Home
Jobs

101 Osint Jobs - Page 4

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 15.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Job Summary The Director, TSG Information Security, Cyber Threat Management is a position within Bain's Cyber Security Department, whose mission is to define and enable strategies to safeguard the digital assets and integrity of the organization. In this role, the Director understands how security measures align with the overall organizational strategy and will begin to organize and lead in the development and implementation of security controls that adhere to regulatory requirements and best practices. The Director combines a strong level of technical and managerial skills and business alignment to build and guide a growing team and resources across a spectrum of capabilities. The position primarily focuses on the efficient, effective and reliable resolution of Bain's defensive strategy as well as focuses on improving our offensive strategy to help the company meet its overall business objectives. The position therefore must have the technical skills to troubleshoot and resolve complex issues as well as excellent communication and upward management. These measures require taking a leadership position in coordinating activities across the team working with Technical, IT and Cybersecurity leadership. The Director role has expertise and experience in multiple disciplines, including Threat Intelligence programs, Detection and Deterrence systems, Threat Exposure Management, Incident Response, Forensics and Evidence gather and Pro-Active Security probing capabilities (Red/Blue/Purple teaming & Penetration Testing). Principal Accountabilities Monitoring & Detection • Oversee and strategize on developing advanced security monitoring, analysis, and correlation platforms to detect cybersecurity events. • Direct cross-functional efforts in the identification and in-depth analysis of sophisticated security threats, including malware, APTs (Advanced Persistent Threats), and targeted attacks. • Enable a wide range of security tools and technologies, including SIEM, IDS/IPS, or next gen/advanced threat detection solutions. • Partner with organizations and vendors to identify and integrate new data sources. Incident Response & Analysis • Oversee the ongoing management and evolution of security runbooks and champion for ongoing automation or AI/ML based technologies to increase speed/efficiency. • Strengthen Bain’s capability in-depth log analysis, data correlation, and forensic investigations to identify root causes of incidents and improve security measures. • Provide strong and clear communications on cyber events and situations with sr. leadership. • Ensure alignment in security policies and practices adhere to industry standards and compliance requirements and oversee the validation of the controls. • Serve as a subject matter expert in security discussions and decision-making and enable and grow team members skills and experience. • Work with the primary goal of building efficiencies in Cyber Threat Management responses and driving down MTTR and reducing overall risk. Threat Intelligence • Enable a threat intelligence capability, including open-source intelligences (OSINT), dark web forums, and industry reports to drive awareness and improvement in our defensive posture. • Utilize threat intelligence platforms and tools to aggregate and correlate threat data. • Drive coordination with intelligence and incident response teams to investigate and analyze security incidents. • Develop and refine threat intelligence methodologies and tools. • Stay current with industry best practices and new methodologies to enhance the teams capabilities. Vulnerability Management & Threat Exposure Management • Work cross-functionally across IT teams and provide leadership and guidance in mitigating threats to Bain. Serve as a subject matter expert in security discussions and decision-making. • Build processes to enable regular vulnerability scans on the organization's network, applications, and systems using industry-standard tools Pro- Active Security Testing • Experience implementing and operationalizing vulnerability management tools, processes, and best practices. • Oversee the classification and prioritization of vulnerabilities based on risk and potential impact. • Stay informed about emerging trends and technologies in cybersecurity. • Work collaboratively with other security team members, IT departments, and relevant business units to address security concerns and enhance overall security posture. Pro- Active/Enhanced Security Testing • Partner with colleagues to expand controlled penetration testing technologies and capabilities on networks, applications, and systems to identify security vulnerabilities. • Investigate and keep up to date with changes in tooling and advanced attacks in network, cloud and application testing. • Analyze and interpret results to identify potential risk as well as evaluate potential impact. • Red Team, Blue Team, Purple team exercise leadership experience. Professional Development and Innovation • Stay informed about emerging trends and technologies in cybersecurity. • Drive collaboration and defensive standards/expertise across Bain, working with other security team members, IT departments, and relevant business units to address security concerns and enhance overall security posture. • Explore Professional Certifications and work with leadership to plan trainings. Knowledge, Skills, and Abilities Security Monitoring & Incident Detection and Response • Strong knowledge of Splunk (or other SIEM tools),CrowdStrike or equivalent EDR/MDR platforms, Windows Defender, Palo Alto Networks, Other AV/EDR tool configuration, Cyberhaven (or other DLP tools) • Knowledge of Vulnerability & Attack Surface Management toolsets, Threat Intelligence and Analysis tools, Vendor technical Risk Scoring tools, Deception technologies • Knowledge of ticketing, triage and forensics capabilities and toolsets General Skills • Great communication skills, with the ability to document and explain technical information clearly. • Analytical mindset, with a focus on learning and problem-solving. • Ability to work independently and well in a team, showing strong interpersonal skills. • Eagerness to learn and adapt to new challenges in cybersecurity. • Entrepreneurial spirit, open to trying new approaches and learning from them. Team Management • Drive and expand the training and professional development of Security Operations staff. Qualification and Experience Bachelor's degree in a related field (e.g., Computer Science, Cybersecurity, Information Technology) or an equivalent combination of education, training, and experience 10-15 years of relevant experience Experience with Information Security technologies (Firewall, IPS, IDS, SIEM, EDR, CASB, AV, DLP, etc.) Experience with common information security controls frameworks (i.e. ISO, NIST, CIS, or CSA) Global company or equivalent Experience deploying systems or applications Ability to work independently and with teams on complex problems Complex problem solving Ability to work in a fast paced, dynamic environment. Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Hyderābād

On-site

GlassDoor logo

Geo Risk Intel Investigation Ops JDs Summary We want to hire specialists to support investigations with additional HC to come onboard in 2024. Locations should be in HYD with WFO as a mandatory requirement. At a high-level we are looking for candidates demonstrating the ability to independently conduct investigative work using commonly available tools, with strong domain expertise. They should possess strong critical thinking mindset , investigative skills as well as exceptional report writing skills to report the findings accurately and efficiently Roles and Responsibilities Conduct independent research based on direction provided by PgM and the project team to identify modus operandi, bad actor archetypes and abuse vectors/TTPs Provide key insights reports on abuse trends based on Independent assessment of abuse trends Specific research methodology prescribed as a part of project plan Regularly report on progress in OSINT investigations and provide feedback candidly Identify novel abuse trends through research and analysis General Qualifications Minimum qualification of graduation from a government recognized university Minimum tenure of 36+ months working as a abuse / fraud/crime investigator or investigative analyst Excellent written and verbal communication skills Critical thinking ability to conduct independent investigative work Ability to solve problems using a data driven approach Ability to maintain composure in challenging situations Proven ability to work with sensitive information and to follow procedure when operating in a sensitive space Profile - CyberCrime Investigations Background Must have skills Past experience in investigating abuse / financial crimes Experience in fraud analytics Very strong written communication skills Proven track record or writing reports consumed at executive level (structured writing and report building) Good to have skills Data driven approach to answering questions Past experience conducting open source intelligence research Highly proficient in using tools commonly available online for research Skilled at synthesizing information from various sources and determining the key takeaways Past experience in OSINT / Abuse Investigative tools Past experience using corporate registries / reviewing public databases to identify individuals / companies behind an activity Past experience synthesizing open source intelligence research Location Only WFO and in line with the overall Service Delivery Strategy HYD #LI-VS5

Posted 4 weeks ago

Apply

5.0 years

5 - 7 Lacs

Gurgaon

On-site

GlassDoor logo

Gurugram · Full-time · Intermediate About The Position Snowbit is a cybersecurity technology innovator with a vision to empower organizations across the globe to quickly, efficiently, and cost-effectively ready themselves to address omnipresent cyber risk. Towards this end, Snowbit, built off years of Israeli cybersecurity experience, offers the broadest managed detection and response offering available today. Snowbit is part of the Coralogix group. Coralogix is rebuilding the path to log observability by offloading the burden of indexing and providing deep insights to accumulated data, at an infinite scale, for less than half the cost. We are seeking a highly skilled and experienced Dark Web Monitoring Specialist to join our cybersecurity and threat intelligence team. The ideal candidate will have a minimum of five years’ experience in threat hunting, with a strong focus on deep and dark web surveillance. You will be responsible for proactively identifying risk indicators and exposure vectors associated with customer domains, user credentials, leaked data, and organizational assets. This role is critical in supporting our mission to protect sensitive data and mitigate cyber threats before they impact our clients or our organization. Key Responsibilities Perform ongoing deep/dark web monitoring for targeted customer domains and related assets. Identify and analyze exposed credentials, PII, financial data, intellectual property, and insider threats. Use OSINT, darknet tools, and commercial threat intelligence platforms (e.g., Recorded Future, Flashpoint, Cybersixgill) to gather actionable insights. Develop and execute targeted threat hunting campaigns based on domain-specific queries. Assess exposure and risk vectors including forums, marketplaces, chat platforms (e.g., Telegram, Discord), and data breach dumps. Correlate findings with internal and external threat models to assess impact and recommend mitigations. Produce detailed intelligence reports and risk assessments for internal and client stakeholders. Work with incident response and SOC teams to provide context and enrichment to investigations. Maintain ethical, legal, and privacy standards while accessing and analyzing darknet content. Requirements Minimum 5 years of experience in cyber threat intelligence, dark web monitoring, or related field. Hands-on experience navigating Tor, I2P, and other darknets. Strong understanding of cybercrime ecosystems, fraud tactics, and underground communication channels. Proficiency in Python, scripting, or data extraction tools to automate monitoring workflows. Familiarity with threat intelligence standards (STIX/TAXII) and frameworks (MITRE ATT&CK, Kill Chain). Ability to link indicators of exposure (IOEs) with business risk across various threat landscapes. Excellent analytical writing and communication skills. Strong attention to detail and ability to handle sensitive data securely. Preferred Qualifications Certifications: GIAC Cyber Threat Intelligence (GCTI), CEH, or OSINT-related certifications. Experience working in MSSPs or with high-risk, regulated industries (e.g., finance, healthcare). Knowledge of malware marketplaces, ransomware operations, and credential theft patterns. Why Snowbit? Unique Culture: We recruit people based on our motto - Hungry, Humble, Smart -in that order, necessarily! The people who work in Coralogix and the people we are always looking to hire are hungry (highly motivated), humble (always ready to learn new things), and smart (learn and implement things quickly) Impactful Work: We provide our employees with the chance to make a significant impact on the company's growth and success. As part of a small team, your contributions can have a direct and noticeable effect on the company's outcomes, allowing you to see the tangible results of your efforts. Learning and Growth: Our fast-paced and dynamic environments provides ample opportunities for personal and professional growth as you acquire new skills, expand your knowledge base, and gain valuable experience across different areas of the business. Autonomy and Ownership: We provide our employees with a greater level of autonomy and decision-making authority. You have the opportunity to take ownership of projects and make independent decisions. This level of responsibility can be empowering and allows you to develop leadership skills.

