Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
0.0 years
0 Lacs
india
On-site
About Cyble: Cyble is revolutionizing the landscape of cybersecurity intelligence. Founded in 2019, Cyble began as a visionary college project and has quickly transformed into a leading force in proactive cyber threat detection and mitigation, that is now globally significant, with people in 20 countries - Headquartered in Alpharetta, Georgia, and with offices in Australia, Malaysia, Singapore, Dubai, Saudi Arabia and India Our mission: To provide visibility, intelligence and cybersecurity protection using cutting-edge advanced technology, giving enterprises a powerful advantage. We democratize real-time intelligence about cyber threats and vulnerabilities, enabling organizations to take proactive measures and maintain robust cybersecurity. We strive to make the digital world a safer place for everyone. At Cyble, artificial intelligence (AI) and innovation are central to all operations, with a commitment to continuous improvement and excellence in both products and business practices. Cyble values inclusivity, offering team members autonomy and flexibility to balance their professional and personal lives. Cyble fosters a culture where employees voices are heard, contributions are recognized, and everyone is encouraged to be part of something extraordinary. About the Role: As the Dark Web Analyst , you&aposll monitor dark web and underground channels to detect cyber threats, analyze threat actor behaviors, and support intelligence operations. You&aposll conduct in-depth cybercrime investigations, produce analytical reports, and collaborate globally. The role demands expertise in OSINT, cyber tradecraft, and threat intelligence tools, along with flexibility for 24x7 shift work across global time zones. What You&aposll Do At CYBLE: Proactively discover, monitor, and triage underground forums, dark web marketplaces, instant messaging channels, and social media platforms to identify potential cybercrime or threat activities. Analyse potential cybercrime activities to detect serious threats and research emerging trends. Proactively track activities of financially motivated threat actors, state-backed threat actors and actors targeting a clientele or a prospect region. Conduct threat research to identify motivation, goals, targets, capabilities, and modus operandi (tactics, techniques, and procedures) of the cyber threat actors and groups using conventional and unconventional threat intelligence methods. Collate threat research findings and assessments into deliverables for dissemination of timely intelligence. Provide incident management and threat research support to clientele. Provide research and intelligence support with respect to internal and external ad-hoc requests. Collaborate with global teams for information exchange and joint research. What Youll Need: Mandatory Work Requirements: Must be able to work during either Indian Standard Time or United States Time Zones (Pacific Standard Time, Central Standard Time, Eastern Standard Time) Willing to work in rotating shifts and weekends to support 24x7 operations (Days-off during weekdays) Skills and Qualifications Required: Excellent understanding of cyber security concepts, modern threat landscape and intelligence framework. Good knowledge in cybercrime methodologies and TTPs opted by the financially motivated and state sponsored threat actors and groups. Experience in cyber tradecraft and online persona management (sock puppets) for gathering closed sources information from the underground forums. Experience in open-source intelligence (OSINT) research. Experience in writing analytical and intelligence reports. Experience in handling investigations on the given artifacts or IoCs related to malicious campaigns such as phishing, ransomware, financial frauds. Experience in investigating and analysing suspicious IP addresses, domains, and malicious infrastructure. Hands-on experience in Maltego, Shodan, Google Earth, Whois, Search Engines, VirusTotal or other OSINT tools for relevant investigations. Good understanding of MITRE ATT&CK framework. Good understanding of operational security (OPSEC). Good in verbal communication and writing skills. Understanding of vulnerability assessment & penetration testing (VAPT) methods and red-teaming tools. A passionate individual, self-starter with ability to drive independent research. Other Desirable Qualifications: Former experience in law enforcement operations, or experience in supporting intelligence operations. Credible cyber security certification (CompTIA Security+, CISSP, or equivalent) is a plus. Optional Qualifications: Experience in malware research and reverse engineering. Understanding of geopolitical matters and intelligence aspects. Multilingual Proficiency Mandarin/Spanish/French/Arabic. If you like working in an inclusive environment, you want to advance your career quickly, and your opinion is valued, look no further than Cyble, Inc. We are young, hungry, and ready to impact the cyber security landscape! Cyble, Inc. takes into consideration an individuals skillset, experience and location in making final salary determination. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected Veteran status age, or genetics, or any other characteristic protected by law. Show more Show less
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
hyderabad, telangana
On-site
