Posted:3 weeks ago|
Platform:
Work from Office
Full Time
A total of 8 years of professional experience, including 5 years in Security Operations Center (SOC) operations and 3 years in Cyber Threat Intelligence (Surface, Deep Dark Web). Mandatory hands-on experience with at least one Digital Risk Protection(Brand Intelligence Platforms) (eg, RecordedFuture, GroupIB, Mandiant, CrowdStrike Falcon Intelligence (Recon+, Elite), Zerofox, Intsights, Cyble, Cloudsek, Cyfirma, SocRadar, Digital Shadows). Mandatory hands-on experience with at least one Threat Intelligence Platform (TIP) (eg, ThreatConnect, Anomaly, ThreatQuotient, Cyware, Palo Alto TIM). Knowledge on Attack Surface Management tools like Bitsight, Security scorecard, etc Excellent written and verbal communication skills for report writing and stakeholder presentations. Ability to identify, track, and analyze emerging cyber threats, threat actors, and attack vectors relevant to the organizations industry and environment. Proficient in analyzing suspicious files/sandboxing using tools such as VirusTotal, Hybrid Analysis, Cuckoo, Any.run, Intezer, and Joe Sandbox. Expertise in monitoring and analyzing threat intelligence across various sources, including Open Source Intelligence (OSINT), Deep Dark Web forums, commercial and open-source threat feeds, and security vendor reports. Strong understanding of cyber threat actors, tactics, techniques, and procedures (TTPs), leveraging frameworks such as MITRE TelecommunicationCK, Cyber Kill Chain, Diamond Intrusion Model, and CREST Cyber Threat Intelligence Framework. Skilled in analyzing vulnerabilities and exploits that are actively used and providing insights for patching and mitigation efforts. Capable of monitoring cyber threat landscapes, including geopolitical developments and threat actor activities. Experience in preparing and presenting intelligence reports related to threat trends, zero-day vulnerabilities, and supply chain attacks to stakeholders, highlighting significant threats and recommended actions. Ability to produce actionable intelligence reports, threat briefs, and strategic assessments to inform leadership and technical teams. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Cyber Threat Intelligence (GCTI) are preferable. Secondary Skills Knowledge of various malware mitigation strategies, including prevention, detection, removal, recovery, and response. Familiarity with query structures such as Regular Expressions, YARA and SIGMA rules, AQL, and KQL. Basic understanding of programming languages, specifically Java and Python. Preferred knowledge of Malware Analysis Techniques: Static Dynamic analysis, code analysis, behavioral analysis, and forensic analysis. Understanding and knowledge of different security technologies like SOAR, Attack Surface Management, Web Application Firewalls (WAF), DNS, DMARC, and Vulnerability Management. Knowledge of Threat Hunting and Digital Forensics and Incident Response (DFIR) is preferable. Tertiary skills Automation Any other skills required Strong analytical and problem-solving skills, Proactive approach, self-motivated Domain Cyber Sec
Clifyx Technology
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
My Connections Clifyx Technology
10.0 - 15.0 Lacs P.A.
10.0 - 20.0 Lacs P.A.
25.0 - 30.0 Lacs P.A.
New Delhi, Pune
6.0 - 16.0 Lacs P.A.
Chennai
12.0 - 14.0 Lacs P.A.
Mumbai
Experience: Not specified
4.0 - 5.0 Lacs P.A.
Chennai
7.0 - 12.0 Lacs P.A.
Experience: Not specified
2.0 - 5.0 Lacs P.A.
15.0 - 20.0 Lacs P.A.
0.5 - 1.0 Lacs P.A.