Position: Versa SD-WAN L2 Engineer Location: Delhi No. of Openings: 2–3 Experience Required: 3–6 years Employment Type: Full-time Role Overview We are seeking skilled L2 Network Engineers with hands-on expertise in Versa SD-WAN deployment and support. The ideal candidate should have strong knowledge of Routing & Switching, WAN technologies, and a good understanding of network security concepts. This role involves supporting large-scale SD-WAN deployments, troubleshooting, and collaborating with customer and OEM teams for smooth operations. Key Responsibilities • Deploy, configure, and support Versa SD-WAN edge devices and controllers. • Perform L2 troubleshooting for WAN, LAN, and SD-WAN connectivity issues. • Support routing protocols (OSPF, BGP, static routes) in SD-WAN environments. • Validate and configure security features (firewall rules, ACLs, IPsec tunnels). • Work with client SPOCs to ensure site readiness (rack, power, connectivity). • Perform device staging, ZTP (Zero-Touch Provisioning), and onboarding. • Escalate complex cases to L3 or OEM TAC with complete documentation. • Monitor network health using Versa Director and Analytics dashboards. • Collaborate with NOC and field engineers during rollout and operations. • Prepare and maintain SOPs, MOPs, and deployment checklists. • Provide handover training/documentation to client or internal teams. Required Skills & Qualifications • 3–6 years of experience in Networking / SD-WAN support (L2 level). • Hands-on experience with Versa SD-WAN (deployment & troubleshooting). • Strong understanding of Routing & Switching (OSPF, BGP, VLANs, VRFs, QoS). • Familiarity with network security (firewall policies, IPsec VPN, ACLs). • Experience in data center / branch deployments. • Knowledge of virtualization platforms (VMware ESXi, KVM, Hyper-V) is an advantage. • Good communication skills and ability to coordinate with remote teams. • Certification preferred (any of the following): o Versa Certified SD-WAN (Recommended) o CCNP / CCNA Enterprise o Fortinet NSE / Palo Alto PCNSE (advantage, not mandatory) Soft Skills • Strong problem-solving and analytical mindset. • Ability to work under pressure in client-facing environments. • Documentation and reporting skills. • Willingness to travel for site deployments if required.
Role: Penetration Tester Experience: 2.5+ years Location: Karol Bagh, New Delhi Mode: Work from office Budget: 7-10 LPA Role & responsibilities Conduct full-scope penetration tests (web, network, mobile, cloud, social engineering, physical). Develop custom exploits, tools, and scripts to bypass defenses. Perform Red Team/Adversary Simulation engagements mimicking APT-level threats. Document findings with detailed technical and executive-level reporting. Collaborate with Blue Teams to validate and improve detection and response. Stay ahead of emerging threats, TTPs, and vulnerabilities (e.g., via bug bounty research, CVE analysis). -- Kirti Rustagi kirti.rustagi@siliconcomnet.com
L1 – Third Party Risk Management (TPRM) Analyst Location: Client site, Gurugram Office Work mode: Work from office Budget: 7 LPA Key Responsibilities: Assist in executing third-party/vendor risk assessments as per defined procedures and checklists. Review and validate vendor responses to security and compliance questionnaires (e.g., SIG, CAIQ, ISO 27001) . Collect, track, and organize due diligence evidence (policies, certifications, SOC 2 reports, etc.) from vendors. Identify and document potential security or compliance gaps for review by L2/L3 analysts. Maintain and update the vendor risk register and assessment tracker. Support the remediation follow-up process with vendors and internal stakeholders. Participate in periodic reviews of critical vendors as per risk tiering. Support in preparing dashboards, reports, and audit documentation for management and clients. Coordinate with internal cybersecurity, legal, and procurement teams for vendor onboarding and compliance validation. Required Skills & Qualifications: Bachelor’s degree in Computer Science, Information Technology, or Cybersecurity (or equivalent). 1–2 years of experience in cybersecurity governance, risk management, or audit ). Basic understanding of information security concepts (ISO 27001, NIST CSF, SOC 2, GDPR, etc.). Familiarity with third-party risk management or vendor due diligence processes preferred. Strong communication, documentation, and analytical skills. Attention to detail and ability to follow structured processes and workflows. Good-to-Have: Exposure to GRC or TPRM tools (e.g., Archer, OneTrust, ServiceNow VRM, ProcessUnity, MetricStream). Knowledge of risk assessment methodologies and control frameworks (CIS, NIST, ISO). Basic cybersecurity certification (e.g., CompTIA Security+, ISO 27001 Foundation, or CSA STAR ) will be an added advantage. -- Kirti Rustagi kirti.rustagi@raspl.com
Role: SIEM Architect Engineering Lead - L3 Location : Noida. UP Mode: work from office (24x7) JD: The SIEM Engineering Manager is a senior leadership role within the Cyber Defense Center (CDC) responsible for the technical direction, operational governance, and delivery assurance of SIEM and SOAR capabilities. This role bridges engineering, automation, and AI innovation to support a self-driving, SLA-bound, and AI-augmented SOC. 1. Lead a cross-functional team of SIEM Engineers, SOAR Developers, Automation Leads, Content Writers, and GenAI Developers 2. Define and track delivery KPIs, SLAs, and transformation milestones across all engineering functions 3. Ensure 24x7 operational readiness and L3-level support coverage, including weekends 4. Ensure ingestion pipelines, correlation rules, and detection logic are aligned with threat models and compliance requirements 5. Govern platform health, scalability, and integration with XDR, DLP, and EDR tools 6. Direct the development of playbooks in Azure Logic Apps and other SOAR platforms 7. Collaborate with the Automation Lead to drive hyper-automation and reduce MTTR through intelligent workflows 8.Ensure playbooks are modular, scalable, and aligned with incident response procedures 9. Guide the GenAI Developer in embedding AI agents into SOC workflows for predictive analytics, RCA generation, and incident summarization 10. Oversee the Content Writer in documenting use cases, playbooks, and detection logic 11. Promote the use of Copilot prompts and KQL-based automation in Smart L2 operations 12. Participate in governance forums and transformation workshops with client stakeholders 13. Support audit, compliance, and risk management initiatives by ensuring traceability and documentation of all engineering activities 14. Act as an escalation point for critical incidents and influence OEMs for rapid resolution " -- Kirti Rustagi kirti.rustagi@raspl.com