Posted 4 weeks ago

Apply

1.0 years

0 Lacs

Delhi

On-site

GlassDoor logo

1.JOB PURPOSE Analyze risk and assist the Supervisor to improve in securing sensitive information for DMI Group; Needs to work with different teams across the group to identify and correct flaws in the company’s security systems, solutions, and programs while recommending specific measures that can improve the company’s overall security posture; Gather information about ‘attack surface’ along with creation of offensive security metrics to defend the loopholes. 2.PRINCIPAL ACCOUNTABILITIES 1.Performing Test & Analysis w.r.t Cybersecurity & IT Evaluate Gap analysis, Risk Assessment and Test available control. Assess Vulnerability assessment (VA)/ Penetration Testing (PT) of Cloud and in premise network, servers, and endpoint devices. Gather information on incident, document RCA, keep a track of no. of RCAs and their action plans. Increase Continuous up-dation of company’s incident response and disaster recovery plans. 2.Reporting Generate reports post bug identification. Generate report on Risks identified and controls required. Report operational issues and violations. 3.Automation and Monitoring Conduct, review, and monitor automation of Security controls on the cloud Identify and document critical infra, customer data and security around the same. 4.Audit & Compliance Assist in Audit and certification w.r.t ISO, Cloud Security, Defensive and Offensive security. Create yearly audit calendar and necessary trails for compliance 3.SKILLS AND KNOWLEDGE a) Qualifications § Minimum Qualification required: Any Graduate Technical certification: CEH, Understanding of ISO, Cloud Security. Work Experience Minimum 1 years of experience Consulting / BFSI exposure is preferred. VA/PT, Forensics, AWS Cloud Security, API Testing, OSINT, Open-Source Monitoring Tools like Kali, Mobile Application Testing & API Testing Communication skills Collaboration skills

Posted 4 weeks ago

Apply

5.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Job Description About KPMG in India KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada. KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment. i. BE/B. TECH/BCA/B.SC/M.SC/MCA/M. Tech-(Computers/Electronics/IT) ii. Minimum one certification such as CEH/CPTC/OSCP/ECSA/CEPT and/or equivalent. iii. Having at least 5+ years of post-qualification relevant work experience including appearance before court of law while presenting the extracted cyber evidence. iv. Experience of managing large scale digital evidence media. v. Comprehensive knowledge on forensic digital device data preservation, acquisition, analysis and documentation. vi. Experience in-depth practical knowledge on Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations. vii. Experience in handling real-life cyber- crime cases would be preferred. viii. Experience in investigation on Web Defacement/Site Down activities ix. Experience in investigation of Email and VOIP call Analysis and trace Down Methods. x. Experience in investigation on Web SMS/Image/Reverse Image/Video Source tracing methods. xi. Experience in practical knowledge multiple enterprise and open source which have industry benchmark. xii. Experience in comprehensive knowledge on System, Mobile Forensics, Internet Forensics, Cloud Forensics, CC Footage/AV Forensics, Database Forensics, Network Forensics, Malware Forensics, Stegano and Crypto Forensics, Memory Forensics, UAV Forensics and /or other variety of Forensic formats. xiii. Experience in-depth practical knowledge on Malware Forensics, Memory Analysis, Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations, Advanced persistent threats (APTs), Sophisticated analysis of malware, cyber security incident (Packet tracing, Web Logs, taking a copy of the mail store and aggregated log analysis), performing threat modeling, and producing intelligence threat assessments. xiv. Experience in practical knowledge on multiple enterprise, open-source tools, Static and Dynamic Malware Analysis Tools. xv. Experience in generating forensic documents for case investigation. xvi. Graduation from premier institutes (IITs, NITs, NFSL, IIIT, etc.) shall be preferred. xvii. Bug-bounty program winners will be preferred. Equal employment opportunity information KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you. Qualifications BE/B.TECH/BCA/B.SC/M.SC/MCA/M. Tech-(Computers/Electronics/IT) Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Geo Risk Intel Investigation Ops JDs Summary We want to hire specialists to support investigations with additional HC to come onboard in 2024. Locations should be in HYD with WFO as a mandatory requirement. At a high-level we are looking for candidates demonstrating the ability to independently conduct investigative work using commonly available tools, with strong domain expertise. They should possess strong critical thinking mindset , investigative skills as well as exceptional report writing skills to report the findings accurately and efficiently Roles and Responsibilities Conduct independent research based on direction provided by PgM and the project team to identify modus operandi, bad actor archetypes and abuse vectors/TTPs Provide key insights reports on abuse trends based on Independent assessment of abuse trends Specific research methodology prescribed as a part of project plan Regularly report on progress in OSINT investigations and provide feedback candidly Identify novel abuse trends through research and analysis General Qualifications Minimum qualification of graduation from a government recognized university Minimum tenure of 36+ months working as a abuse / fraud/crime investigator or investigative analyst Excellent written and verbal communication skills Critical thinking ability to conduct independent investigative work Ability to solve problems using a data driven approach Ability to maintain composure in challenging situations Proven ability to work with sensitive information and to follow procedure when operating in a sensitive space Profile - CyberCrime Investigations Background Must have skills ○ Past experience in investigating abuse / financial crimes ○ Experience in fraud analytics ○ Very strong written communication skills ○ Proven track record or writing reports consumed at executive level (structured writing and report building) Good to have skills ○ Data driven approach to answering questions ○ Past experience conducting open source intelligence research ○ Highly proficient in using tools commonly available online for research ○ Skilled at synthesizing information from various sources and determining the key takeaways ○ Past experience in OSINT / Abuse Investigative tools ○ Past experience using corporate registries / reviewing public databases to identify individuals / companies behind an activity ○ Past experience synthesizing open source intelligence research Location Only WFO and in line with the overall Service Delivery Strategy HYD Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Please find the Job Description for EDR : 1. -Good working knowledge of EDR solutions such as MDATP, FireEye, CrowdStrike Falcon, Carbon Black. 2. -Must be well-versed with Operating System concepts i.e. Windows/Linux/MacOS 3. -Ability to distinguish between False Positives and False Negatives detections with respect to logs available. 4. -Good Exposure to OSINT tools, sandboxing, encoding-decoding techniques for independent investigation. 5. -Must be able to Investigate and Triage EDR related alerts with an ability to share detailed investigation reports to clients within SLA. 6. -Knowledge of Cyber kill chain and MITRE ATT&CK techniques and tactics used by adversary to evade detection. 7. -Awareness of various stages of Incident Response which involves in-depth analysis and RCA submission on security incidents. 8. -Good understanding of Malware Analysis i.e. static and dynamic and its variants. 9. -Exposure to adversary simulation and red teaming tools such as Caldera, PowerShell Empire, Cactus Torch 10. -Understanding of Database language i.e. KQL is a Plus. 11. -Understanding of Network Security concepts and popular encryption standards. 12. -Excellent communication skills for cross-group and interpersonal skills with ability to articulate business need for detection improvements. 13. -Exposure to reverse engineering of malware samples is a plus. 14. -Certification in OSCP, OSCE, GREM, GCIH, GCFA will be highly preferred. ***Willing to work in rotational shift timings.// To be added if required. Show more Show less

