Careers

Kernellix Cyber Defense and Response Center, established in 2014 in Yangon, provides solutions and services for organizations to prevent, detect, and respond to cyber threats. At Kernellix, we apply our knowledge and skills to help our clients build secure and resilient cyberspace. We value passion, talent, teamwork, and humility.

We are seeking like-minded individuals to join our team and grow together. If you have what it takes and interested in joining us, please send your profile to careers at kernellix dot com.

  1. Project Coordinator

  2. Sales Executives

  3. Security Analyst - Security Operations Center

  4. Security Analyst - Security Assessment

  5. Security Engineer - Security Operations Center


Project Coordinator

As a project coordinator, you will assist the head of departments in monitoring project schedules and deliverables. Your primary role is to ensure that clients, managers, and engineers are well informed about the project status.

Responsibilities

  1. Maintain and monitor project plans, schedules, resources and deliverables
  2. Coordinate with clients, engineers and managers to keep the project goals
  3. Arrange, attend and record project management meetings
  4. Develop and maintain project documentations including meeting minutes
  5. Assess project risks and issues and report to the stakeholders

Minimum qualifications:

  1. Proficient in Myanmar and, English
  2. Proficient in and Microsoft Office and collaboration tools such as GSuites, Slack
  3. Good understanding of project management tools and methodologies
  4. Good presentation, communication, and negotiation skills
  5. Strong organizational skills, including multitasking and time-management

Preferred qualifications

  1. Experience in project coordination/secretarial role
  2. Knowledge on file management and administrative procedures
  3. A profound understanding of culture and businesses in Myanmar
  4. Detailed oriented
  5. Good knowledge of cyber security trends and technologies

Sales Executive

As a sales executive, you will create new business relationships, generate sales, grow our customer network, and develop the cyber security industry in Myanmar.

Responsibilities

  1. Assess the market, establish the sales target, and achieve the sales number
  2. Prepare sales materials, develop sales plans, execute sales calls and close deals
  3. Understand the client needs to recommend relevant cyber defense solutions and services
  4. Provide market feedback to the engineering and operations team
  5. Actively participate in the cyber security awareness campaigns

Minimum qualifications:

  1. Experienced in developing sales strategies and tactics
  2. Strong local market knowledge and connections
  3. Strong experience in sales and marketing of technology products and services
  4. Excellent presentation, communication, negotiation, and influencing skills
  5. Proficient in Myanmar, English, and Microsoft Office

Preferred qualifications

  1. A profound understanding of culture and businesses in Myanmar
  2. Ability to influence decision-makers to close deals
  3. Ability to grasp the complex technical concepts quickly
  4. Familiarity with local laws and regulations
  5. Good knowledge of cyber security trends and technologies

Security Analyst – Security Assessment

As a security assessment analyst, you will conduct penetration testing, vulnerability assessment, and security architecture review on ICT infrastructure and applications. You will illustrate the risk of security vulnerabilities and provide advisory for the remediations.

Responsibilities

  1. Conduct penetration testing and vulnerability assessment projects
  2. Provide remediation advisories
  3. Develop internal tools, platforms, and knowledgebase articles to optimize the assessment operations
  4. Keep up-to-date with security advisories and evaluate the impacts on the society and clients
  5. Experiment new vulnerabilities, develop exploits and construct a proof of concepts to assess the risks and understand the impacts

Minimum qualifications:

  1. Experience in infrastructure security assessment or application vulnerability assessment
  2. Good knowledge of software vulnerabilities, exploits, and mitigation
  3. Strong understanding of attack vectors and remediations
  4. Strong understanding of networking protocol, application protocols, and cryptography
  5. Proficient in both Linux/Unix and Windows environment

Preferred qualifications

  1. Proficient in one or more modern programming language such as C++, C#, Java, Python and Go
  2. Strong understanding of operating systems architecture and security features
  3. Experience in fuzzing frameworks, reverse engineering and exploit development
  4. Ability to explain complex technical concepts to a non-technical audience.
  5. Have or willing to take information security certifications such as CREST, GIAC, ISACA, ISC2, and Offensive Security

Security Analyst – Security Operations Center

As a security operations analyst, you will actively monitor the ICT environment for cyber-attacks and intrusions, conduct regular threat hunting to look for adversary activities, and assist the infrastructure team in responding to threats.

Responsibilities

  1. Actively monitor the environment and investigate alerts
  2. Perform threat hunting to identify adversary activities in the environment
  3. Run and assist incident response and digital forensic projects
  4. Develop and maintain SIEM use-cases rules, alerts, and dashboards
  5. Develop and maintain incident response playbook

Minimum qualifications:

  1. Proficient in one or more modern programming language such as C++, C#, Java, Python and Go
  2. Strong understanding of networking protocol, application protocols, and cryptography
  3. Proficient in Windows and Linux/Unix environment
  4. Experienced in security monitoring platforms such as Elastics SIEM, FireEye, Suricata, and Zeek
  5. Strong understanding of attack methods, protection, detection, and response

Preferred qualifications

  1. Proficient in implementing and managing cloud services such as AWS, Azure, M365, Suites
  2. Experienced in configuring and securing infrastructure solutions such as CheckPoint, Cisco, Fortinet, Palo Alto, and pfSense
  3. Good understanding of cyber security controls and framework such CIS Controls, NIST CSF
  4. Ability to explain complex technical concepts to a non-technical audience.
  5. Have or are willing to take information security certifications such as CREST, GIAC, ISACA, ISC2, and Offensive Security.

Security Engineer – Security Operations Center

As a security engineer, you will build security tools and processes using a modern programming language such as Python, Go. You will also develop and review platforms and use cases to enhance our security operations center platform.

Responsibilities

  1. Write code to parse and analyze application logs, security events, and protocols
  2. Develop plugins to integrate heterogeneous infrastructure components such as security appliances and cloud infrastructure
  3. Implement security controls in our client infrastructure to enhance the security posture
  4. Develop SIEM rules, alerts, and IoC to detect the attacks and intrusions
  5. Develop and maintain SOC documentations

Minimum qualifications:

  1. Proficient in one or more modern programming language such as C++, C#, Java, Python and Go
  2. Strong understanding of networking/application protocols such as TCP/IP, HTTP, SSH, etc
  3. Proficient in Windows and Linux/Unix environment
  4. Experienced in security monitoring platforms such as Elastics SIEM, FireEye, Suricata and Zeek
  5. Strong understanding of attack methods, protection, detection, and response

Preferred qualifications

  1. Proficient in implementing and managing cloud services such as AWS, Azure, M365, GSuites
  2. Experienced in configuring and securing infrastructure solutions such as CheckPoint, Cisco, Fortinet, Palo Alto, and pfSense
  3. Good understanding of cyber security controls and framework such CIS Controls, NIST CSF
  4. Ability to explain complex technical concepts to a non-technical audience.
  5. Have or are willing to take information security certifications such as CREST, GIAC, ISACA, ISC2, and Offensive Security.