Security analyst for the injured web sites (contract) at Deviant, Inc.
Latest Job Opportunities in India
Discover top job listings and career opportunities across India. Stay updated with the latest openings in IT, government, and more.
Check Out Jobs!Read More
🔥 Security analyst for the injured web sites (contract) at Deviant, Inc.
explained
We are seeking a security analyst to work on the basis of each hour of your home office, with 100 % available during that time.
The following transformations are available:
Sunday – Thursday, from 3:00 am to 11:00 am Each time (40 hours/week)
Tuesday to Saturday, from 11:00 pm – 7:00 am Each time (40 hours/week)
Saturday to Sunday, 11:00 am – 7:00 pm East time (16 hours/week)
Candidates are encouraged in areas where these hours are in line with their regular working hours to apply. You don’t have to be based in the United States of America.
The contract rate for this role is $ 25-30 per hour, depending on experience.
Job title
We are looking for security analysts to join our care and response team. Our customers will help in support questions related to our products, investigate the storming of the site, as well as fix their sites and remove all traces of settlement.
In addition, the evidence will be collected from interventions that will help improve the discovery of our threats. You will need to determine how to infiltrate, collect all IOCS (settlement indicators), and work with our threat intelligence team on weakness and developing malware signing.
At the time of stopping your work, you will sort and verify the validity of the weakness reports provided through our Bug Bounty program. You will evaluate the effect to determine the priorities of the presentations, reproduce and analyze weaknesses in controlled environments, and determine the root causes of the source software. You will document the results, recommend reforms or rules for the allocated protection wall, and suggest the reward amounts based on severity and influence.
You will cooperate with developers, customer support and disclosure teams, as well as check the validity that corrections are sufficient once they are released.
General requirements:
- Very technical and very comfortable with a wide range of open source tools such as GRP, Find, etc.
- Classified and pronounced communication skills are excellent.
- The ability to interact with customers professionally.
- Work well in a team and work independently without additional guidance.
- Excellent analytical ability, the ability to think outside the box, and is keen to learn.
- Attention should be detail.
The specific skills we need for this position are:
- 3+ years of experience with WordPress required.
- Technical experience with weaknesses based on web applications in additions and topics WordPress.
- A strong understanding of WordPress hooks, how to use them, and how it can lead to weaknesses.
- 5+ years of experience in managing multiple Linux chimneys. (We do not support Windows.)
- 5+ years of experience with mysql.
- 2+ years of experience in procedure to process at risk web sites, including analysis of how to infiltrate, remove the infiltration vector, and restore the site to a fully functional condition.
- Experience in vulnerability is plus, which includes:
- The ability to develop evidence of concepts programming or theoretically to test the exploitation of weaknesses, and the general ability to read/understand proof of software and conceptual concepts.
- The ability to repeat the exploitation of weaknesses in the test environment.
- The ability to review the software instructions changes to determine whether the security vulnerability has been corrected and the correction was not for it.
- HTTP request/modification experience.
- Experience in working with the Burp Suite collection or similar agent software and correcting php errors.
- A strong understanding of normal expressions. You should be able to write expressions while flying to match the harmful code and remove only (it is often multi -shape) without affecting any legal code and writing the signatures of the malware of our products.
- The ability to write and read PHP, regular expressions, CRON functions, and JavaScript.
- Understand all the main types of weakness and the ability to explain it to the customer in terms of their understanding.
- The ability to analyze the registry files and determine how to storm.
- Certificates in the penetration test or forensic medicine are a strong addition.
- Help other teams during the stoppage period.
The recruitment process
We review all applications submitted and respond to all candidates within a week to two weeks.
- Please fill out the form presented in this application. The employment team will look at this first. The way you answer our model will determine whether your application moves to the next step. Please note that we read every answer and this model is an important part of our recruitment process.
- Candidates who seem to have the right skills from the initial application will be sent to a more detailed evaluation test for more skills evaluation.
- Participate in a series of phone interviews. We respect your time and keep the number of interviews that you will need to attend minimal. This is usually an interview or three interviews. All interviews are made without any involved travel.
- All contracts and recruitment offers successfully complete the background examination. The results of the background examination are considered in terms of its connection with the situation and do not exclude someone from a contract or work with the company.
- All positions require a trial period of about 2-3 weeks with minimal 10 hours per week. You will be paid for this short -term contract, and it will be used to assess whether both parties want to follow a continuous and regular employment relationship.
benefits
Full time remotely with a 100 % far -long company for more than 8 years.
Diversity in challenge
We appreciate diversity and do not distinguish based on race, color, religion, belief, national origin, origin, gender, age, physical, mental disability, military situation, veteran, sexual identity, sexual expression, marital status, sexual orientation, political ideology, economic situation, parental situation, or any other situation that is not related to performance.
