Careers

we recognize that our success is driven by the exceptional talent of our team.

We are actively seeking motivated professionals who are committed to excellence and eager to contribute to shaping the future alongside us

Join our team and be a part of something exciting!

CyberVigilens provides Cyber Security consulting and risk advisory including Managed Network and Security Operation’s services to its customers. This helps CyberVigilens in addressing enterprise information systems and IT security requirements for customers across various verticals such as Pharma, Health care, Education, Defense and Government.

CyberVigilens provides 24*7 IT Network and Security Monitoring including managed implementation services. This is provided through its integrated state of art Next Generation NOC-SOC facilities located at Hyderabad. CyberVigilens also provides managed Governance Risk Compliance Audit & Assessment services for its customers.

As part of its growth plans CyberVigilens is planning to onboard professionals having multifaceted skills in different areas as described further in this JD.

Location – Hyderabad (Preferred). Other location candidates can also apply. This is not going to be a limitation for skilled candidates.

Network-based VAPT Services

Technology Tools:
Nessus, Tenble. Nmap, Qualys , Kali Linux , Rapid 7 other open source tools

Job responsibilites:
To conduct Vulnerability Assessment and revalidation testing on different Intranet and Internet IP devices
To carry out Internet and Intranet Penetration Testing on IPs, URL’s
To Identify vulnerabilities and potential impact
To review client network infrastructure , conduct due diligence and suggest risk remedial and mitigation action based on the testing results
To monitoring security alerts and build Threat Intelligence knowledge base
To build customized scripts using open source tools
To Generate custom client specific reports
To create technology specific scanning profiles

App Security Testing:
To conduct Application Security testing for Web, Mobile, client Server application to assess the vulnerabilities
To conduct Manual and Automated testing of Application, database
To conduct white, black , grey box testing
To Verify security controls as per Open Source Security Testing Methodology Manual (OSSTMM), OWASP, SANS
To Identify false positives and creating Proof-of-concept (PoC) for reporting
To Conduct source code review of different application
To Size and scope the effort estimates for doing application test
Define, maintain and enforce application security best practices
To Monitor and track progress of vulnerabilities found and maintain the history
To Explain and demonstrate vulnerabilities to application/system owners, and provide recommendations for mitigation
To Perform database vulnerability assessment
To Issue reports on assigned application and system scans

Education:
Recommended Education Level: Graduate
Highly Desirable : CEH, SSCP CISM and Optional (Good to have) Qualysguard, CCFP, CISSP, SANS
Essential: Good Analytical skills , Able to articulate and correlate .Sound Technical knowledge and Desirable: Able to work for long extended hours

Experience:
Minimum 3 years’ experience working in Conducting Application Security Testing and Source code review
In-depth experience in using Application Security testing tools like Accunitex,Burpsuite, Nicto, and others
Experience in Using tools like Checkmark , HP fortify for Secure Source code review
Rich experience in developing Shell scripts on open source platforms to carry out various customised tests
Minimum 2 years’ experience working in Conducting Security audits and testing in any of the 3 areas ( VA,PT, Application Security)
Experience in using and implementing various VA PT such as Nessus, Qualys , nmap, Metspolit,Wireshark, OpenVas, coreimpact
Rich experience in developing Shell scripts on open source platforms to carry out various customised tests
A suitable candidate should have following soft skills:
Effective communicator – verbal, written and presentation skills
Should have good communication skills & excellent customer interfacing skills
Should be good at time management & should have the ability & desire to learn new skills.
Should have good analytical/problem solving skills

Location:
Hyderabad (Preferred). Other location candidates can also apply. This is not going to be a limitation for skilled candidates.