Posted 4 weeks ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

About The Position Snowbit is a cybersecurity technology innovator with a vision to empower organizations across the globe to quickly, efficiently, and cost-effectively ready themselves to address omnipresent cyber risk. Towards this end, Snowbit, built off years of Israeli cybersecurity experience, offers the broadest managed detection and response offering available today. Snowbit is part of the Coralogix group. Coralogix is rebuilding the path to log observability by offloading the burden of indexing and providing deep insights to accumulated data, at an infinite scale, for less than half the cost. We are seeking a highly skilled and experienced Dark Web Monitoring Specialist to join our cybersecurity and threat intelligence team. The ideal candidate will have a minimum of five years’ experience in threat hunting, with a strong focus on deep and dark web surveillance. You will be responsible for proactively identifying risk indicators and exposure vectors associated with customer domains, user credentials, leaked data, and organizational assets. This role is critical in supporting our mission to protect sensitive data and mitigate cyber threats before they impact our clients or our organization. Key Responsibilities Perform ongoing deep/dark web monitoring for targeted customer domains and related assets. Identify and analyze exposed credentials, PII, financial data, intellectual property, and insider threats. Use OSINT, darknet tools, and commercial threat intelligence platforms (e.g., Recorded Future, Flashpoint, Cybersixgill) to gather actionable insights. Develop and execute targeted threat hunting campaigns based on domain-specific queries. Assess exposure and risk vectors including forums, marketplaces, chat platforms (e.g., Telegram, Discord), and data breach dumps. Correlate findings with internal and external threat models to assess impact and recommend mitigations. Produce detailed intelligence reports and risk assessments for internal and client stakeholders. Work with incident response and SOC teams to provide context and enrichment to investigations. Maintain ethical, legal, and privacy standards while accessing and analyzing darknet content. Requirements Minimum 5 years of experience in cyber threat intelligence, dark web monitoring, or related field. Hands-on experience navigating Tor, I2P, and other darknets. Strong understanding of cybercrime ecosystems, fraud tactics, and underground communication channels. Proficiency in Python, scripting, or data extraction tools to automate monitoring workflows. Familiarity with threat intelligence standards (STIX/TAXII) and frameworks (MITRE ATT&CK, Kill Chain). Ability to link indicators of exposure (IOEs) with business risk across various threat landscapes. Excellent analytical writing and communication skills. Strong attention to detail and ability to handle sensitive data securely. Preferred Qualifications Certifications: GIAC Cyber Threat Intelligence (GCTI), CEH, or OSINT-related certifications. Experience working in MSSPs or with high-risk, regulated industries (e.g., finance, healthcare). Knowledge of malware marketplaces, ransomware operations, and credential theft patterns. Why Snowbit? Unique Culture: We recruit people based on our motto - Hungry, Humble, Smart -in that order, necessarily! The people who work in Coralogix and the people we are always looking to hire are hungry (highly motivated), humble (always ready to learn new things), and smart (learn and implement things quickly) Impactful Work: We provide our employees with the chance to make a significant impact on the company's growth and success. As part of a small team, your contributions can have a direct and noticeable effect on the company's outcomes, allowing you to see the tangible results of your efforts. Learning and Growth: Our fast-paced and dynamic environments provides ample opportunities for personal and professional growth as you acquire new skills, expand your knowledge base, and gain valuable experience across different areas of the business. Autonomy and Ownership: We provide our employees with a greater level of autonomy and decision-making authority. You have the opportunity to take ownership of projects and make independent decisions. This level of responsibility can be empowering and allows you to develop leadership skills. Show more Show less