Serve now
Let’s start the function of your dreams
👉 Read more at: Read Now
Tags: #Security #analyst #injured #web #sites #contract #Deviant
Written by on 2025-09-18 04:56:00
From: We Work Remotely: All Other Remote Jobs
🔥 Security analyst for the injured web sites (contract) at Deviant, Inc.
uncovered
We are seeking a security analyst to work on the basis of each hour of your home office, with 100 % available during that time.
The following transformations are available:
Sunday – Thursday, from 3:00 am to 11:00 am Each time (40 hours/week)
Tuesday to Saturday, from 11:00 pm – 7:00 am Each time (40 hours/week)
Saturday to Sunday, 11:00 am – 7:00 pm East time (16 hours/week)
Candidates are encouraged in areas where these hours are in line with their regular working hours to apply. You don’t have to be based in the United States of America.
The contract rate for this role is $ 25-30 per hour, depending on experience.
Job title
We are looking for security analysts to join our care and response team. Our customers will help in support questions related to our products, investigate the storming of the site, as well as fix their sites and remove all traces of settlement.
In addition, the evidence will be collected from interventions that will help improve the discovery of our threats. You will need to determine how to infiltrate, collect all IOCS (settlement indicators), and work with our threat intelligence team on weakness and developing malware signing.
At the time of stopping your work, you will sort and verify the validity of the weakness reports provided through our Bug Bounty program. You will evaluate the effect to determine the priorities of the presentations, reproduce and analyze weaknesses in controlled environments, and determine the root causes of the source software. You will document the results, recommend reforms or rules for the allocated protection wall, and suggest the reward amounts based on severity and influence.
You will cooperate with developers, customer support and disclosure teams, as well as check the validity that corrections are sufficient once they are released.
General requirements:
- Very technical and very comfortable with a wide range of open source tools such as GRP, Find, etc.
- Classified and pronounced communication skills are excellent.
- The ability to interact with customers professionally.
- Work well in a team and work independently without additional guidance.
- Excellent analytical ability, the ability to think outside the box, and is keen to learn.
- Attention should be detail.
The specific skills we need for this position are:
- 3+ years of experience with WordPress required.
- Technical experience with weaknesses based on web applications in additions and topics WordPress.
- A strong understanding of WordPress hooks, how to use them, and how it can lead to weaknesses.
- 5+ years of experience in managing multiple Linux chimneys. (We do not support Windows.)
- 5+ years of experience with mysql.
- 2+ years of experience in procedure to process at risk web sites, including analysis of how to infiltrate, remove the infiltration vector, and restore the site to a fully functional condition.
- Experience in vulnerability is plus, which includes:
- The ability to develop evidence of concepts programming or theoretically to test the exploitation of weaknesses, and the general ability to read/understand proof of software and conceptual concepts.
- The ability to repeat the exploitation of weaknesses in the test environment.
- The ability to review the software instructions changes to determine whether the security vulnerability has been corrected and the correction was not for it.
- HTTP request/modification experience.
- Experience in working with the Burp Suite collection or similar agent software and correcting php errors.
- A strong understanding of normal expressions. You should be able to write expressions while flying to match the harmful code and remove only (it is often multi -shape) without affecting any legal code and writing the signatures of the malware of our products.
- The ability to write and read PHP, regular expressions, CRON functions, and JavaScript.
- Understand all the main types of weakness and the ability to explain it to the customer in terms of their understanding.
- The ability to analyze the registry files and determine how to storm.
- Certificates in the penetration test or forensic medicine are a strong addition.
- Help other teams during the stoppage period.
The recruitment process
We review all applications submitted and respond to all candidates within a week to two weeks.
- Please fill out the form presented in this application. The employment team will look at this first. The way you answer our model will determine whether your application moves to the next step. Please note that we read every answer and this model is an important part of our recruitment process.
- Candidates who seem to have the right skills from the initial application will be sent to a more detailed evaluation test for more skills evaluation.
- Participate in a series of phone interviews. We respect your time and keep the number of interviews that you will need to attend minimal. This is usually an interview or three interviews. All interviews are made without any involved travel.
- All contracts and recruitment offers successfully complete the background examination. The results of the background examination are considered in terms of its connection with the situation and do not exclude someone from a contract or work with the company.
- All positions require a trial period of about 2-3 weeks with minimal 10 hours per week. You will be paid for this short -term contract, and it will be used to assess whether both parties want to follow a continuous and regular employment relationship.
benefits
Full time remotely with a 100 % far -long company for more than 8 years.
Diversity in challenge
We appreciate diversity and do not distinguish based on race, color, religion, belief, national origin, origin, gender, age, physical, mental disability, military situation, veteran, sexual identity, sexual expression, marital status, sexual orientation, political ideology, economic situation, parental situation, or any other situation that is not related to performance.
Serve now
Let’s start the function of your dreams
📌 Read more at: Source
Explore more: #Security #analyst #injured #web #sites #contract #Deviant
Written by on 2025-09-18 04:56:00
Source Feed: We Work Remotely: All Other Remote Jobs