Home Job Listings Categories Locations

Cyber Threat Investigator

📍 India

Technology Ayurak AI

Job Description

Red Team Analyst (Investigation & Social Engineering)

Company:

Ayurak

Department:

Corporate Resilience / Offensive Operations

Role Summary

As a Red Team Analyst, you are a tactical specialist responsible for identifying and exploiting non-technical vulnerabilities within Ayurak’s corporate infrastructure. Your primary objective is to investigate high-value targets (personnel and data flows) and execute controlled social engineering \"sabotage\" to verify that our proprietary medical device data and NIH-related protocols cannot be compromised by human error or deceptive practices.

Key Responsibilities

1. Tactical Investigation & Reconnaissance

OSINT Execution:

Perform deep-dive research into corporate hierarchies, identifying administrative staff or third-party contractors with access to \"The Synapse.\" Log & Metadata Auditing:

Analyze system outputs (like the

index-DO0uonIm.js

logs) to find patterns in user behavior or recurring system errors that can be used as a \"hook\" for a social engineering pretext. Target Profiling:

Build dossiers on internal departments to understand their standard operating procedures for \"Medical Devices\" and \"Procedures\" to ensure your impersonation is flawless. 2. Social Engineering Execution (The \"Sabotage\")

Pretexting:

Execute \"Vishing\" (voice) and \"Smishing\" (SMS) campaigns to manipulate staff into bypassing security prompts during a simulated \"WebSocket connection drop.\" Baiting & Infiltration:

Deploy \"sabotaged\" internal documents—such as a fake \"NIH Compliance Update\"—to track how many analysts click unauthorized links or provide credentials. Physical/Digital Blending:

Test if an office or a secure digital session can be accessed by exploiting the \"distraction\" caused by a triggered

422 Unprocessable Entity

error on the booking platform. 3. Data Analysis & Vulnerability Mapping

Kill-Chain Documentation:

Map out the exact steps taken to achieve a \"successful sabotage,\" from initial investigation to data exfiltration. Failure Analysis:

Report on which \"Human API\" elements failed (e.g., a staff member providing a password reset over the phone without verification).

Technical Stack & Competencies

Skill Set - Tools & Tactics Investigation Maltego, Sherlock, SpiderFoot, and manual Google Dorks for NIH/Medical registries. Deception Social-Engineer Toolkit (SET), GoPhish, and specialized VoIP spoofing tools. Analysis Proficiency in reading browser console logs and understanding API response codes (4xx/5xx). Communication Elite-level rapport building and psychological manipulation techniques (NLP, elicitation). Export to Sheets

Candidate Profile: \"The Shadow Analyst\"

Detail Oriented:

You notice that a 422 error happens specifically at line 187 of the JS file and use that specific detail to sound like a \"Support Tech\" when calling a target. Adaptable:

You can switch personas from a \"Medical Device Technician\" to an \"Internal Audit Associate\" in seconds. Methodical:

You follow a strict investigative framework to ensure all \"sabotage\" is controlled, ethical, and documented for the defense team.

Why this role is critical at Ayurak

Code can be patched, but human nature is constant. As an Analyst, you find the \"bugs\" in our people and processes before an adversary turns them into a breach.

Ready to Apply?

Don't miss this opportunity! Apply now and join our team.

Job Details

Posted Date: March 5, 2026
Job Type: Technology
Location: India
Company: Ayurak AI

Ready to Apply?

Don't miss this opportunity! Apply now and join our team.