Threat Research (Malware Research) K7 Computing Private Limited

  • company name K7 Computing Private Limited
  • working location Office Location
  • job type Full Time

Industry Type - IT - Software

Category: Others

Experience: 0 - 1 years required

Pay: ALL 300000 - ALL 400000 /year

Type: Full Time

Location: Chennai

Skills: User Research, Research Analysis, Legal Research, Market Research

About K7 Computing Private Limited

K7 Computing is one of the earliest and most accomplished cyber security companies protecting more than 25 million clients worldwide against threats to their IT environment. We are recognized as a leader in providing safe and secure computing experience for home users as well as enterprise users across various industries.

Job Description

JD for Vulnerability Researcher - Trainee

PRIMARY RESPONSIBILITIES (Job Description)

  • You will be part of a team of vulnerability researchers whose responsibilities are as follows -
  • Carry out vulnerability assessment for internal and external resources as requested
  • Critically analyse the nature of malicious exploits for popular software on different OSs and devices, including Android and IoT
  • Investigate security risks on popular social media forums such as Facebook and Twitter
  • Release regular technical updates on K7 Blog and via conference papers, etc to demonstrate the team’s technical acumen to the outside world
  • Provide data to support product’s vulnerability scanner
  • Interact with lab teams to support in various tasks and provide information and feedback as requested
  • Be a strong team player
  • Ensure that you deliver a high quality of service

COMPETENCIES REQUIRED:  (Skill , knowledge and  personal traits required)

Skills & Experience

Required:

  • Proficiency in the English language
  • Knowledge of the evolving vulnerability and threat landscape
  • Familiarity with virtualisation software
  • Comfort with Windows and Linux operating systems using both CLI and GUI
  • Excellent communication and documentation skills

Desired:

  • Basic understanding of Vulnerability assessment and related tools
  • Knowledge of networking protocols
  • Basic understanding of x86 assembly language and reverse engineering
  • Ability to programme in a scripting language such as perl or python
  • Basic understanding in analysing malicious code, especially shell code

 

 

 

 

 

Soft Skills & Behaviours

Required:

  • High standards of personal integrity
  • Excellent reliability. Ability to consistently execute complex tasks with precision, quality and within a defined time frame
  • Excellent communication within the team 
  • Ability to troubleshoot and resolve issues calmly and effectively
  • Drive and innovative instinct to consistently improve procedures and processes to augment your own career path whilst maximizing the utility for the organization

 

ADDITIONAL PROFESSIONAL CHARACTERISTICS REQUIRED: (Educational qualification, professional training , certification required for the post)

  • Any science degree (Required)
  • Bachelor’s/Master’s in Computer Science/Information Technology (Desired)

 

 

 

Disclaimer: Mytat has no control over the content of the job listings or any other/related information posted on the mytat.co website by third parties. Mytat shall not be responsible or liable for the content, accuracy, completeness, legality, reliability, or availability of information displayed on mytat.co website. The users are advised to verify the information / job listings available on the mytat.co website independently. Under no circumstances shall Mytat be liable to any user on account of user's use or misuse of or reliance on any job listings made or for any information available on the mytat.co website.