Become a part of one of the Fastest Growing Startup
Explore the following Active Opportunities
Steps to Apply:
- Send us your latest Resume & passport size picture on hr@trojanhuntindia.com with the Position Reference Number in email subject.
- For any queries you can reach us on +91-11-41671961 (Business Hours Apply)
Job Descriptions for THI21001 |
Reference Code: THI21002 |
Reference Code: THI21003 |
Reference Code: THI21001
Malware Researcher (L1 and l2)
Requirements |
Details |
Experience / Essentials |
|
Joining Time |
Immediate |
Educational Qualifications |
Mandatory:
Desirable:
|
Job Description
- Collaborate and developing, implementing & maintaining our threat intelligence platform & related tooling as it pertains to malware, malware analysis and malware handling system’s such as sandboxes.
- Collect analyze and author threat intelligence reports covering new threats, vulnerabilities & malware.
- Provide situational awareness on the current threat landscape & the TTPs associated with specific threats to our business, including ongoing malware campaign.
- Demonstrate practical knowledge managing threat data & creating intelligence assessments in support of our incident response & threat hunting missions.
- Collect data from intelligence communities, threat intelligence platform, open source data repositories and other sources to analyze TTPs and anomalies.
- Conduct detailed technical analysis supported by industry accepted threat intelligence analytical framework tools and standards.
- Ability to write automation to aid in malware analysis or design systems to assist in handling malware, such as sandboxes or malware intelligence platforms.
- Provide timely, relevant and pro-active analysis.
Cyber Threat Intelligence (l1 and L2)
Requirements |
Details |
Experience / Essentials |
|
Joining Time |
Immediate |
Educational Qualifications |
Mandatory:
|
Job Description
- Perform web application penetration testing using a variety of manual methods, tools and techniques.
- Exhibit extensive knowledge of industry standard web application penetration testing methods.
- Perform penetration tests against internal networks, wireless networks, mobile applications, thick client applications, embedded applications, hardware.
- Use testing methods to pinpoint ways that attackers could exploit weakness in security systems.
Smart Device Vulnerability Assessment (L2)
Requirements |
Details |
Experience / Essentials |
|
Joining Time |
Immediate |
Educational Qualifications |
andatory:
|
Job Description
- Identify new and existing Mobile Devices/IoT devices/ICS devices/Wireless Communication devices threats.
- Perform analysis and create detection methods.
- Develop analysis and detection tools
- Conduct deep research into specific families or attacks when necessary.
- Assist team with analysis and expertise of the mobile landscape and authoring descriptions for malware, Threat Advisories, whitepapers or blogs.
- Takes initiative and can work independently to meet team objectives.
- Self-motivated with the ability to stretch in times of crisis around malware outbreaks.
Solution Architect (L2)
Requirements |
Details |
Experience / Essentials |
|
Joining Time |
Immediate |
Educational Qualifications |
Mandatory:
|
Job Description
- Develops software solutions by studying information needs; conferring with users; studying systems flow, data usage, and work processes; investigating problem areas; following the software development lifecycle.
- Improves operations by conducting systems analysis; recommending changes in policies and procedures.
- Develop documentation, flowcharts, layouts, diagrams, charts, code comments and clear code.
Application security
Requirements |
Details |
Experience / Essentials |
|
Joining Time |
Immediate |
Educational Qualifications |
Mandatory:
|
Job Description
- Identify vulnerability in operating system or applications by either source code auditing in case of open source software or fuzzing.
- Develop fuzzer for identifying vulnerability in operating systems or applications.
- Fuzz the Operating system or applications to generate crashes and identify the vulnerability responsible for the crash.
- Analyzed the crashes and classify them based on security implications.
- Researches and Monitors new vulnerabilities and attacks on Operating Systems and Applications.
Vulnerability Research (L2 and L1)
Requirements |
Details |
Experience / Essentials |
|
Joining Time |
Immediate |
Educational Qualifications |
Mandatory:
|
Job Description
- Development of Windows and Linux Kernel Mode code modules (drivers, filters, shell code etc.)
- Research and Develop exploitation techniques for bypassing various mitigations in Windows and Linux.
- Crash Triaging and Exploit Development.
- Binary Patch Diffing to identify and exploit n-day vulnerabilities.
Linguist (L2)
Requirements |
Details |
Experience / Essentials |
|
Joining Time |
Immediate |
Educational Qualifications |
Mandatory:
|
Job Description
- Identify and evaluate new data sources.
- Conduct web-based research on “open” sources as well as the Darknet, Deep Web, and other restricted information sources.
- Develop and execute advanced analytics using our proprietary intelligence platform.
- Make fact-based assessments on a wide range of threats and risks affecting our clients.
- Generate intelligence reports and other deliverables.
- Gather, synthesize, and analyze open source intelligence information in support of objectives related to force protection, counterterrorism, counter-narcotics, and other areas.
Reference Code: THI0010 Senior information security consultant
Job Description
|
Reference Code: THI0011 vice president / President - sales
Contact HR on below mentioned details for this position. Reference Code: THI0012 HR Intern
Job Description
|