Role: Email Security SME (Microsoft Defender for O365) Company: Silicon Comnet Pvt. Ltd. Location: Noida, India Mode: Work from office Notice: Immediate to 15 days Max. JD: Lead the investigation of high and critical severity email security incidents flagged by Microsoft Defender for Office 365 (MDO). Correlate alerts across Defender XDR (including Defender for Endpoint, Identity, and Cloud Apps) to build a complete incident storyline. Use automated investigation and response (AIR) playbooks to identify impacted entities and take containment actions such as: - Soft-deleting malicious emails. - Removing suspicious inbox rules. - Blocking sender domains or URLs Perform forensic analysis of phishing, spoofing, and business email compromise (BEC) attacks. Document root cause analysis (RCA) and lessons learned for each incident Identify gaps in detection logic and recommend improvements to SIEM and SOAR teams. Support in Providing recommendation for fine-tuning MDO policies such as anti-phishing, anti-spam, and safe links/safe attachments. Collaborate with Microsoft Premier Support for platform-level bugs or advanced troubleshooting Engage with the Microsoft DART team when sanctioned by the customer for deep-dive investigations Update incident status in ServiceNow tool and ensure timely communication with stakeholders Participate in CSIRT bridges and coordinate with customer Cyber Defense teams and Rapid Response Teams (RRTs) Contribute to weekly/monthly dashboards and SLA/KPI reporting Implement learnings from past incidents to prevent recurrence Participate in quarterly tuning sessions and transformation workshops Email - kirti.rustagi@siliconcomnet.com
Job Title: L1 – Third Party Risk Management (TPRM) Analyst Location: In-office (with travel to client sites) Reports To: TPRM Manager – Cyber Risk & Compliance Budget: 50-60k CTC/month Key Responsibilities: • Assist in executing third-party/vendor risk assessments as per defined procedures and checklists. • Review and validate vendor responses to security and compliance questionnaires (e.g., SIG, CAIQ, ISO 27001). • Collect, track, and organize due diligence evidence (policies, certifications, SOC 2 reports, etc.) from vendors. • Identify and document potential security or compliance gaps for review by L2/L3 analysts. • Maintain and update the vendor risk register and assessment tracker. • Support the remediation follow-up process with vendors and internal stakeholders. • Participate in periodic reviews of critical vendors as per risk tiering. • Support in preparing dashboards, reports, and audit documentation for management and clients. • Coordinate with internal cybersecurity, legal, and procurement teams for vendor onboarding and compliance validation. Required Skills & Qualifications: • Bachelor’s degree in Computer Science, Information Technology, or Cybersecurity (or equivalent). • 1–2 years of experience in cybersecurity governance, risk management, or audit). • Basic understanding of information security concepts (ISO 27001, NIST CSF, SOC 2, GDPR, etc.). • Familiarity with third-party risk management or vendor due diligence processes preferred. • Strong communication, documentation, and analytical skills. • Attention to detail and ability to follow structured processes and workflows. Good-to-Have: • Exposure to GRC or TPRM tools (e.g., Archer, OneTrust, ServiceNow VRM, ProcessUnity, MetricStream). • Knowledge of risk assessment methodologies and control frameworks (CIS, NIST, ISO). • Basic cybersecurity certification (e.g., CompTIA Security+, ISO 27001 Foundation, or CSA STAR) will be an added advantage. Email - kirti.rustagi@siliconcomnet.com
Role: Penetration Tester Experience: 2+ years Location: Karol Bagh, New Delhi Mode: Work from office (Alternate Saturdays working) Budget: 7-10 LPA CEH (Certified Ethical Hacker) — Mandatory. Note : Post interview there will be a technical hands on lab round as well Key Responsibilities • Perform comprehensive penetration tests on web applications, APIs, mobile applications, networks, cloud platforms, and infrastructure components. • Conduct vulnerability assessments, exploit validation, and security risk analysis. • Simulate real-world attack scenarios to evaluate security posture. • Prepare clear and detailed penetration testing reports, including proof-of-concepts, risk ratings, and remediation guidance. • Collaborate with development, DevOps, and security teams to validate fixes and support remediation. • Continuously research new vulnerabilities, exploit techniques, and security toolsets. • Assist in improving internal methodologies, tools, and automation processes. Required Qualifications • Minimum 2 years of experience in penetration testing or offensive security roles. • Strong understanding of OWASP Top 10, MITRE ATT&CK, common exploit techniques, and secure coding principles. • Practical experience using tools such as Burp Suite, Metasploit, Nmap, Wireshark, Nessus, SQLMap, and Kali Linux toolset. • Hands-on experience in manual testing, exploit development basics, and writing custom scripts (Python, Bash, or PowerShell). • Ability to analyze system weaknesses and present findings clearly to technical and non-technical stakeholders. Preferred Skills • Experience with cloud platforms (AWS, Azure, GCP) offensive testing. • Knowledge of Active Directory attacks and lateral movement techniques. • Certifications such as OSCP, eJPT, eWPT, eCPPT are a plus. • Exposure to CI/CD pipeline security and DevSecOps concepts. Email - kirti.rustagi@siliconcomnet.com