SOC Analyst-L1

Job responsibilities
To detect Incidents by monitoring the SIEM console, Rules, Reports and Dashboards.
To Monitor the SIEM console resources to identify any anomalies
To report the incident to the concerned team along with the SOC.
To escalate the incident whenever the SLA’s are not met.
To monitor the health of the SIEM tool.
To assist SOC Analyst in incident workflow.
To assist SOC team in incident detection and resolving.
To communicate with external teams in proper incident resolution

Professional Skills
Experience
Minimum 2 years’ experience working in SOC/NOC/DC with focus on IT Security operations
2 year experience in IT/IT Security device management ( Firewalls, IPS)
2 year experience in operating SIEM product or log management tool
High-level understanding of TCP/IP protocol and OSI Seven Layer Model.
Basic knowledge of Windows and/or Unix-based systems/architectures and related security.
Intermediate level of knowledge of LAN/WAN technologies.
Existing experience with Wazuh and related SIEM platform is highly preferred.

Education
Recommended Education Level -Graduate

Certification
Essential: CEH,
Desirable: Arcsight or Qradar training, CISSP , Any Firewall , IPS product
Skills & Abilities Essential: Good Analytical skills, Able to articulate and correlate. Ready to work in shifts

SOC Analyst-L2

Job Responsibilities
To validate the Incidents reported by SOC operators.
To escalate timely when the SLA for alerting is not met.
To identify the incidents if there are any missed by SOC operators
To interact with external parties to resolve the queries relating to the raised incidents.
To manage the SIEM, incidents knowledge base.
To analyze logs feed as received from different log sources and define Use case scenarios
To generate the daily reports, weekly reports and monthly reports on time.
To maintain the timely delivery of reports & the updated and latest log baselines.
To participate in CAB Meeting &client Service Request
To scrub tickets and raise problem tickets and Backup of logs , reports
To handle SLA and followup of open tickets
To Perform BAU administration tasks of SIEM setup
Perform Change Management tasks and lead the CAB meetings
Onboarding of New clients, Capacity and configuration Management of SIEM
Integration of plugins / connectors from different Log sources and Configuring correlation rules
Making Use case and reviewing current Use case
Making custom dashboard for Management
Generating reports on SIEM performance & Monitoring and Managing Alert and Threat Database

Person Specifications
Experience
Minimum 4-8 years’ experience working in SOC/NOC/DC with focus on IT Security operations
2+ year experience in operating SIEM product and Log Management tools
2 year experience in IT/IT Security device management ( Firewalls, IPS, Content filtering, DLP, DDOS solutions)
2+ Experience in analyzing logs and correlate events
Knowledge of Security Risk, Threats, Vulnerabilities
Good working knowledge of Windows and/or Unix-based systems/architectures and related security.
Existing experience with Wazuh and related SIEM platform is highly preferred.

Certification
Essential: CEH, SSCP Any Firewall , IPS product , Content filtering
Desirable: Arcsight or Qradar training, CISSP , SANS ,CCFP

Skills & Abilities
Education Essential: Good Analytical skills , Able to articulate and correlate , Communications, Ready to work in Shifts (24*7)
Recommended Education Level -Graduate

Security Operations Centre Lead-L3/ SOC Senior Analyst- L3

Job responsibilites
To validate the Incidents reported by SOC operators.
To escalate timely when the SLA for alerting is not met.
To identify the incidents if there are any missed by SOC operators
To interact with external parties to resolve the queries relating to the raised incidents.
To manage the SIEM, incidents knowledge base.
To analyze logs feed as received from different log sources and define Use case scenarios
To generate the daily reports, weekly reports and monthly reports on time.
To maintain the timely delivery of reports the updated and latest log baselines.
To implement Client Service Request and participate in CAB Meeting
To scrub tickets and raise problem tickets, handle SLA and follow-up on open tickets
To Backup of logs , reports
To Perform BAU administration tasks of SIEM setup
To Perform Change Management tasks and lead the CAB meetings
To Onboard New clients in the SIEM environment
To perform Capacity and configuration Management of SIEM
To Integrate plugins / connectors from different Log sources
To Configure correlation rules
To Make Use case and review current Use case
To Make custom dashboard for Management
To Generate reports on SIEM performance
To Monitoring and Managing Alert and Threat Database
To conduct Anti-Phishing / Anti-Malware Testing

