At Cohesity, we’re on a mission to secure the world’s data. We move fast, collaborate across teams and cultures, and embrace the freedom to solve challenges in innovative ways—creating endless possibilities.
To achieve our bold ambitions, we need self-driven, motivated team players ready to make an impact. We offer flexible work schedules, comprehensive benefits, and a culture where you can thrive. Explore our open roles and secure the next step in your career at Cohesity!
Pune - Panchshil - India (Office)
Full time
Posted 6 Days ago
R00708
Cohesity is a leader in AI-powered data security and management. Aided by an extensive ecosystem of partners, Cohesity makes it easy to secure, protect, manage, and get value from data — across the data center, edge, and cloud. Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale.
We’ve been named a Leader by multiple analyst firms and have been globally recognized for Innovation, Product Strength, and Simplicity in Design.
Join us on our mission to shape the future of our industry.
Cohesity is on a mission to radically simplify how organizations secure and manage their data, while unlocking limitless value. As a leader in data security and management, we make it easy to secure, protect, manage and derive value from data—across the data center, edge, and cloud. At Cohesity, we're a group of builders and go-getters who are committed to doing the right thing. We encourage you to come as you are, as our differences make us stronger.
We’ve been named a Leader by multiple analyst firms and are prominently featured in the Forbes Cloud 100 and CRN’s Coolest Cloud companies.
Join us and we'll lead the way together.
Your Skills Can Stop Cyber Threats – Come Secure with Us
The security team at Cohesity is on a mission to help organizations around the world protect their data and stay ahead of evolving cyber threats. Our mission is to help organizations around the world to safeguard their data and bounce back fast from ransomware attacks.
In this role, you will be responsible for identifying vulnerabilities through code analysis and reverse engineering, and documenting your findings with detailed reports, including proof of concept (PoC) and actionable recommendations. You will also provide suggestions to strengthen the overall security posture of the target systems. Staying up to date with the latest cybersecurity trends, emerging threats, and technologies is essential, as you will contribute implementation plans to enhance the security of our product.
HOW YOU’LL SPEND YOUR TIME HERE
You should be able to penetrate the applications, network, systems and have a diverse understanding of the current state of security, use best practices and be familiar with the vulnerability research process that includes foot printing, scanning, enumeration, systems hacking, escalation of privilege, and the tools that are deployed in each phase of the process.
You must be able to understand product architecture and identify attack vectors which could include standard as well as proprietary protocols and use methodologies like OWASP, SANS, NIST.
You should be able to find 0-Day vulnerability with code analysis or reverse engineer and create a report with the appropriate recommendations / POC of the identified vulnerabilities.
You should be able to do threat modelling of a feature and perform its validations. Additionally, you should have strong written communication skills to document and categorize the threat level of discovered vulnerabilities and make suggestions about how to improve the targets security posture.
You should have a strong understanding of technical domains like (Applications, Platforms, Networking, etc.) as well as human interaction domains (e.g., Social Engineering), as well as an awareness about current laws that may affect the way in which the analysis is conducted.
You should know modern authentication protocols and have a background of cyber security. You should be well versed in cloud computing technologies and have knowledge of Windows, Linux, Unix internals. Should have in depth understanding of network security: TCP/IP, DNS, proxies, firewall configuration, intrusion detection and prevention systems, IPSec and TLS/SSL. Experience with cryptography including symmetric and asymmetric cryptography, hashing and should be able to simulate Ransomware attacks and provide suggestions to defend them.
Experience with tools for conducting enumeration of target environment and configuration and penetrate by tools used for system hacking (e.g., password cracking), malware creation/deployment, network traffic sniffing, session hijacking, denial of service and SQL injection. Experience in developing payloads using applications or scripts (C++,Python, Shell etc.)
WE’D LOVE TO TALK TO YOU IF YOU HAVE MANY OF THE FOLLOWING
Preferred Certifications: Certified Information Systems Security Professional (CISSP) | Certified Ethical Hacker (CEH) | EC-Council certified Security Analyst (ECSA) | Offensive Security Certified Professional (OSCP) | Licensed Penetration Tester (LPT)
Minimum 5-7 years of experience in the Security Domain
Excellent communication skills and great collaboration
Familiarity with frameworks like NIST, MITRE ATT&CK, and CIS Controls
Good to have experience with SIEM, IDS/IPS, endpoint protection, and other security tools.
Knowledge of scripting (Python, Bash) or automation tools for security operations
For information on personal data processing, please see our Privacy Policy.
Disclosure Pursuant to Applicable State Equal Pay Transparency Laws
This position has a starting pay range of $MIN - $MID per year. Actual salary depends upon many factors, including a candidate’s skills, qualifications and experience, location, and salary expectations, and therefore a starting salary at the low end, high end, or even above the stated range may be offered. This position may also be eligible for bonus compensation, commission (if in a sales function), and/or equity grants. Additionally, full-time employees are eligible to participate in our comprehensive benefits framework, including health and wellness benefits, vacation, paid holidays and refresh days, 401(k) retirement plan, life and disability insurance coverages, and other benefits the Company may offer from time to time.
Equal Employment Opportunity Employer (EEOE)
Cohesity is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status or any other category protected by law.
If you are an individual with a disability and require a reasonable accommodation to complete any part of the application process, or are limited in the ability or unable to access or use this online application process and need an alternative method for applying, you may contact us at 1-855-9COHESITY or talent@cohesity.com for assistance.
Data Privacy Notice for Job Candidates:
For information on personal data processing, please see our Privacy Policy.
In-Office Expectations
Cohesity employees who are within a reasonable commute (e.g. within a forty-five (45) minute average travel time) work out of our core offices 2-3 days a week of their choosing.
Cohesity has received reports of scams where individuals purporting to be Cohesity HR representatives or even our CEO conduct bogus “employment interviews” via email or text, and then request payment as a condition for receiving an offer of employment. Please be aware that Cohesity and its subsidiaries do not conduct interviews by email or text, and will never request payment as a condition for applying for a position or receiving an offer of employment. These scam operators may also ask for your personal information (name, address, birthdate, social security number, etc.) which you should not provide to them. If you have been a target of such a scam, you should report it by contacting the U.S. Federal Trade Commission (see this FTC posting for further details: https://www.consumer.ftc.gov/articles/job-scams) the office of your state Attorney General, or the government agency responsible for investigating matters such as this where you reside.
Cohesity does not accept unsolicited resumes from external recruiters or staffing agencies. Any submission of an unsolicited resume to our resume database, directly to Cohesity hiring managers, or by other means will be considered gratis and no recruiting fee will be paid if an unsolicited candidate from a third-party recruiter is subsequently hired. Fees will be paid ONLY where an external recruiter has an executed service contract in place with Cohesity and resumes have been solicited by our Talent Acquisition team in connection to a specific job opening.