Cyber Security Analyst - Intern

Bengaluru, Karnataka

Applications have closed

Zeotap

Unlock the full potential of your customer data with Zeotap, the best-of-breeds CDP solution. Gain strategic insights for seamless data-driven success.

View company page

About the company
Zeotap is the next-generation Customer Data Platform. It empowers brands to unify, enhance and activate customer data in a cookieless future, all while putting consumer privacy and compliance front and centre. Recognised by Gartner as a “Cool Vendor”, Zeotap works with over 80 of the world’s top 100 brands, including Audi, Unilever and Virgin Media. It is also the founding member of ID+, a universal marketing ID initiative.

Responsibilities:

  • You play a key role in the design and development of applications including application security assessment, vulnerability assessment, penetration testing and source code review. 
  • You track the centralised log monitoring (SIEM) solution and monitor security feeds streaming from various sources, investigate intrusion attempts and perform in-depth analysis of exploits, indicators of compromise and other possible alerts generated by the SIEM tool.  
  • You analyse a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident, event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defence countermeasures, vulnerability management, and log analysis 
  • You review and maintain network security on Zeotap and client VPCs, and suggest new security detection & protection solutions and tools to the Head of InfoSec.
  • You explore and operationalise new security tools and technology at Zeotap  
  • You conduct proactive threat research and offensive analysis You actively participate in internal InfoSec compliance activities.
  • You analyse the vulnerabilities reported by independent security researchers via Zeotap’s vulnerability disclosure program
  • You adhere to Zeotap’s company, privacy and information security policies and procedures. 
  • You complete all the awareness trainings assigned on time  

Requirements:

  • Good understanding of application security frameworks, vulnerability assessments and penetration testing (OWASP, SANS, PTES etc.)
  • Theoretical knowledge about Security Operations Centre (SOC), SIEM monitoring tools- log analysis, packet analysis and packet capture tools, TCP/IP networking, and reverse engineering
  • Basic understanding of common databases and web technologies
  • Good understanding of cloud security 
  • Knowledge on security testing tools like burp, nessus, metasploit, 
  • Solid knowledge of computer networks and common protocols: TCP/IP, UDP, DNS, FTP, SSH, SSL/TLS, HTTP, and etc.
  • Proficiency in one or more programming/scripting languages (Python, Go, C/C++).
  • In-depth technical knowledge of Linux Operating Systems.
Zeotap welcomes all – we are equal employment opportunity & affirmative action employers. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender perception or identity, national origin, age, marital status, protected veteran status, or disability status. Interested in joining us? We look forward to hearing from you!

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security C C++ Cloud Compliance DNS Exploits Firewalls Linux Log analysis Metasploit Monitoring Nessus Network security OWASP Pentesting Privacy Python Reverse engineering SANS Scripting Security assessment SIEM SOC SSH TCP/IP Threat Research TLS Vulnerabilities Vulnerability management

Region: Asia/Pacific
Country: India
Job stats:  72  42  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.