Prfoessional Skills
Education
Recommended Education Level -Graduate

Experience
Minimum 3-8 years’ experience working in SOC/NOC/DC with focus on IT Security operations
3+ year experience in operating SIEM product and Log Management tools
2 year experience in IT/IT Security device management ( Firewalls, IPS, Content filtering, DLP, DDOS solutions)
2+ Experience in analyzing logs and correlate events
Knowledge of Security Risk, Threats, Vulnerabilities
Good working knowledge of Windows and/or Unix-based systems/architectures and related security.
Knowledge of Malware Analysis tools

Certification
Essential: CEH, SSCP Any Firewall , IPS product , Content filtering, ISO 27001 LA and Desirable: Arcsight or Qradar training, CISSP , SANS ,CCFP

Skills & Abilities
Essential: Good Analytical skills , Able to articulate and correlate , Communications, Ready to work in Shifts (24*7)

NOC/SOC Floor Manager
The NOC/SOC Floor Manager is responsible for overseeing the day-to-day operations and management of the NOC/SOC team. This includes scheduling, training, task assignment, reporting, and coordination with internal teams and external parties. The Floor Manager ensures smooth operations, efficient workflow, and adherence to established processes and procedures.

Job responsibilites
Shift Scheduling and Management
Plan and manage 24×7 shift schedules for NOC/SOC engineers for the next 1-2 months, ensuring adequate coverage at all times.
Coordinate with engineers to fill any sudden shift vacancies, assigning the most suitable personnel to cover the shift.

Training and Certification Management
Manage training-related information for NOC/SOC engineers, assigning relevant tools and technique training as needed.
Track and follow up on the status of training programs and certifications for engineers and the organization.

Task Management and Coordination
Ensure that periodic daily, weekly, bi-weekly, monthly, and quarterly tasks are performed as scheduled, and appropriate tickets/files are updated accordingly.
Assign primary engineers to handle customer inquiries or requests, follow up until resolution, and ensure internal ticketing systems are updated.

Monitoring and Reporting
Manage and oversee any deployed employee monitoring solutions that track tasks performed by NOC/SOC engineers, including screenshots, screen recordings, and keystroke logging.
Assist in the evaluation, testing, and implementation of suitable employee monitoring tools as needed.
Review daily logs from employee monitoring tools and coordinate with internal teams/customers to address any concerns raised.
Ensure that high or critical alerts generated by NOC/SOC tools are assigned to primary owners and that responses are sent within stipulated time frames.
Coordinate the timely preparation of monthly reports for customers, including details on tickets raised, response/resolution times, brief incident summaries, and steps taken to prevent future occurrences. Ensure the latest status of all open tickets is included in the reports.

Knowledge Management and Continuous Improvement
Ensure that team members document resolution steps, techniques learned, and include screenshots/links for future reference.
Organize weekly or bi-weekly information/training sessions for team members to discuss issues resolved, lessons learned, and share knowledge.

Coordination and Communication
Organize daily scrum calls as needed to facilitate communication and collaboration within the team.
Coordinate with external teams for activities such as vulnerability assessments, penetration testing, malware analysis, governance, risk, and compliance (GRC), network issue resolution, on-site visits, and part replacements.

Other Duties
Perform any other duties as assigned by management to support the efficient operation of the NOC/SOC.

Qualifications
Bachelor’s degree in Computer Science, Information Technology, or a related field, or equivalent experience.
Minimum of 5 years of experience in a NOC/SOC environment, with at least 2 years in a supervisory or managerial role.
Strong understanding of network operations, security operations, and incident response processes.
Excellent communication, organizational, and problem-solving skills.
Ability to multitask, prioritize, and work under pressure in a fast-paced environment.
Proficiency in project management methodologies and tools.
Familiarity with industry-standard monitoring, ticketing, and reporting tools.

Please send your updated resume to hiring@cybervigilens.com