Posted 4 weeks ago

Apply

5.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

What we are looking for? The ideal candidate for this position will have experience with LEAs in solving real-life cybercrime cases, background in malware forensic and and incident response, preferably alumni of premier institutes (IITs, NITs, IIITs, NFSL, etc.). and has preferably recognition in bug bounty programs. Responsibilities Handle a team of more than 10 cyber and forensic professionals for daily operations and quality of deliverables. Handle client management and stakeholder satisfaction smoothly Lead and conduct cybercrime investigations including digital evidence acquisition, analysis, and presentation. Prepare and manage forensic documentation. Lead and perform penetration testing, OSINT, and dark web investigations. Lead investigations related to cyber incidents Utilize enterprise and open-source forensic tools for system, mobile, cloud, and network forensics. Analyze malware, memory dumps, and advanced persistent threats (APT). Possess good communication skills and executive presence Fluent in Marathi, English and Hindi languages. Qualifications Location: Navi Mumbai Experience: 5+ years Education: BE/B.Tech/BCA/B.Sc/M.Sc/MCA/M.Tech in Computers, Electronics, or IT Certifications: Active CEH, CPTC, OSCP, ECSA, CEPT, or equivalent (mandatory) Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Overview: We are seeking a highly skilled Senior Cyber Threat Intelligence Analyst to join the Canada CTI team. The role involves collecting, analyzing, and disseminating actionable intelligence to support cybersecurity operations and protect the organization against emerging threats. The candidate will collaborate with internal and external stakeholders, conduct threat research, and contribute to the development of intelligence-driven strategies. Responsibilities: Lead the monitoring and analysis of emerging cyber threats across various sectors (e.g., Finance, Healthcare, Education). Perform in-depth analysis of advanced threat actor campaigns, including TTPs (Tactics, Techniques, and Procedures), and translate findings into actionable intelligence. Develop and maintain a comprehensive repository of cyber threat data for risk assessment and trend analysis. Create and present detailed reports (Strategic, Tactical, and Operational) to stakeholders, ensuring technical findings are communicated effectively. Develop and document threat intelligence playbooks and procedures. Identify and improve security detection capabilities using YARA, SIGMA, Snort, and similar rulesets. Collaborate with cross-functional teams to assess risks and recommend mitigation strategies. Evaluate and refine alerts triggered by threat intelligence platforms. Use OSINT techniques to validate and prioritize alerts and escalate critical threats promptly. Work closely with international IT teams and third-party vendors to understand adversary intent and activity. Stay informed about the latest cybersecurity trends, vulnerabilities, and attack methodologies. Contribute to the design and enhancement of the organization's Threat Intelligence Program. Participates in the assessment, analysis, and design of improvements for the Threat Intelligence Program. Perform as-hoc intelligence gathering using OSINT tools and techniques Able to apply creative and critical thinking when approaching issues. Required Qualifications: Bachelor's degree in Computer Science or equivalent, with a certification such as GCTI (GIAC Cyber Threat Intelligence). Extensive experience with threat intelligence platforms and playbook development. Proficiency in tools like MITRE ATT&CK, Diamond Model, and Cyber Kill Chain frameworks. Strong analytical skills and expertise in OSINT techniques. Advanced knowledge of cybersecurity incidents, attack vectors, and threat actor behaviour. Familiarity with Python, APIs, Docker containers, and automation tools. Proven ability to work independently and handle complex situations. Excellent verbal and written communication skills to deliver briefings to diverse audiences. Additional Information: This position requires support during Canada business hours. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Kanayannur, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Overview: We are seeking a highly skilled Senior Cyber Threat Intelligence Analyst to join the Canada CTI team. The role involves collecting, analyzing, and disseminating actionable intelligence to support cybersecurity operations and protect the organization against emerging threats. The candidate will collaborate with internal and external stakeholders, conduct threat research, and contribute to the development of intelligence-driven strategies. Responsibilities: Lead the monitoring and analysis of emerging cyber threats across various sectors (e.g., Finance, Healthcare, Education). Perform in-depth analysis of advanced threat actor campaigns, including TTPs (Tactics, Techniques, and Procedures), and translate findings into actionable intelligence. Develop and maintain a comprehensive repository of cyber threat data for risk assessment and trend analysis. Create and present detailed reports (Strategic, Tactical, and Operational) to stakeholders, ensuring technical findings are communicated effectively. Develop and document threat intelligence playbooks and procedures. Identify and improve security detection capabilities using YARA, SIGMA, Snort, and similar rulesets. Collaborate with cross-functional teams to assess risks and recommend mitigation strategies. Evaluate and refine alerts triggered by threat intelligence platforms. Use OSINT techniques to validate and prioritize alerts and escalate critical threats promptly. Work closely with international IT teams and third-party vendors to understand adversary intent and activity. Stay informed about the latest cybersecurity trends, vulnerabilities, and attack methodologies. Contribute to the design and enhancement of the organization's Threat Intelligence Program. Participates in the assessment, analysis, and design of improvements for the Threat Intelligence Program. Perform as-hoc intelligence gathering using OSINT tools and techniques Able to apply creative and critical thinking when approaching issues. Required Qualifications: Bachelor's degree in Computer Science or equivalent, with a certification such as GCTI (GIAC Cyber Threat Intelligence). Extensive experience with threat intelligence platforms and playbook development. Proficiency in tools like MITRE ATT&CK, Diamond Model, and Cyber Kill Chain frameworks. Strong analytical skills and expertise in OSINT techniques. Advanced knowledge of cybersecurity incidents, attack vectors, and threat actor behaviour. Familiarity with Python, APIs, Docker containers, and automation tools. Proven ability to work independently and handle complex situations. Excellent verbal and written communication skills to deliver briefings to diverse audiences. Additional Information: This position requires support during Canada business hours. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Overview: We are seeking a highly skilled Senior Cyber Threat Intelligence Analyst to join the Canada CTI team. The role involves collecting, analyzing, and disseminating actionable intelligence to support cybersecurity operations and protect the organization against emerging threats. The candidate will collaborate with internal and external stakeholders, conduct threat research, and contribute to the development of intelligence-driven strategies. Responsibilities: Lead the monitoring and analysis of emerging cyber threats across various sectors (e.g., Finance, Healthcare, Education). Perform in-depth analysis of advanced threat actor campaigns, including TTPs (Tactics, Techniques, and Procedures), and translate findings into actionable intelligence. Develop and maintain a comprehensive repository of cyber threat data for risk assessment and trend analysis. Create and present detailed reports (Strategic, Tactical, and Operational) to stakeholders, ensuring technical findings are communicated effectively. Develop and document threat intelligence playbooks and procedures. Identify and improve security detection capabilities using YARA, SIGMA, Snort, and similar rulesets. Collaborate with cross-functional teams to assess risks and recommend mitigation strategies. Evaluate and refine alerts triggered by threat intelligence platforms. Use OSINT techniques to validate and prioritize alerts and escalate critical threats promptly. Work closely with international IT teams and third-party vendors to understand adversary intent and activity. Stay informed about the latest cybersecurity trends, vulnerabilities, and attack methodologies. Contribute to the design and enhancement of the organization's Threat Intelligence Program. Participates in the assessment, analysis, and design of improvements for the Threat Intelligence Program. Perform as-hoc intelligence gathering using OSINT tools and techniques Able to apply creative and critical thinking when approaching issues. Required Qualifications: Bachelor's degree in Computer Science or equivalent, with a certification such as GCTI (GIAC Cyber Threat Intelligence). Extensive experience with threat intelligence platforms and playbook development. Proficiency in tools like MITRE ATT&CK, Diamond Model, and Cyber Kill Chain frameworks. Strong analytical skills and expertise in OSINT techniques. Advanced knowledge of cybersecurity incidents, attack vectors, and threat actor behaviour. Familiarity with Python, APIs, Docker containers, and automation tools. Proven ability to work independently and handle complex situations. Excellent verbal and written communication skills to deliver briefings to diverse audiences. Additional Information: This position requires support during Canada business hours. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Overview: We are seeking a highly skilled Senior Cyber Threat Intelligence Analyst to join the Canada CTI team. The role involves collecting, analyzing, and disseminating actionable intelligence to support cybersecurity operations and protect the organization against emerging threats. The candidate will collaborate with internal and external stakeholders, conduct threat research, and contribute to the development of intelligence-driven strategies. Responsibilities: Lead the monitoring and analysis of emerging cyber threats across various sectors (e.g., Finance, Healthcare, Education). Perform in-depth analysis of advanced threat actor campaigns, including TTPs (Tactics, Techniques, and Procedures), and translate findings into actionable intelligence. Develop and maintain a comprehensive repository of cyber threat data for risk assessment and trend analysis. Create and present detailed reports (Strategic, Tactical, and Operational) to stakeholders, ensuring technical findings are communicated effectively. Develop and document threat intelligence playbooks and procedures. Identify and improve security detection capabilities using YARA, SIGMA, Snort, and similar rulesets. Collaborate with cross-functional teams to assess risks and recommend mitigation strategies. Evaluate and refine alerts triggered by threat intelligence platforms. Use OSINT techniques to validate and prioritize alerts and escalate critical threats promptly. Work closely with international IT teams and third-party vendors to understand adversary intent and activity. Stay informed about the latest cybersecurity trends, vulnerabilities, and attack methodologies. Contribute to the design and enhancement of the organization's Threat Intelligence Program. Participates in the assessment, analysis, and design of improvements for the Threat Intelligence Program. Perform as-hoc intelligence gathering using OSINT tools and techniques Able to apply creative and critical thinking when approaching issues. Required Qualifications: Bachelor's degree in Computer Science or equivalent, with a certification such as GCTI (GIAC Cyber Threat Intelligence). Extensive experience with threat intelligence platforms and playbook development. Proficiency in tools like MITRE ATT&CK, Diamond Model, and Cyber Kill Chain frameworks. Strong analytical skills and expertise in OSINT techniques. Advanced knowledge of cybersecurity incidents, attack vectors, and threat actor behaviour. Familiarity with Python, APIs, Docker containers, and automation tools. Proven ability to work independently and handle complex situations. Excellent verbal and written communication skills to deliver briefings to diverse audiences. Additional Information: This position requires support during Canada business hours. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Overview: We are seeking a highly skilled Senior Cyber Threat Intelligence Analyst to join the Canada CTI team. The role involves collecting, analyzing, and disseminating actionable intelligence to support cybersecurity operations and protect the organization against emerging threats. The candidate will collaborate with internal and external stakeholders, conduct threat research, and contribute to the development of intelligence-driven strategies. Responsibilities: Lead the monitoring and analysis of emerging cyber threats across various sectors (e.g., Finance, Healthcare, Education). Perform in-depth analysis of advanced threat actor campaigns, including TTPs (Tactics, Techniques, and Procedures), and translate findings into actionable intelligence. Develop and maintain a comprehensive repository of cyber threat data for risk assessment and trend analysis. Create and present detailed reports (Strategic, Tactical, and Operational) to stakeholders, ensuring technical findings are communicated effectively. Develop and document threat intelligence playbooks and procedures. Identify and improve security detection capabilities using YARA, SIGMA, Snort, and similar rulesets. Collaborate with cross-functional teams to assess risks and recommend mitigation strategies. Evaluate and refine alerts triggered by threat intelligence platforms. Use OSINT techniques to validate and prioritize alerts and escalate critical threats promptly. Work closely with international IT teams and third-party vendors to understand adversary intent and activity. Stay informed about the latest cybersecurity trends, vulnerabilities, and attack methodologies. Contribute to the design and enhancement of the organization's Threat Intelligence Program. Participates in the assessment, analysis, and design of improvements for the Threat Intelligence Program. Perform as-hoc intelligence gathering using OSINT tools and techniques Able to apply creative and critical thinking when approaching issues. Required Qualifications: Bachelor's degree in Computer Science or equivalent, with a certification such as GCTI (GIAC Cyber Threat Intelligence). Extensive experience with threat intelligence platforms and playbook development. Proficiency in tools like MITRE ATT&CK, Diamond Model, and Cyber Kill Chain frameworks. Strong analytical skills and expertise in OSINT techniques. Advanced knowledge of cybersecurity incidents, attack vectors, and threat actor behaviour. Familiarity with Python, APIs, Docker containers, and automation tools. Proven ability to work independently and handle complex situations. Excellent verbal and written communication skills to deliver briefings to diverse audiences. Additional Information: This position requires support during Canada business hours. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

3.0 years

0 Lacs

Jaipur, Rajasthan, India

On-site

Linkedin logo

Job Title: Backend Engineer – Data Collection & Processing Job Type: Full-Time About Client: Paysecure is a versatile payments processing company catering to all industries. Our platform is built to handle transactions seamlessly, securely, and at scale—no matter the sector. Whether you're in retail, logistics, fintech, healthcare, or any other vertical, our solutions are tailored to deliver reliable and efficient payment infrastructure. Trust us for seamless payment processing. With a strong focus on innovation, compliance, and customer-centricity, we empower businesses to accept and manage payments effortlessly across digital and physical channels. Join us in shaping the future of commerce, one transaction at a time. Summary We are looking for a Backend Engineer who is passionate about building robust, scalable systems for data acquisition, transformation, and analysis. This role is critical to our data pipeline architecture and will directly contribute to detecting fraud and enabling secure transactions. Key Responsibilities ● Design and implement scalable data ingestion pipelines for collecting structured and unstructured data from browsers, APIs, and external sources. ● Develop robust ETL/ELT pipelines to clean, transform, and normalize large datasets. ● Build and maintain secure, high-performance RESTful and event-driven APIs. ● Integrate with third-party data sources including public APIs, internal systems, and dark web monitoring services. ● Ensure high availability, fault tolerance, and real-time performance across services. ● Work closely with data scientists, threat analysts, and frontend engineers to support end-to-end data workflows. ● Implement security, authentication, and authorization best practices across backend systems. ● Write clean, maintainable, and well-tested code. Qualifications ● Bachelor’s or Master’s degree in Computer Science, Engineering, or related field. ● 3+ years of backend development experience with languages such as Python, Node.js, Go, or Java. ● Strong understanding of REST APIs, microservices architecture, and event-driven systems. ● Experience with data pipeline technologies: Apache Kafka, Redis Streams, RabbitMQ, Airflow, or similar. ● Experience working with databases like PostgreSQL, MongoDB, Elasticsearch, or ClickHouse. ● Familiarity with containerized environments (Docker, Kubernetes). ● Exposure to data privacy and security best practices. ● Experience with cloud platforms (AWS, GCP, or Azure). Nice to Have ● Experience integrating with OSINT or threat intelligence APIs. ● Exposure to web scraping, crawling, or browser-based data capture. ● Background in real-time analytics or fraud detection systems. ● Familiarity with GraphQL or gRPC. Show more Show less