You will be joining RSM, a leading provider of professional services to the middle market globally, with a focus on instilling confidence in a world of change and enabling clients and employees to achieve their full potential. The exceptional team at RSM creates an inclusive culture that values talent and provides a compelling experience for clients. As an associate in Risk Consulting in Hyderabad, Telangana, you will play a key role in supporting ongoing security operations for RSM clients across various industries and locations. Your responsibilities will include investigating security incidents using tools such as SIEM, automation, and cybersecurity technologies like ServiceNow, Stellar Cyber, Hyas Insight, and DNS Protect. You will analyze and escalate critical security incidents, improve existing processes, and challenge procedures in an agile and fast-paced information security environment. Additionally, you will process IDS alerts, perform vulnerability scans, conduct malware analysis, and handle incident intake and reporting of cyber events and threat intelligence. To excel in this role, you should have a minimum B.A. or B.S. degree in computer science, information technology, or a related field, along with 3-5 years of experience in a security operations center or threat intelligence capacity. Possessing a security industry certification such as CYSA+, Security+, CISSP, or SANS GIAC is preferred. A strong understanding of security standards, compliance frameworks, and best practices, including SSAE 16, SOC 2, SOC3, OWASP Top 10, and NIST, is essential. You should also have a curious mindset, basic knowledge of cloud technologies, and experience with operating systems like Windows and Linux. At RSM, we offer a competitive benefits and compensation package, along with flexibility in your schedule to help you balance work and personal life. If you are passionate about cybersecurity and enjoy working in a collaborative team environment, this opportunity to join RSM's Risk Consulting team in Hyderabad, Telangana, may be the perfect fit for you. Apply now to be a part of a dynamic and inclusive organization where your skills and expertise will be valued and nurtured.,
Posted 1 month ago
10.0 - 14.0 years
0 Lacs
karnataka
On-site
As a Consultant (CSM) at CYFIRMA, you will play a crucial role in customer onboarding, technical support, account escalations, customer renewals, upsell campaigns, and establishing customer support practices. Your primary responsibility will be to ensure new customers are efficiently onboarded to CYFIRMA's products and services, guiding them to realize ROI promptly. In this role, you will need to have a deep understanding of CYFIRMA's product and service offerings to provide technical support and training to customers. Your focus will be on educating customers on the flexibility and capabilities of CYFIRMA's solutions, aligning them with their business needs and plans. Additionally, you will handle account escalations, ensuring timely responses to alerts, red flags, or feedback reported by customers. Moreover, you will be responsible for customer renewals, driving upsell campaigns to increase the lifetime value of CYFIRMA's customers. Periodic health checks of customer accounts will be necessary to ensure customer engagement and satisfaction. You will collaborate with international teams to enhance research, service operations, and platform development. To excel in this role, you should have at least 10 years of experience in managing customers and accounts in the cybersecurity domain. Proficiency in customer service practices, technical aptitude to learn CYFIRMA's offerings, and familiarity with OSINT or security analysis tools are essential. Knowledge of IT networking, internet technologies, firewalls, and cybersecurity tools, along with experience in CRM software like Salesforce, will be beneficial. A bachelor's degree in computer science or a related field is required, along with proficiency in the Microsoft Office Suite. Excellent communication skills in English, both written and verbal, are necessary as this role involves client-facing interactions remotely. Holding security certifications such as GCTI, CHFI, CEH, Security+, etc., will be an additional advantage. Join CYFIRMA's dynamic team as a Consultant (CSM) in Bangalore, and contribute to enhancing customer success through effective onboarding, support, and relationship management in the cybersecurity industry.,
Posted 1 month ago
3.0 - 5.0 years
13 - 17 Lacs
Hyderabad
Work from Office
We are seeking analyst level individuals with experience working in the field of cybersecurity and a desire to help organizations improve their operations to join our team and help run the ongoing security operations for RSM clients in a variety of industries and geographic locations. Successful candidates will have working knowledge in some or all these areas IT operations, security monitoring, active directory, IP networking and various cloud technologies. Position and Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols
Posted 1 month ago
1.0 - 3.0 years
54 - 72 Lacs
Gurugram
Work from Office
Gather & analyze OSINT from social media, forums, dark web Use tools like Maltego, Shodan, Recon-ng Support investigations & risk assessments Collaborate with security & law enforcement teams Prepare intelligence reports & improve methods
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |