Careers

Cyberpwn was founded with a lot of intent and passion to transform the traditional way of doing cyber-consulting. We believed in ourselves to build a next-generation cyber consulting firm, which can help organizations become cyber resilient. But we alone cannot do it. We need equally passionate people, who are willing to take up challenges to create an impact. We at Cyberpwn are committed to providing a platform for our employees to nurture and nourish their skills.
At Cyberpwn, we offer you a career, then a job. We promise you a journey filled with immense learning, global exposure, and unlimited growth opportunities. Prepare yourself to take your career to the next step which includes competitive pay, flexible work arrangements, attractive perks, and sponsored training and certification programs. We are always interested in finding talented individuals with a combination of hands-on technical skills, an eye for detail, and a creative mind. If this sounds like you, then get in touch with us.
Work Culture

We have a not-so-formal work culture, that allows independence and values new ideas. We believe that a healthy, inspiring, and sustainable work culture is a collection of attitudes, beliefs, behaviors, and like-minded people. It is not about how many hours you work or when you work or where you work from, it is about delivering on the objectives you set for yourself to achieve. An environment, sans traditional hierarchy, allows an equal opportunity for everyone and enables you to express yourself. We take utmost care of our associates and ensure each individual gets to experience a well-balanced work-life environment. Our people are more valuable than our clients. A motto Cyberpwn lives by.
What We Have To Offer
Freedom
Do what you love to do, from a place you feel safe, comfortable about, with absolute freedom and independence. That’s the most precious thing a start-up can offer to its associates.
Competitive Pay
For the right candidate, we don’t mind breaching the so-called “Industry Standard”, when it comes to remuneration.
Millennial Work Culture
We empower our associates to voice their opinion and concerns. We foster & promote a culture of inclusiveness, innovation & mutual growth, where each individual is heard, each idea is brainstormed and every feedback is actioned upon.
Attitude Over Attire
We promote a casual, collaborative, and harmonious work environment, that doesn’t stress upon the archaic “Always Wear Formals” culture.
Integrated Learning
We believe in cross-skilling and up-skilling. Take advantage of our training and certification programs to enable yourself for tomorrow’s challenge.

Message from our CEO & Co-founder
" We founded Cyberpwn with a lot of passion and intent. Over the last few years, we have managed to build a team that is super skilled and supremely passionate about what they do. Most importantly, each one believes in what Cyberpwn aims to achieve. An exciting journey lies ahead of us. Join us and become a part of our growth story. Learn as you grow, grow as you learn. "Employees Speak





Opportunities At Cyberpwn
Job Description
- Determine client needs and expectations and participate in the development of the overall client service plan. Analyse, develop, and implement information security programs, including organizational design and key processes for our clients as per plans
- Design and develop cyber security strategies and programs for large and complex organizations
- Define and implement cyber risk management structures, governance models, organizational transformations in the areas of cyber security
- Develop security policies, processes, procedures. Map controls and compliance requirements. Responsible for risk assessments, gap analysis (against standards and benchmarks), risk mitigation strategy development.
- Roll out the GRC Cybersecurity controls framework while balancing the approach with end user experience and compliance
- Develop and tailor approaches, methods and tools to support clients cyber risk programs and initiatives
- Provide strategic and operational advice in the areas of safeguarding critical information. Identify areas requiring improvement in the client’s business processes to enable preparation of recommendations.Evaluate, implement and operationalize security controls, define metrics for measure performance and establish a framework for continuous monitoring and improvement and Play substantive role in internal and external client relationship and communication
- Interact with CxOs to define the roadmap for GRC strategy.
- Help build Cyber Transformation practice by getting involved in areas beyond engagement delivery such as pre-sales, RFP response, solution designing, competency development and Go to market strategies
- Create or help create though leadership content in the emerging areas of Cyber Strategy and Risk Transformation
- Proven self-starter; able to take initiative to build organization capability and to deliver committed results. Good analytical skills with high attention to detail and accuracy Operate at the capacity of Practice Lead and device strategy towards business growth by developing GTM content
- Lead the Risk advisory team as a whole and operate as a people manager
Skillset Required
- Must have done large scale cyber security framework implementation (ISO 27001 and / or any other framework) including technology selection and implementation
- Must have very good experience in carrying out risk assessments, writing policies, procedures and standards across all domains, including Secure SDLC, TPRM, IAM, HR Security, Interconnected Devices, BYOD, BCDR, End Point Security, Perimeter Security, Incident Response, VM & Patching, Change Management and so on.
- Must have experience in carrying out cyber risk & compliance audit and gap assessments
- Must have experience in the data privacy and protection area
- Experience in risk and control assessments in emerging technologies
- Ability to understand and correlate the risk data from various sources and effectively use it to monitor/showcase risk to the firm
- Experience in executive level risk reporting and visualization and ability to analyse data for data quality gaps
Job Description
- Independently perform POCs and client demonstrations
- Engage with Imperva and Client point of contacts to support in presales cycle.
- Lead a team to design and implement DAM solution for customers
- Provide end user enablement sessions for the implemented solution
- Define and refine deliverables as part of POCs and Implementations
- Draft proposals and SoWs.
- Effectively derive effort estimates for engagements
- Enable internal technical training sessions on DAM solution
- Act as the point of contact for any kind of technical clarification
- Ideate new solutions and innovation keeping DAM at the center
- Carry out health check assessments of an existing implementation and provide recommendation for optimization
- Support in presales activities of Managed Services engagements
Technical Requirements
- Hands on experience on Imperva DAM implementation and incident monitoring & resolution
- Must be good at identification and implementation of use cases and configuration of policies
- Should have knowledge on MX and Gateway installation , Integration of MX and Gateway.
- Validation and installation of Agent.
- Knowledge on creating Security and Audit policies, modifying policies on MX
- Should have knowledge on reporting, dashboard, MX console
- Good knowledge on DDL, DML, DCL.
- Should have understanding on MSSQL, MYSQL, MongoDB etc.
- Good understanding of security infrastructure, including but limited to Security Operations Centre.
- Security Certification:Any one of CEH/CHFI/GSEC/GMON/ITIL
- OEM Certification:
- Administering Imperva Security Infrastructure
- Database Security and Compliance
- IDSC: Imperva Data Security Certification
Job Description
- Support practice leads in carrying out customer discussions
- Support pre sales activities, such as development of POCs
- Get actively involved in engagements and deliver best in class solution
- Handling implementation and providing best solution available.
- Information gathering and UAT.
- Running user awareness program related to project.
- Open for learning new solutions and platform
- Support team to solve the issues and deliver the best.
- Support team to build learning platform for new solutions.
Technical Requirements
- CyberArk PAS deployment
- Components (CPM, PVWA, PSM, PSMP) and Vault installation and configuration
- Policy and platform configuration
- On boarding (manual and automation)
- Password and session management configuration.
- Troubleshooting (CPM, PVWA, PSM and Vault)
- Performing UAT
- Third party integration and plugin development.
- Documentation
Job Description
- Support practice leads in carrying out customer discussions
- Support pre-sales activities, such as development of POCs
- Get actively involved in engagements and deliver best in class solution
- Handling implementation and providing best solution available.
- Information gathering and UAT.
- Running user awareness program related to project.
- Open for learning new solutions and platform
- Support team to solve the issues and deliver the best.
- Support team to build learning platform for new solutions.
Technical Requirements
- CyberArk EPM deployment
- Policy and SET configuration
- Agent Deployment (manual and automation)
- Trusted Source configuration.
- Troubleshooting
- Performing UAT
- Third party integration.
- Documentation
Job Description
- Support practice leads in carrying out customer discussions
- Support pre-sales activities, such as development of POCs
- Get actively involved in engagements and deliver best in class solution
- Handling implementation and providing best solution available.
- Information gathering and UAT.
- Running user awareness program related to project.
- Open for learning new solutions and platform
- Support team to solve the issues and deliver the best.
- Support team to build learning platform for new solutions.
Technical Requirements
- CyberArk IAM deployment
- Policy configuration.
- Application integration
- User provisioning deprovisioning.
- MFA/SSO configuration
- Troubleshooting
- Performing UAT
- Third party integration.
- Documentation
Apply for positions GRC Analyst or Product Security Analyst.
Apply Now