Posted 1 month ago

Apply

6.0 years

0 Lacs

New Delhi, Delhi, India

On-site

Linkedin logo

We are a Series A Funded New Age Information Security & Data Analytics Company and we take pride in the fact that we have been delivering value to our customers with our innovative offerings and helping them adopt a variety of our security solutions that are based on cutting edge technologies like Artificial Intelligence, Predictive Intelligence, Facial Biometrics and so on. We are among the top 5 Cyber excellence companies globally (Holger Schulze awards) and have won similar recognitions at National and International arenas. To our credit, more than 100 customers in India already trust us and the list is only growing. Exciting things are happening at Innefu and we are all game for a big leap forward. Tasks We are seeking an experienced and strategic Product Manager to join our team and lead the development and management of our OSINT (Open-Source Intelligence) and Data Analytics/Visualization product portfolio. The successful candidate will be responsible for driving the product strategy, defining features, and ensuring the successful delivery of high-quality solutions that meet our customers' evolving needs. Requirements Product Strategy: Develop and articulate a clear product strategy for OSINT and Data Analytics/Visualization products in alignment with the company's overall vision and goals. Conduct market research to identify emerging trends, competitor offerings, and customer needs to inform product roadmap decisions. Product Development: Collaborate with cross-functional teams, including engineering, design, and data science, to define and prioritize features for product development. Lead the end-to-end product development lifecycle, from concept to delivery, ensuring timely and high-quality releases. Stakeholder Collaboration: Work closely with sales, marketing, and customer support teams to understand customer feedback, market demands, and competitive landscape, and incorporate these insights into product planning. Engage with key stakeholders to gather requirements and ensure alignment between product development and business objectives. Data Analytics and Visualization: Drive the development of advanced data analytics using Artificial Intelligence and visualization features, ensuring our products provide actionable insights and a superior user experience. Stay informed about the latest trends and technologies in data analytics and visualization to keep our products at the forefront of innovation. Product Launch and Adoption: Develop go-to-market strategies and collaborate with marketing teams to execute successful product launches. Work with sales teams to drive product adoption, providing necessary training and support materials. Preferred Skills: Minimum 6 years’ experience in product management, with a focus on OSINT and Data Analytics/Visualization products. Strong understanding of Information Security technologies, open-source ecosystems and data analytics concepts. Demonstrated ability in Data Analytics product Development, product roadmap and planning. Familiarity with agile development methodologies and experience with cloud-based solutions and services. Knowledge of machine learning and artificial intelligence concepts and should have worked closely with government institutions/organization. If you are passionate about driving innovation in OSINT and Data Analytics/Visualization products and are excited to join a dynamic team, we invite you to apply. Please submit your resume and a cover letter detailing your relevant experience and achievements. Benefits *Advanced Technology exposure - Artificial Intelligence *Five day work(Monday - Friday) *Medical and Health Insurance Show more Show less

Posted 1 month ago

Apply

0.0 - 1.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

ZeroFox seeks an Associate Intelligence Analyst to collect, contextualize, and deliver OSINT reporting to our largest and most complex customers. The selected candidate will join an analyst team aligned to service customers across industry sectors. The goal of this role is to exceed client expectations and drive value through the creation and delivery of meaningful alert reporting, ongoing analysis, and being the internal ZeroFox advocate for your customer(s) needs. The Associate Intelligence Analyst should not be afraid to roll up their sleeves, manage escalation responses and recommendations, and contextualize alerts. The Associate Intelligence Analyst will be asked to think like a true "purple" team member - understanding the red and blue team aspects of issues and responding to real-world incidents impacting our customer(s). Team members provide value-driven threat and risk detection to ensure their dedicated customer(s) understand and mitigate risk. This role requires a team player who relishes the opportunity to shape a growing function and is a self-starter. Candidates with prior experience in OSINT research, information security, brand, and/or physical security investigations will be given priority consideration. Requirements Learn and employ ZeroFox patented technology to identify and analyze relevant information collected from the Internet, based on client-specific criteria, to assemble relevant findings for daily intelligence reporting; Collect, vet, and disseminate incidents involving brand and copyright infringement, trademark violations, information and physical security risk/threats, distribution control, and online impersonation activities; Manually collect, process, and upload relevant content when web crawlers or API feeds are not available to collect or detect incidents on identified online environments; Assist in the tracking of unresolved cases to ensure their successful completion or escalation to the appropriate individuals or organizations based on established guidelines and procedures; Perform Quality Analysis (QA) on alert data sets to be delivered to the customer Independently assess and manage complex issue Initiate engagement with other ZeroFox resources to address customer queries Use the ZeroFox platform and traditional cybersecurity toolsets to perform alerting functions Provide succinct descriptions and recommendations around various threats and risks Assist with identifying and disseminating sample deliverables to ensure the successful completion of Sales engagements and proof of concept exercises. Qualifying Requirements: 0-1 years' experience in the Cyber Security domain Experience with OSINT research, physical security risks, and threats Experience tracking and reporting on threat actor tactics, techniques, and procedures (TTPs) Understanding of current events in the security and threat intelligence world Knowledge of the cyber threat environment including how the following sources of data enable cyber operations: major social networks (knowledge of emerging networks a big plus) Experience in a similar role producing customer-facing alerts, reports, or analysis summaries Strong written and verbal communication skills Ability to think critically about subjects and comfort with analysis without full information Excellent English writing skills Ability to think outside the box Innovative mindset Benefits Competitive compensation Community-driven culture with employee events Generous time off Best-in-class benefits Fun, modern workspace Respectful and nourishing work environment, where every opinion is heard and everyone is encouraged to be an active part of the organizational culture Show more Show less

Posted 1 month ago

Apply

1.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Opportunity Overview The Physical Security Intelligence team at ZeroFox provides ongoing social media intelligence to our clients in a 24x7, 365 day a year operation. Violence is a continual phenomenon, and we must be able to provide our clients with quick and valuable intel. Our analysts monitor open source networks in a nonstop search for violent activity around the world in order to provide our clients with situational awareness to make fast security decisions. We are looking for information regarding physical violence rather than brand or information security. We expect every member of our team to understand various social media sources and be exceptionally familiar with how people operate within these networks. Additionally, we expect our analysts to be well versed in current events in relation to active violent conflicts, and to be familiar with violent threat actor groups on a global scale. We are searching for a teammate who can demonstrate exceptional analytical skills and be able to think critically and quickly in a collaborative environment. We need an analyst who can handle intense time pressure and understand the gravity of the material we report on. Additionally, we need an analyst with exceptional written communication skills. Discretion, teamwork, and urgency are a must. We need a dedicated and enthusiastic individual who can contribute their analytical skills to our team. This specific position is solely focused on the analytical aspect of providing intelligence to clients; this is not a role related to engineering, coding or information security concepts. Our ideal candidate can provide sound judgment in high pressure situations, and demonstrates desire to make an impact in the safety and security of our clients. Roles and Responsibilities Monitor our collection of intel in search of valuable information on physical security threats. Investigate incidents with publicly available information to determine validity and provide further contextual understanding of an event. Compose well written reports under intense time constraints. Collaborate with team members in an effective manner. Work on a shift schedule which could include consistent night shifts or weekends. Ad hoc event and crisis coverage. Other duties as assigned. Required Qualifications And Skills College degree in a field related to international security, political science, journalism, or a similar degree which focuses on human conflict; or at least 1 year of similar work experience. Awareness of general political and social trends both domestically and internationally. Awareness of general trends in violence on a global scale. Subject-matter expertise around physical security threats ranging from indiscriminate violence to targeted ideological incursions. Deep understanding of social media and how people speak and communicate on various social networks. Ability to learn our internal workflows, products, proprietary and third-party tools. Able to track and address multiple conflicting assignments on a daily basis. Excellent written composition skills. Excellent active communication skills. Ability to stay engaged during repetitive, detail-oriented tasks. Strong sense of self-motivation and desire for growth. Capability to receive constructive feedback and demonstrate an eagerness to learn. Desired Skills Past experience in conducting OSINT methodology across social media networks, including both mainstream and obscure sources. Past experience in journalism is preferred. Proficiency in at least one additional language besides English. Spanish, Arabic, Russian, or a Chinese language are preferred. Show more Show less

