Overview:
About Cyble:
We are a SaaS Cyber Security company who is growing at tremendous rate and seeking people with limitless passion, a relentless focus on innovation and a non-stop commitment to the customer. Cyble, Inc. is committed to cultivating an inclusive culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Come join the team and be a part of something great!
Responsibilities:
What You'll Do:
Proactively discover, monitor, and triage underground forums, dark web marketplaces, instant messaging channels, and social media platforms to identify potential cybercrime or threat activities.
Analyse potential cybercrime activities to detect serious threats and research emerging trends.
Proactively track activities of financially motivated threat actors, state-backed threat actors
and actors targeting a clientele or a prospect region.
Conduct threat research to identify motivation, goals, targets, capabilities, and modus
operandi (tactics, techniques, and procedures) of the cyber threat actors and groups using
convenDonal and unconventional threat intelligence methods.
Collate threat research findings and assessments into deliverables for dissemination of timely
intelligence.
Provide incident management and threat research support to clientele.
Provide research and intelligence support with respect to internal and external ad-hoc
requests.
Collaborate with global teams for information exchange and joint research.
Qualifications:
What You'll Need:
1-5 years of experience
Willing to work in rotating shifts and weekends to support 24x7 operations (Days-off during
weekdays)
Excellent understanding of cyber security concepts, modern threat landscape and intelligence
framework.
Good knowledge in cybercrime methodologies and TTPs opted by the financially motivated
and state sponsored threat actors and groups.
Experience in cyber tradecraft and online persona management (sock puppets) for gathering
closed sources information from the underground forums.
Experience in open-source intelligence (OSINT) research.
Experience in writing analytical and intelligence reports.
Experience in handling investigations on the given artifacts or IoCs related to malicious
campaigns such as phishing, ransomware, financial frauds.
Experience in investigating and analysing suspicious IP addresses, domains, and malicious infrastructure.
Hands-on experience in Maltego, Shodan, Google Earth, Whois, Search Engines, VirusTotal or other OSINT tools for relevant investigations.
Good understanding of MITRE ATT&CK framework.
Good understanding of operational security (OPSEC).
Good in verbal communication and writing skills.
Understanding of vulnerability assessment & penetration testing (VAPT) methods and red-teaming tools.
A passionate individual, self-starter with ability to drive independent research.
Pay Range: INR 800,
- 00 - INR 1,400,000.00 /Yr.