensic findings, including technical details, recommendations, and lessons learned. - Stay updated on the latest trends, tools, and techniques in digital forensics and incident response. Qualifications Required: - Bachelor's degree in computer science, cybersecurity, or a related field. - 8+ years of cybersecurity domain experience with a minimum of 5 years in incident response, 3 years in threat hunting, and 2 years in forensics. - Proficiency in using various tools for IR, threat hunting, and forensics. - Knowledge of operating systems, file systems, network protocols, and encryption methods. - Relevant certifications in incident response, threat hunting, and forensics are preferred. - Willingness to work on-call and beyond regular business hours when necessary. - Excellent communication, analytical, and problem-solving skills.,
 
                         
                    