Posted 1 month ago

Apply

2.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Summary The Threat Intelligence (TI) analyst is a self-motivated, independent, and critical thinker skilled in the application of threat intelligence for the enablement of a stakeholder’s network security. The qualified individual will address threat intelligence requirements and leverage Arete’s unique data to produce threat intelligence products such as briefings, threat actor profiles, flash reports, and technical reports. The TI analyst will conduct research with a focus on dark web and open-source data to develop high-quality assessments for both internal and external stakeholders. The Threat Intelligence Analyst will support the broader Threat Intelligence team by leveraging a solid foundation of technical knowledge of Cybersecurity, CTI, Dark Web, Incident response and Digital Forensics (DFIR) to successfully execute responsibilities. The APAC region is diverse, encompassing various countries with distinct technological landscapes, levels of cybersecurity maturity, and prevalent threat actors. This necessitates a specialized focus for threat intelligence professionals in this area. Threat actors in APAC can range from state-sponsored groups and sophisticated cybercriminal organizations to hacktivists with regional agendas. Understanding local laws, regulations, and data privacy requirements within APAC countries is also important for threat intelligence specialists, especially when dealing with cross-border threats and data sharing. Roles & Responsibilities Threat Monitoring and Analysis: Continuously monitor various threat intelligence sources, including open-source intelligence (OSINT), dark web forums, threat feeds (both commercial and open), and security vendor reports, with a specific focus on threats relevant to the APAC region. Analyze this data to identify emerging threats, trends, attack vectors, and threat actors targeting APAC. Regional Threat Landscape Expertise: Develop and maintain a deep understanding of the specific threat actors, campaigns, and geopolitical factors influencing the cyber threat landscape in APAC countries. This includes understanding the tactics, techniques, and procedures (TTPs) commonly employed by threat actors in this region. Threat Intelligence Production: Produce timely and relevant threat intelligence reports, briefings, and alerts tailored to different stakeholders, including technical teams, management, and sometimes clients. These reports should provide context, analysis, and actionable recommendations to mitigate risks. Indicator Management: Develop and manage threat indicators (IOCs) such as malicious domains, IP addresses, and file hashes, and ensure their effective dissemination and integration with security tools and monitoring systems. Vulnerability Analysis: Analyze vulnerabilities and exploits that are being actively used or are likely to be used in attacks within the APAC region, and provide insights to relevant teams for patching and mitigation efforts. Incident Response Support: Support incident response teams by providing relevant threat intelligence during security incidents, helping them understand the attacker's motives, TTPs, and potential impact. Threat Hunting Support: Collaborate with threat hunting teams by providing intelligence and context to proactively search for and identify hidden or advanced threats within the organization's network. Collaboration and Information Sharing: Collaborate with other security teams, industry peers, and potentially law enforcement agencies within the APAC region to share threat information and best practices. Tool and Platform Management: Utilize and manage threat intelligence platforms (TIPs) and other relevant tools for collecting, analysing, and disseminating threat data. Evaluate and recommend new tools and technologies to enhance threat intelligence capabilities. Customized Intelligence: Tailor threat intelligence gathering and analysis to the specific industry, business operations, and risk profile of the organization within the APAC context. Develop APAC specific quarterly / annual crimeware reports. Conduct dark web research by using knowledge of deep/dark web infrastructure, along with third-party resources to formulate hypotheses on the cybercrime ecosystem, such as initial access broker (IAB) activity, profiling ransomware affiliates, and more. Assist in the analysis and production of client-facing intelligence products, including email updates, briefing material, requests for information (RFIs), and other client requirements. Share meaningful insights about the context of an organisation’s threat environment that improve its risk management posture. Produce briefing material, written products, and graphics to convey analysis, both verbally and in writing, to a variety of audiences. Support client engagements by maintaining an understanding of networking principles and how adversaries could exploit network-related issues. Correlate threat intelligence to identify relevant threat activity and trends. Analyze the origins, pathways, and methodologies of malicious cyber activities to attribute, model and predict future intrusions. Contribute to the development and enhancement of threat intelligence tools, technologies, and processes to improve automation, data analysis, intelligence sharing, and service offerings. Collect accurate technical information from the client concerning the engagement to include, but not limited to, search terms, security incidents, client’s environment, size, and technologies in place. expertise, and sound analytical principles to drive forward client engagements. Appropriately manage expectations and communicate roadblocks to maintain stakeholder satisfaction throughout the intelligence process. May perform other duties as assigned by management. Skills And Knowledge Strong background and practical hands-on experience with Cyber Threat Intelligence concepts. Knowledge of ransomware groups with the ability to explain the current ransomware-as-a-service (RaaS) ecosystem, cybercriminal communications, IABs, and hypothesize on upcoming shifts within the threat landscape. Ability to work effectively in a fast-paced, dynamic environment and prioritize tasks to meet deadlines. Ability to correlate threat intelligence from the industry or region to observed activity impacting the customer. Knowledge of Cyber Threat Intelligence (CTI) frameworks like STIX, MITRE ATT&CK, the Lockheed Martin Cyber Kill Chain, or the Diamond Model. Previous experience with threat intelligence platforms such as ThreatConnect, MISP, or OpenCTI. Ability to work under a minimal supervision environment, maintaining high-quality analytical production and excellent relationships with stakeholders. Adaptable and willing to learn new technologies. Core Competencies: The Arete Threat Intelligence maps the core competencies required for the role to the U.S. National Initiative for Cybersecurity Careers and Studies (NICCS) Workforce Framework for Cybersecurity (NICE Framework) to aid in identifying applicable abilities, knowledge, skills, and appropriate supporting training. S0218: Skill in evaluating information for reliability, validity, and relevance. A0072: Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. T0290: Determine tactics, techniques, and procedures (TTPs) for intrusion sets. K0001: Knowledge of computer networking concepts and protocols, and network security methodologies. K0002: Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). K0177: Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). K0362: Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). K0444: Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). K0516: Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. K0565: Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. S0194: Skill in conducting non-attributable research. S0196: Skill in conducting research using deep web. S0256: Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioural relationships. T0617: Conduct nodal analysis. T0708: Identify threat tactics, and methodologies. Job Requirements 2-5 years of proven experience in cyber threat intelligence analysis, incident response, or a related field. Strong written and verbal communication skills, with the ability to present technical information to both technical and non-technical stakeholders. Experience taking non-traditional and creative approaches to solving problems and having the ability to quickly adapt as needed. Experience in using threat intelligence platforms and tools such as MISP, OpenCTI, etc. DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties, and skills required by personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

India

Remote

Linkedin logo

🛡️ Secure Mojo is Hiring: OSINT Analyst Intern (Remote | 2 Months) Are you passionate about open-source intelligence (OSINT) and eager to gain real-world experience in cybersecurity? Join Secure Mojo , a fast-growing startup on a mission to redefine personal digital protection for individuals, entrepreneurs, and influencers. We’re offering a unique opportunity for aspiring OSINT analysts to work with cybersecurity professionals, contribute to live intelligence-gathering projects, and build hands-on skills that matter in today’s threat landscape. 💼 Position: OSINT Analyst Intern 🕒 Duration : 2 Months 🌐 Work Mode : Remote 💰 Internship Type : Unpaid (Certificate & Letter of Recommendation upon completion) 🚀 Roles & Responsibilities As an OSINT Analyst Intern at Secure Mojo, you will: 🔎 Conduct in-depth research using open-source intelligence techniques to uncover digital footprints, vulnerabilities, and threat patterns 🕵️‍♂️ Monitor and analyze online platforms, forums, and data leaks for potential security risks 📊 Assist in compiling threat reports and intelligence briefs for internal use and client cases 🛡 Support the cybersecurity team in privacy investigations and threat modeling 📚 Stay updated with the latest OSINT tools, techniques, and frameworks 🧠 Collaborate with ethical hackers and cyber experts to contribute to real-world digital protection strategies ✅ What We're Looking For A strong interest in cybersecurity, intelligence, or digital forensics Strong analytical and investigative skills Detail-oriented with a curious and ethical mindset Good written communication skills Self-driven and comfortable working independently in a remote environment Prior knowledge of ethical hacking or information security is a plus 🎓 What You’ll Gain ✔ Real-world exposure to cybersecurity investigations ✔ Mentorship from experienced ethical hackers and OSINT professionals ✔ Opportunity to work on meaningful projects with direct impact ✔ A strong letter of recommendation upon successful completion ✔ Certificate of Internship 🔐 At Secure Mojo , we believe the future of cybersecurity starts with passionate minds like yours. Ready to dive into the world of OSINT? 📩 Apply now by sending your resume to ben@securemojo.com or apply directly here on LinkedIn. Show more Show less

