
Search by job, company or skills
About MoEngage:
MoEngage is an insights-led customer engagement platform trusted by 1,350+ global consumer brands, including McAfee, Flipkart, Domino's, Nestle, Deutsche Telekom, and OYO. MoEngage combines data from multiple sources to help brands gain a 360-degree view of their customers. arms marketers and product owners with insights into customer behavior.
Brands can leverageto orchestrate journeys and build 1:1 conversations across the website, mobile, email, social, and messaging channels., the transactional messaging infrastructure, helps unify promotional and transactional communication to a single platform for better insights and lower costs. MoEngage'shelps marketers develop winning copies and creatives, optimize campaigns and channels that boost engagement, and help with faster execution.
For over a decade, consumer brands in 60+ countries have been using MoEngage to power digital experiences for over a billion monthly customers. With offices in 15 countries, MoEngage is backed by Goldman Sachs Asset Management, B Capital, Steadview Capital, Multiples Private Equity, Eight Roads, F-Prime Capital, Matrix Partners, Ventureast, and Helion Ventures.
MoEngage was named a Contender in The Forrester Wave: Real-Time Interaction Management, Q1 2024 report, and Strong Performer in The Forrester Wave 2023 report. MoEngage was also featured as a Leader in the IDC MarketScape: Worldwide Omni-Channel Marketing Platforms for B2C Enterprises 2023.
The Security Operations Center (SOC) Intern will join our frontline defense team to gain practical, hands-on experience in real-time security monitoring, threat detection, and incident triage. This role is ideal for an aspiring cybersecurity professional eager to develop core skills in a fast-paced enterprise environment, serving as the Tier 1 analyst for incoming security alerts.
The intern will work under the supervision of SOC Expert and Cloud Security Engineers to perform the following duties:
Security Monitoring & Triage:
Monitor security alerts and events generated by our SIEM (Security Information and Event Management) platform (e.g., Splunk) and other security tools.
Perform initial triage on security alerts to distinguish between false positives and genuine security incidents.
Assess the severity and scope of confirmed incidents
Participate in defining playbooks and Standard Operating Procedures (SOPs).
Incident Handling & Documentation:
Create, update, and manage incident tickets with meticulous detail, documenting the timeline, analysis steps, and mitigation actions taken.
Assist in the containment and eradication of low-severity threats, such as confirmed phishing attempts or malware infections.
Log Analysis & Reporting:
Analyze security logs from various sources, including audit trails, operating systems (Windows/Linux), network devices, and applications.
Contribute to the creation of daily and weekly status reports summarizing security events and trends.
Tooling & Process Improvement:
Assist in tuning SIEM rules to reduce false positives and enhance the accuracy of threat detection.
Stay current with emerging cybersecurity threats and Indicators of Compromise (IOCs).
Education: Currently pursuing a Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a closely related technical field.
Technical Fundamentals:
Hands-on exposure to any SIEM tool (e.g., Splunk) or cloud security monitoring tools.
Basic knowledge of networking concepts (TCP/IP, DNS, HTTP, routing/switching).
Familiarity with Windows and Linux operating systems and how to review system security logs.
An understanding of common cyber threats (e.g., malware, phishing, brute force attacks, denial of service).
Desirable Experience :
Experience with scripting languages (e.g., Python, PowerShell) for basic automation or data analysis.
Familiarity with security frameworks (e.g., MITRE ATT&CK or the Cyber Kill Chain).
Soft Skills:
Strong analytical and critical thinking skills with a keen eye for detail.
Excellent written and verbal communication skills for clear incident documentation.
Ability to perform effectively under pressure and rapidly prioritize tasks in a high-alert environment.
High level of integrity and discretion when handling sensitive security information.
At MoEngage, we respect and value differences. We believe that when people from diverse backgrounds and perspectives collaborate, we create the most value - for our clients, our employees, and society. We embrace diversity and uphold a strong set of values. We are committed to inclusivity and take pride in providing equal opportunities for success and growth.
Employment atMoEngage is based solely on professional competence, skills, and experience. We stand firmly against all forms of discrimination and support equal rights and opportunities regardless of gender, ethnicity, abilities, age, identity, orientation or expression, marital status (including pregnancy), religion and beliefs, or any other status protected by law.
It is our policy to comply with all applicable national, state, and local laws related to non-discrimination and equal opportunity.MoEngage is truly a place where everyone can bring their passions, authentic selves, and talents to work, collaborating to drive progress and solve meaningful challenges.
Why Join Us!
At MoEngage, we are passionate about our team and technology - see below to know more about us.
We handle more than a billion messages every day. Rest assured, you will be surrounded by really smart and passionate people as we scale much more to build a world-class technology team.
MoEngage is a customer engagement platform, headquartered in San Francisco, California, United States with offices in Bengaluru, Jakarta, London, and Berlin, founded in 2014. MoEngage launched a product called NATIV in March 2016 to "help create personalized in-app experiences in minutes".[3] MoEngage also launched Smart Triggers, a mechanism for delivering one-to-one personalized push notifications.
Job ID: 143694091