Posted 1 month ago

Apply

180.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

Job Title : Anti-Piracy Manager Location: New Delhi Hybrid Working Model About Springer Nature Group Springer Nature opens the doors to discovery for researchers, educators, clinicians and other professionals. Every day, around the globe, our imprints, books, journals, platforms and technology solutions reach millions of people. For over 180 years our brands and imprints have been a trusted source of knowledge to these communities and today, more than ever, we see it as our responsibility to ensure that fundamental knowledge can be found, verified, understood and used by our communities – enabling them to improve outcomes, make progress, and benefit the generations that follow. Visit group.springernature.com and follow @SpringerNature /@SpringerNatureGroup About The Brand Springer is a leading global scientific, technical and medical portfolio, providing researchers in academia, scientific institutions and corporate R&D departments with quality content through innovative information, products and services. Springer has one of the strongest STM and HSS eBook collections and archives, as well as a comprehensive range of hybrid and open access journals. Visit springer.com and follow @Springer1842 About The Role The Anti-Piracy Team is part of the General Counsel’s Office, it is charged with the global protection of Springer Nature Group content and assets against piracy. The team is currently based in London, UK, and Shanghai, China. This role will be reporting into Head of Global Anti-Piracy. This new role has been created to address the piracy concerns relating to India. R esponsibilities : To design, implement and manage India anti-piracy strategy in consultation with business partners and Head of Global Anti-Piracy. Strategy to be based upon a deep understanding of the business product lines and sales models, business priorities and significance of threats (including future ones). To implement and manage anti-piracy investigations, evidencing and documentation for administrative, civil and criminal actions in India. Engaging with enforcement authorities where necessary. To continually assess business threats on all major Indian marketplace and platform sites (starting with a dedicated project targeting infringing sales on Amazon.in) and to continually adapt anti-piracy responses and mitigations to these by developing and nurturing relationships with brand/abuse managers on the platforms and at their hosts with regular meetings. To gain privileged access to abuse/brand protection tools and optimize the use and management of these, as well as asking for proactive improvements, privileged access and assistance from the platform providers. Tracing marketplace infringement back to dedicated websites owned by the sellers in question and then following the money trail and identifying physical locations. Where required engaging with enforcement and/or government authorities to highlight issues and concerns, and to escalate priority cases. To represent Springer Nature on any existing regional publishing and/or cross industry anti-piracy initiatives, and to look at setting up, joining and or contributing to any new such groups. To work within these groups to share knowledge, conduct joint actions, and aid local lobbying etc To inform and/or assist on global trade body enforcement groups as required when there is an Indian connection and/or associated regional subgroup e.g. STM ETF, PA APWG actions etc. To establish and build relationships with these groups and with other publishers to get local traction. Identifying infringements on local websites / community websites specific to India and passing to global team for takedown. To liaise with Head of Global Anti-Piracy to ensure that Indian anti-piracy actions work in concert with global initiatives, that intelligence is shared and any connections identified. To regularly report into Head of Global anti-piracy, local business partners and regional leadership team to ensure that all are fully aware of/involved in any Indian anti-piracy initiatives, and that these match current business priorities. If necessary select suitable third-party services to help combat all forms of infringement and to manage the contracts and relationships associated with these. Promptly identify any potential lobbying issues which may impact upon anti-piracy work e.g. copyright reform, legal or enforcement changes, and raise these either with Communications/Government Affairs and/or the PPSG (Public Policy Steering Group). To provide technical support to any lobbying efforts as required. To work with Communications, where suitable, to produce and distribute proactive PR messaging relating to anti-piracy actions in order to build deterrent effect and/or produce reactive messaging to counter any negative PR. To assist companies that SN has deals with in their anti-piracy, IP cases, etc as appropriate e.g., distributors, customers etc. To work with UK IPO IP attached to Delhi, other international embassies and rights organisations in order to fight against local piracy. Where necessary assist business, legal department and external trade mark attorneys to support registration, renewal, class extensions and dispute cases and infringement associated with current/potential SN trademarks, and to address Brand Name and Copyright Issues. Contacting international book fairs to look at ways of blocking known pirates from attendance and advertising. Following up reports of supply chain and library contamination in relation to pirate copies. Conducting investigations and/or projects to counteract such infringement. To oversee investigations into physical piracy originating from bookstores, copy shops and markets to develop intel on sellers, and to identify the associated distribution channels and printers. To develop Online and in person test purchasing programs to verify infringements and produce traceable payments. To proactively provide quarterly data to the Anti-Piracy Manager within the GCO to include in the quarterly anti-piracy reports, and to provide summary data and/or slides on India anti-piracy to the Head of Global Anti-Piracy as required for Board and Management meetings/presentations. To produce dedicated local reports, on a quarterly basis, for India Business partners and Managing Director, India, and adhoc reports as and when required. To provide dedicated anti-piracy training to the India businesses, and to produce bespoke training as required/requested. To negotiate and align with local business units, to obtain the resources for anti-piracy work. To keep up to speed with all SN business developments by attending briefings or by requesting specific updates. Experience Ideally – Extensive experience of working on anti-piracy and intellectual property investigations (including managing criminal and/or civil cases), Enforcement and/or IT/Internet industries, coupled with a demonstrable interest and knowledge of intellectual property law. Very strong Indian contacts in enforcement bodies and/or government agencies, anti-piracy units, marketplaces/platforms, ISPs and/or relevant trade bodies or industry IP groups. Desirable – Experience of having worked in at least one media industry – ideally some publishing experience and/or knowledge but this is not essential. Previous experience of strategic anti-piracy planning and/or anti-piracy project work. High level of understanding of new media and related technologies, particularly extensive knowledge of legal and illegal content services and capabilities of the internet, mobile networks and associated hardware and technologies. Desirable –Online enforcement experience with admins, ISPs, domain registrars. Skills/Knowledge High proficiency and experience in manipulating vast amounts of data. Ability to interpret, analyse and interrogate complex data and to produce reports relating to this. Excellent understanding of new media and related technologies, particularly extensive knowledge of legal and illegal content services and capabilities of the internet, mobile networks and associated hardware/software technologies. Strong commercial awareness of the impact on publishers of current and anticipated future trends in consumer behaviour. Knowledge of local Intellectual Property law. Some knowledge of Trade Mark law. Some knowledge of internet infrastructure e.g. CDNs, hosting providers, domain registrar and registries and how they fit together within the internet ecosystem. OSINT experience/Knowledge. A hands-on approach; a self-motivated individual who has clearly defined initiative but is also a strong team player - able to juggle between sole and group working. Efficient, rigorous, well-organised, process driven. Ability to perfect and constantly improve ways of working through efficiencies and creative innovation. Attention to detail and persistence in problem solving. Strong administrative skills - ability to collect, handle, maintain and manipulate large amounts of data safely, efficiently and accurately. Demonstration of personal credibility and integrity. Strong communication skills at all levels of the business, and an appetite to build and maintain new contacts - particularly at more senior levels. Qualifications Essential - Either relevant training, and/or qualification(s) in related disciplines, and/or a background and proven track record in enforcement or anti-piracy/IP protection work. Advantageous - IPR or similar degree Able to demonstrate an on-going attendance on relevant work-related courses/seminars, and/or work placements/secondments. Need to be capable of Technical Capability Uses technical / job knowledge and experience to meet and exceed job requirements / customer expectations. Efficiently manages workload and projects within set timelines and to agreed budget, achieving set objectives. Relationship Building/ Teamwork (incorporating Communication, Influencing and Trust) Builds effective relationships through positive communication that motivates and influences others. Honest and trustworthy; a valued team member, actively involved in achieving team objectives. Works cooperatively and flexibly with other members of the team. Innovation & Influencing Embraces creativity, innovation and is open to new ideas. Innovates to improve current working practices / products / technologies to provide business opportunities and results. Successfully influences others to accept and support an idea/proposal/plan. Strategy & Planning (incorporating Business Awareness) Understands the needs and direction of the business in context of market opportunities and threats, anticipates and develops business priorities to meet these. Embraces change and drives to improve current working practices / products/technologies to grow the business. Leadership (incorporating team leadership, professional impact, networking, continuing professional development) Creates a shared vision and passion for his/her group or business area and motivates others to work towards it. Embodies the Company’s values and beliefs and shares these with others. Able to develop a sense of the mission of the organisation or group and take action to influence others to work towards accomplishment of the mission. At Springer Nature, we value the diversity of our teams and work to build an inclusive culture, where people are treated fairly and can bring their differences to work and thrive. We empower our colleagues and value their diverse perspectives as we strive to attract, nurture and develop the very best talent. Springer Nature was awarded Diversity Team of the Year at the 2022 British Diversity Awards. Find out more about our DEI work here https://group.springernature.com/gp/group/taking-responsibility/diversity-equity-inclusion If you have any access needs related to disability, neurodivergence or a chronic condition, please contact us so we can make all necessary accommodations. For more information about career opportunities in Springer Nature please visit https://springernature.wd3.myworkdayjobs.com/SpringerNatureCareers Job Posting End Date: 9-06-2025 Show more Show less

Posted 1 month ago

Apply

0.0 - 1.0 years

0 Lacs

Bengaluru

Hybrid

Naukri logo

Job Title: Geo Political Analyst Location: Bengaluru Primeco Union City, Tower B, Sadaramangala Village, Krishnarajapura Hobli Type: Hybrid Headcount: 11 About the Team You will be part of the Open Source Intelligence (OSINT) team , which combines human expertise and machine intelligence to monitor, collect, and enhance data on global security and political risks. This data fuels a range of predictive applications aimed at helping clients understand current and emerging global developments. Role Overview As a Junior Data Analyst , you will be responsible for gathering and curating high-quality intelligence events related to global security and political risk. Your work will support both internal stakeholders and external clients, contributing to a deeper understanding of global trends and crises. Key Responsibilities Monitor and collect critical political and security events across assigned countries and regions. Use OSINT tools and licensed platforms to identify and extract relevant intelligence globally. Assess and verify the credibility and reliability of sources before publishing information. Draft clear, analytical summaries that accurately present key event details. Ensure consistent event categorization, accurate metadata tagging, and proper attribution. Conduct regular quality control to maintain high data accuracy standards. Continuously source and integrate new, high-reliability information channels, especially regional ones. Collaborate on contextualizing terrorism and security-related data within broader risk frameworks. Assist with special research and analytical projects as needed. Follow standard operating procedures (SOPs) for data collection and processing. Maintain updated documentation for assigned regions and ensure completeness of collection plans. Be available during public holidays or emergencies (e.g., protests, riots, political unrest) as required. Education & Background Bachelors degree in International Relations , Political Science , or a related field. Desired Skills & Competencies Multilingual proficiency in one or more of the following: French, Spanish, Arabic, Russian, Mandarin, or Southeast Asian languages (preferred). Strong understanding of geopolitical affairs and global business risks. Excellent written and verbal communication skills in English. Attention to detail with strong analytical and computer skills . Strong interpersonal skills and ability to work effectively in a collaborative team environment. Cultural sensitivity and awareness of regional nuances.

Posted 1 month ago

Apply

0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

Role Summary We are hiring a Level 2 Threat Intelligence Analyst who will play a key role in identifying, profiling, and analyzing cyber threats—especially those originating from dark web sources and adversarial actors. The ideal candidate will have hands-on experience in threat actor profiling, APT tracking, and ransomware ecosystem analysis. This role demands both tactical research capabilities and strategic intelligence production, contributing to our core threat intelligence offerings. Key Responsibilities • Dark Web & Deep Web Monitoring: Track cybercrime forums, marketplaces, and hidden networks to detect emerging threats, tools, or chatter related to target industries or geographies. • APT and Ransomware Tracking: Identify and monitor activities of APT groups, ransomware gangs, and affiliates. Create behavioral and attribution profiles for known and emerging threat actors. • Threat Actor Profiling: Compile and maintain structured profiles that include motivations, TTPs (tactics, techniques, and procedures), affiliations, historical campaigns, and IOCs (indicators of compromise). • Threat Attribution and Reporting: Produce detailed intelligence reports with technical and strategic insights for internal and external stakeholders. Assist in attribution efforts by correlating adversarial behaviors and campaign footprints. • Collaboration & Knowledge Sharing: Work with internal research, detection, and incident response teams to inform defensive strategies. Present findings in team meetings and client-facing briefings when required. • Platform Enhancement: Contribute feedback to improve the automation and enrichment features of FalconFeeds.io by identifying intelligence gaps and usability challenges. Required Qualifications • Minimum 4 years of experience in threat intelligence, cyber investigations, or related domains. • In-depth understanding of dark web ecosystems, encrypted communication channels, and adversary tradecraft. • Hands-on experience with MITRE ATT&CK, threat intel platforms, and OSINT tools like Maltego, Spiderfoot, or Recon-ng. • Familiarity with ransomware leak sites, IABs (Initial Access Brokers), and underground marketplaces. • Strong analytical and critical thinking skills, with the ability to work independently on multiple concurrent tasks. • Excellent documentation and report writing skills—both technical and executive-level reporting. • Comfortable working in fast-paced, high-alert environments with shifting threat priorities. Preferred (but not mandatory) • Experience working in a SOC, CERT, or CTI team within a government, financial, or enterprise security environment. • Proficiency in reading and understanding multiple languages (e.g., Russian, Farsi, Mandarin, Arabic) used in dark web forums. • Background in malware analysis, reverse engineering, or network forensics is a plus. What We Offer • A chance to work with a fast-growing global threat intelligence platform. • Access to proprietary tools and high-value threat data feeds. • A collaborative work environment with exposure to world-class cybersecurity teams. • Opportunities to contribute to research reports that gain media, government, and industry attention. • Competitive compensation, learning incentives, and career growth. Show more Show less

Posted 1 month ago

Apply

4 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

L2 Threat Intelligence Analyst Location: Kochi, IndiaExperience: Minimum 4 yearsPosition Type: Full-time About FalconFeeds.io: FalconFeeds.io is a leading cyber threat intelligence platform developed by Technisanct, a cybersecurity company headquartered in India. Our platform specializes in real-time threat monitoring, dark web surveillance, ransomware tracking, and automated security alerts.Serving over 200 clients globally, including government departments and major corporations, FalconFeeds.io is at the forefront of proactive cyber defense. Role Overview:We are seeking a Level 2 Threat Intelligence Analyst with deep expertise in monitoring and analyzing threats from the dark web, profiling Advanced Persistent Threat (APT) groups, understanding ransomware tactics, and building detailed threat actor profiles. Key Responsibilities:Monitor and extract intelligence from dark web, deep web, and closed forums.Track and document activities of APT groups and ransomware affiliates.Build and maintain comprehensive threat actor profiles.Contribute to threat attribution and contextual threat assessments.Collaborate with internal detection and response teams to enhance visibility.Requirements:4+ years of experience in threat intelligence or cyber investigations.Strong working knowledge of dark web ecosystems and adversary behaviours.Proficiency with MITRE ATT&CK framework, threat intelligence platforms, and OSINT tools.Analytical mindset and strong report writing skills.

Posted 1 month ago

Apply

5 - 8 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. GDS SaT – EYP IDD IT – Cyber - Manager – India Competitive business today is all about making intelligent, informed decisions. As a Manager within EY GDS SaT you will help make that happen. You will be an important part of our diversely talented, highly experienced Cyber team and work at the forefront of high-profile transactions. The cyber team is part of the Integrated due diligence (IDD) team which is a competency within SaT EYP. GDS EYP IDD has a market-leading proposition to create and maximize value for our clients, whether they are acquiring or divesting assets, or undertaking operational restructuring. The opportunity Cyber team of EYP IDD competency works on the most complex and high-profile global transactions, across a broad portfolio of clients and industry sectors. We are a group of experienced cyber professionals bringing deep sector and functional knowledge to our clients. As a team, we provide variety of cyber services to our clients helping them with during the transaction life cycle i.e. Predeal, sign to close and post deal stages of any transaction. We offer services like Cyber due diligence, Cyber security (Maturity) assessment, Cyber Red flag assessment, Cyber PMO support for Buy & Integrate / Sell & Separate projects, Target operating model (ToM), etc. We prepare and execute separation and integration plans, identify ideas and sources of value enhancement, as well as advise on risk mitigation. Your Key Responsibilities As a Manager of Integrated due diligence function, you will be a vital member of the team supporting global EY practice teams to sell, manage and execute Cybersecurity focused projects.Lead client conversations and meetings, guide and mentor junior team members, understand the business requirements in transactions space and develop new cyber services to support the growth of cyber team.Part of your role will also involve developing experience across a range of different type of engagements, including pre-deal (e.g. Cyber due diligence, remediation cost estimates, Security spend benchmarking) and post-deal (e.g. integration / separation planning, Day 1 readiness, TSA support, project tracking etc). Having a commercial mind-set is key to this consulting-based role.Conduct security assessments, identify gaps and red flags assessing client’s on prem / cloud hosted applications, data and infrastructureConduct research on deep and dark web using various open-source intelligence (OSINT) tools to reveal potential data breaches, provide recommendations and roadmap to mitigate the security gaps. Develop assessment reports, target operating models, target state security strategy, security roadmaps, data privacy and protection assessment reports, Day one readiness plans, 100 days plan, benchmarking analysis from security costing perspectives. You will be exclusively focused on supporting transactions from a Cybersecurity perspective pre and post deal working primarily with Private Equity and Corporate clients executing deal mandates.You will be a vital member of the team advising clients across all industries and sectors. Supporting key decision makers in developing and executing strategies for transactions. You will work in a transaction environment operating under tight M&A timeframes and demands.Develop strong relationships with regional EYP practice teams and establish yourself as a trusted point of contact. You will also assist in aspects of business origination, including pitches and presentations, and attending meetings with clients to generate new business opportunities.Demonstrate strong knowledge in the Information and Cyber security and Data privacy area. Should be able to translate Cyber and data privacy risks in business language for business leaders at client side.Experience on strategic consulting engagements developing detailed, compelling and analytical PowerPoint/Word/Excel/Visio deliverables to convey complex thoughts and ideas. Skills And Attributes For Success Experience in a range of different type of engagements, including pre-deal (e.g. operational Cyber due diligence, carve-out planning), post-deal (e.g. integration planning, tracking) and restructuring (e.g. rapid cost reduction).Lead work-streams comprising members of the client and colleagues from our transactions and advisory practices.Lead meetings with senior client stakeholders to advise, shape and drive the strategy and planning for pre-deal diligence, integration, carve-out / separation and operational restructuring.Contribute to our practice development initiatives, supporting the continued focus on our team as a great place to work.Have innovative mindset to think out of the box for development of new services as per client needsAct as a role model and support development of junior team members, coupled with the recruitment and training responsibilities.Be flexible to support for broader IT, Cyber & Operational transaction work.Willingness to undertake international travel as per business requirement To qualify for the role, you must have 10-14 years with technical experience in information and cybersecurity management, security testing, privacy and data protection, IT Audits etcB Tech / M. Tech. / MCA/MBA /PGDM (part time / full time) from a reputed institute with a technology background. Excellent presentation and analytical skills to produce quality presentations for client executives. A leading cybersecurity qualification, such as CISSP, CISA, CCSP, CISM or ISO 27001 ISMS.Well versed with cybersecurity and privacy requirements as defined in GDPR & CCPA. Practical exposure to security framework and standards such as PCI, NIST & CIS, ISO 27001.Good understanding about cloud security risks and controls.Hands-on experience with internal/external security audits assessment and readiness around SOC 1, SOC 2 or SOX controls. In-depth knowledge on various security platforms and technologies such as DLP, Firewalls, Vulnerability Scanning, Penetration Testing & Security Incident Response. Ideally, you’ll also have Project management skillsStrong communication and presentation skills with proven experience of producing high quality reports, papers, presentations and thought leadershipProgram and project management expertise with demonstrable experience in managing and being responsible for the delivery of successful cyber programs What We Offer EY Global Delivery Services (GDS) is a dynamic and truly global delivery network. We work across six locations – Argentina, China, India, the Philippines, Poland and the UK – and with teams from all EY service lines, geographies and sectors, playing a vital role in the delivery of the EY growth strategy. From accountants to coders to advisory consultants, we offer a wide variety of fulfilling career opportunities that span all business disciplines. In GDS, you will collaborate with EY teams on exciting projects and work with well-known brands from across the globe. We’ll introduce you to an ever-expanding ecosystem of people, learning, skills and insights that will stay with you throughout your career. Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next. Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way. Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies