26 Soc Analyst jobs in Singapore

GSOC Specialist

Singapore, Singapore PINKERTON (SINGAPORE) PTE LTD

Posted 16 days ago

Job Viewed

Tap Again To Close

Job Description

Roles & Responsibilities

The GSOC Specialist is embedded role with one of our major MNC client. The Regional Program Manager oversees the daily operations of the Global Security Operations Center (GSOC) ensuring successful project completion. The GSOC Specialist provides analysis on intelligence gathered and serves in leadership capacity as needed.

Please apply directly at

Essential Functions:

  1. Represent Pinkerton's core values of integrity, vigilance, and excellence.
  2. Monitor publicly available open sources using proprietary systems to provide a 24/7 tactical intelligence picture.
  3. Monitor geopolitical and weather events that may impact business travel and company events.
  4. Produce intelligence products to enhance the situational awareness and operational readiness, such as flash reports, daily reports, situational reports, verbal briefs, event and travel security assessments. Longer-term products may include working with Intelligence teams on assessments to facilitate the decision-making of cross functional teams.
  5. Coordinate travel security logistical support through providers.
  6. Escalate the GSOC leadership and crisis management teams during incidents and crisis events.
  7. Conduct check-ins on staff and offices during incidents and crisis events. Tally responses and provide regular updates to crisis management teams.
  8. Support intrusion alarm escalation protocols through attending to calls from alarm monitoring vendors and activating appropriate security response, when necessary.
  9. All other duties, as assigned.

Education, Experience, and Certifications:
Bachelor's degree in security studies, Political Science, International Relations, Intelligence, History, Geography or related disciplines. Minimum 2 years of experience in private/public sector intelligence, risk advisory, crisis management or working in a Security Operations Centre setting Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives.

Competencies:

  • Strong decision-making skills, critical thinking, and ability to remain calm under pressure.
  • Ability to receive and relay direction and have ability to multi-task and coordinate several incidents at once.
  • Familiarity with Open-Source Intelligence (OSINT) tools and/or access control and surveillance tools (e.g. CCURE, Everbridge, Genetec etc.) will be advantageous.

Working Conditions:
With or without reasonable accommodation, requires the physical and mental capacity to effectively perform all essential functions.

  • Exposure to sensitive and confidential information.
  • Regular computer usage.
  • Occasional reaching and lifting of small objects and operating office equipment.
  • Ability to adjust focus between close and distance vision.
  • Must be able to work any shift including evenings, weekends, and holidays to ensure the successful completion of work assignments.
  • Travel, as required.
Tell employers what skills you have
Ability to Multitask
Political Science
Weather
Security Operations
Critical Thinking
Business Travel
Geography
Access Control
Surveillance
Risk Advisory
Pressure
Flash
Vigilance
Crisis Management
International Relations
Travel Security
This advertiser has chosen not to accept applicants from your region.

SOC Analyst

079903 Anson Road, Singapore $5000 Monthly FLINTEX CONSULTING PTE. LTD.

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Roles and Responsibilities:


• Monitor network traffic, system logs, and security alerts to identify potential security incidents and unauthorized activities in a timely manner.

• esign, deploy, and manage threat detection rules and preventive security controls to safeguard critical systems and data in response to the latest threat landscape.

• P rform in-depth analysis of security events to determine the nature and scope of potential security incidents and recommend risk mitigation strategies. When necessary, carry out digital forensic for reporting and auditing purposes.

• C ntribute in threat hunting exercises or cyber projects to improve overall security posture. 


Qualifications & Experience:


• Tec nical know-how and experience in solutions such as but not limited to:

• N twork Security (F/W, IPS, VPN, NAC) - Fortigate, Palo Alto

• W b Security (WAF, Web isolation) - Cloudflare, Zscaler, Microsoft

• E dpoint Security (EDR, AV, DLP) - Crowdstrike, Microsoft

• T reat Monitoring - Qradar, GoogleSec Ops, Resilient, Claroty

• V lnerability Management – Tenable, Ivanti, Microsoft

• Clo d Security – Microsoft, Palo Alto

• Ide tity Management - Microsoft, CyberArk

• T reat Hunting and Simulation – Cymulate, Crowdstrike

• 3 y ars of relevant experience in SOC environment


This advertiser has chosen not to accept applicants from your region.

L2 SOC ANALYST LEAD

409051 Paya Lebar Road, Singapore $7500 Monthly YY SMART TECH PTE. LTD.

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Job Overview

We are seeking an L2 SOC Analyst Lead with active threat hunting, incident response, and team leadership experience to manage a 5-8 member SOC team serving government and critical infrastructure sectors.

Operating in 24/7 shifts, you will perform advanced triage, conduct forensic investigations, front client engagements, and maintain active cyber community involvement for real-time threat intelligence.

This role requires SC clearance and deep expertise in GovTech IM8/CSA requirements.

Duties and Responsibilities

Threat Operations Leadership:

  1. Lead daily shift operations with accountability for incident SLA adherence (MTTR <15 mins for P1 cases).
  2. Mentor L1 analysts in alert validation, triage techniques, and playbook execution.
  3. Conduct purple team exercises quarterly to validate detection capabilities.

Advanced Security Operations:

  1. Perform deep-dive investigations (memory/disk forensics, malware analysis) using tools:
  2. EDR (CrowdStrike/SentinelOne)
  3. SIEM (Splunk ES/QRadar with SOAR integration)
  4. Network analysis (Wireshark, Corelight)
  5. Lead proactive threat hunts using MITRE ATT&CK frameworks and threat intelligence.
  6. Develop custom detection rules (YARA, Sigma) for APT groups targeting SEA.

Client & Governance:

  1. Front incident response briefings for customers & stakeholders.
  2. Present monthly SOC reports to clients (threat trends, gap analysis, KPIs).
  3. Ensure compliance with IM8, NIST 800-53, and CSA Cybersecurity Act.

Threat Intelligence Integration

Maintain participation in:

  1. ASEAN CERT communities
  2. Threat intel platforms (MISP, ThreatConnect)
  3. Industry groups (ISC2 Singapore, ACSC Partnership Program)
  4. Disseminate actionable IOCs to team during shifts.
Requirements

Technical Competencies

Must-Have Tools Expertise:

  1. Incident Response - Velociraptor, Autopsy, SIFT Workstation
  2. Threat Hunting - Atomic Red Team, Kestrel analytics, ELK stack
  3. Forensics - Volatility, Rekall, FTK Imager
  4. CTI Management - MISP taxonomies, STIX/TAXII feeds, OpenCTI

Certifications:

  1. Required: CISSP, GCIH/GCFA, SC Security Clearance

Leadership & Experience:

  1. 5+ years in SOC roles with 2+ years leading teams in 24/7 environments.
  2. Proven track record.
  3. Managed ≥200 critical incidents annually
  4. Reduced false positives by ≥40% through detection engineering
  5. Led threat hunts uncovering ≥3 advanced persistent threats
  6. Government project experience (IM8, CSA Cyber Essentials, or equivalent).

Shift & Engagement Requirements

  1. Willingness for 12-hour rotational shifts (including nights/weekends).
  2. Monthly presentation of SOC reports to client CISOs.
  3. Quarterly threat briefings at events (e.g., GovWare, Cyber Security ASEAN).
This advertiser has chosen not to accept applicants from your region.

L1 Cyber Security SOC Analyst

409051 Paya Lebar Road, Singapore $5000 Monthly YY SMART TECH PTE. LTD.

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Job Overview

We are seeking for a vigilant L1 Security Operations Center (SOC) Analyst to join our 24/7 cybersecurity team.

Operating on 12-hour rotational shifts, you will perform real-time monitoring, threat detection, and initial incident response using SIEM/XDR platforms.

The role requires foundational knowledge of network security, log analysis, and attack vectors to defend against threats while escalating complex incidents to senior analysts.

This position is critical for maintaining our security posture across global digital assets.


Duties and Responsibilities

Continuous Monitoring & Detection:

  1. Monitor SIEM/XDR tools (e.g., Splunk, Sentinel, QRadar) for security alerts across networks, endpoints, and cloud environments.
  2. Analyze logs from firewalls, IDS/IPS, EDR, and other security tools to identify malicious activity.

Incident Triage & Response:

  1. Perform initial investigation and classification of security events (malware, phishing, DDoS).
  2. Execute predefined playbooks for containment (e.g., isolate hosts, block IPs).
  3. Escalate confirmed incidents to L2/L3 analysts with detailed documentation.

Threat Intelligence Utilization:

  1. Apply threat intelligence feeds (e.g., MITRE ATT&CK) to contextualize alerts.
  2. Monitor dark web/IoC sources for emerging threats relevant to the organization.

Reporting & Documentation:

  1. Document incidents in ticketing systems (e.g., Jira, ServiceNow) with timelines, actions taken, and evidence.
  2. Generate daily shift reports highlighting threat trends, false positives, and system health.

Tool Maintenance & Optimization:

  1. Tune SIEM rules to reduce false positives and improve detection accuracy.
  2. Validate security tool configurations (e.g., firewall policies, EDR rules).


Requirements

Education:

  • Diploma/Bachelor’s in Cybersecurity, IT, Computer Science, or related field.

Experience & Skills:

  • More than one year in security monitoring or more than 2 years in IT support/networking with security exposure.

Hands-on experience with:

  1. SIEM/XDR platforms (Splunk, Azure Sentinel, etc.)
  2. Security tools (EDR, firewalls, IDS/IPS, email security)
  3. OS security (Windows/Linux log analysis)

Understanding of:

  1. Networking (TCP/IP, DNS, VPN, HTTP/S)
  2. Common attack vectors (phishing, malware, brute force)
  3. Cloud security fundamentals (AWS/Azure/GCP)

Technical Certifications (Preferred):

  1. CompTIA Security+, CySA+, CEH, or equivalent entry-level security certs
  2. Vendor certifications (e.g., Splunk Core User, Microsoft SC-200)

Shift Requirements:

  1. Willingness to work 12-hour rotational shifts (day/night), including weekends/public holidays.
  2. Ability to maintain focus during high-pressure overnight shifts.

Soft Skills:

  1. Strong analytical thinking and attention to detail.
  2. Effective communication for cross-team escalation.
  3. Adaptability in fast-paced threat environments.
  4. Basic knowledge of ITIL/incident management processes.
This advertiser has chosen not to accept applicants from your region.

Incident Response Analyst II

Singapore, Singapore Astreya Inc

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time

Description

Incident Response Analyst II page is loaded

Incident Response Analyst II

Apply locations Singapore, Singapore time type Full time posted on Posted 3 Days Ago job requisition id R0012372 Incident & Problem Management

Analysts are responsible for the full lifecycle of incident management, from detection through to resolution and root cause analysis (RCA). This includes acting as incident commanders, maintaining SLAs, documenting actions, and providing insights to support continuous improvement efforts across teams and systems.

  • Investigate, report, and respond to alerts, incident response (war room, remote bridges).
  • Respond to incidents and critical situations in a calm, problem-solving manner, and conduct in-depth investigation of alerts.
  • Be the first line of defense using monitoring and automation tools to conduct investigation, classification, and triage, all within prescribed SLAs.
  • Provide deep understanding and intelligence of incident criticality and impact to resolver groups.
  • Ensure detailed records of alarm handling activities, including actions taken and resolutions in ticketing tools; file incident reports.
  • Act as incident commander during major incidents.
  • Understand internal/external communication methods and stakeholder responsibilities.
  • Support program managers and facilitate project deliverables, improving operational and engineering initiatives.
  • Conduct root cause analysis (RCA) to determine recurring problems.
  • Use in-depth questioning and analysis to determine the underlying cause of incidents or problems (Who, What, Where, When, Why).
  • Perform duties in compliance with SOPs, MOPs, Runbooks, and Playbooks.

Server, DCIM, Network and Traffic Alarms Operations

This function involves real-time monitoring of infrastructure alarms, determining the severity of alerts, escalating appropriately, and maintaining clear communications with resolver teams. It ensures uptime and system integrity across servers, network infrastructure, and environmental systems.

  • Continuously monitor alarm dashboards and systems.
  • Investigate and respond to alarms related to Network, Data Center Environment, Server Health, Facility Security, and Safety.
  • Identify and acknowledge incidents associated with alarms.
  • Assess incidents to determine their criticality and operational impact.
  • Engage resolver groups and escalate to higher tiers or management following established paths.
  • Maintain communication with teams, stakeholders, and incident responders.
  • Follow documented procedures to resolve incidents promptly and effectively.
  • Ensure accurate records of alarm handling and resolution activities in ticketing tools.
  • Comply with SOPs, MOPs, Runbooks, and Playbooks.

Threat Intelligence, Critical Event Management

Analysts monitor global threat feeds and operational alerts to protect ByteDance personnel and assets. Responsibilities include triaging alerts related to weather, security, travel, and regional instability, then coordinating appropriate response actions, escalating to law enforcement if necessary, and compiling response reports.

  • Monitor Everbridge Visual Command Center (VCC), InternationalSOS emails, and open-source tools for real-time incidents affecting ByteDance assets and travelers.
  • Monitor tools or queries for specific stakeholder requests.
  • Report on violence, severe weather, or threats to life, property, and assets.
  • Coordinate emergency responses, including with law enforcement if required.
  • Verify incident information accuracy through secondary sources.
  • Generate heatmaps to highlight affected areas during significant events.
  • Collaborate with security and operational teams for a coordinated response.
  • Implement incident containment and mitigation strategies.
  • Document incident details, response actions, and lessons learned.
  • Follow SOPs, MOPs, Runbooks, and Playbooks.

Physical Security and Safety

The analyst monitors access control systems, CCTV, and safety-related alarms (e.g., fire, electrical, leaks). Responsibilities include reviewing footage, responding to security anomalies, and reporting incidents to security engineering teams while ensuring compliance with safety procedures

  • Monitor Closed-Circuit Television (CCTV) and Access Control Systems (ACS).
  • Track alarms for safety events including electrical issues, fire hazards, equipment failures, and water leaks.
  • Review camera footage for quality and area coverage.
  • Investigate and report access control incidents.
  • Report findings to the Security and Safety Engineering teams.
  • Follow SOPs, MOPs, Runbooks, and Playbooks.
  • Familiarity with Lenel and Genetec systems.

Cloud Incident Response and Monitoring

As hybrid environments become more critical to business operations, IRC Analysts will be expected to monitor and support both on-premises infrastructure and cloud-based systems. Analysts will assist in identifying and responding to cloud-related incidents across platforms such as AWS, GCP, and Azure. Responsibilities include:

  • Real-time monitoring of cloud infrastructure using tools such as AWS CloudWatch, Azure Monitor, and GCP Stackdriver.
  • Incident triage and escalation of alerts related to cloud-based services and resources (e.g., compute, storage, networking).
  • Coordination with Cloud Engineers and DevOps teams during cross-environment incidents to ensure rapid resolution and clear communications.
  • Identification and classification of cloud service anomalies, including misconfigurations, degraded services, and unauthorized access attempts.
  • Understanding of cloud-native architectures such as virtual private clouds (VPC), IAM, container orchestration (e.g., Kubernetes), and serverless functions.
  • Documentation of root cause analysis (RCA) and corrective actions for cloud incidents, feeding back into playbooks and runbooks.
  • Basic scripting and automation skills (Python, Bash, or PowerShell) for incident analysis and tooling.
  • Awareness of cloud security protocols, including encryption, IAM policies, and compliance standards like ISO 27001 and SOC 2.
Qualifications

Required Qualifications / Soft Skills

  • 2+ years of experience in a NOC, command center, or similar 24/7 operations environment
  • Ability to quickly triage and prioritize multiple incidents based on risk
  • Knowledge of systems including IP Networks, DC Environment, and Server Health
  • Strong written and verbal communication skills
  • Works well under pressure and within deadlines
  • Excellent communication and collaboration abilities
  • Strong analytical and problem-solving skills
  • Ability to work independently and as part of a team
  • Familiarity with data protection laws such as GDPR
  • This is an on-site role at client facilities
  • Must be willing to work variable shifts, including nights, weekends, and holidays

Preferred Qualifications

  • Degree in Information Technology
  • Networking knowledge (IP, DNS, load balancing)
  • Experience with Grafana, ticketing systems, and DC infrastructure.
  • Certifications such as CompTIA Server+ or Schneider Electric DCCA
  • Experience with Lenel, Genetec, or Avigilon systems is a plus
  • Proficiency with programming/scripting tools

#J-18808-Ljbffr

Industry

Other

Category

IT & Technology

Sub Category

Database, Analytics & BI

This advertiser has chosen not to accept applicants from your region.

Incident Response Analyst II

Singapore, Singapore Astreya Inc

Posted today

Job Viewed

Tap Again To Close

Job Description

Description

Incident Response Analyst II page is loaded Incident Response Analyst II

Apply locations Singapore, Singapore time type Full time posted on Posted 3 Days Ago job requisition id R0012372

Incident & Problem Management Analysts are responsible for the full lifecycle of incident management, from detection through to resolution and root cause analysis (RCA). This includes acting as incident commanders, maintaining SLAs, documenting actions, and providing insights to support continuous improvement efforts across teams and systems. Investigate, report, and respond to alerts, incident response (war room, remote bridges). Respond to incidents and critical situations in a calm, problem-solving manner, and conduct in-depth investigation of alerts. Be the first line of defense using monitoring and automation tools to conduct investigation, classification, and triage, all within prescribed SLAs. Provide deep understanding and intelligence of incident criticality and impact to resolver groups. Ensure detailed records of alarm handling activities, including actions taken and resolutions in ticketing tools; file incident reports. Act as incident commander during major incidents. Understand internal/external communication methods and stakeholder responsibilities. Support program managers and facilitate project deliverables, improving operational and engineering initiatives. Conduct root cause analysis (RCA) to determine recurring problems. Use in-depth questioning and analysis to determine the underlying cause of incidents or problems (Who, What, Where, When, Why). Perform duties in compliance with SOPs, MOPs, Runbooks, and Playbooks. Server, DCIM, Network and Traffic Alarms Operations This function involves real-time monitoring of infrastructure alarms, determining the severity of alerts, escalating appropriately, and maintaining clear communications with resolver teams. It ensures uptime and system integrity across servers, network infrastructure, and environmental systems. Continuously monitor alarm dashboards and systems. Investigate and respond to alarms related to Network, Data Center Environment, Server Health, Facility Security, and Safety. Identify and acknowledge incidents associated with alarms. Assess incidents to determine their criticality and operational impact. Engage resolver groups and escalate to higher tiers or management following established paths. Maintain communication with teams, stakeholders, and incident responders. Follow documented procedures to resolve incidents promptly and effectively. Ensure accurate records of alarm handling and resolution activities in ticketing tools. Comply with SOPs, MOPs, Runbooks, and Playbooks. Threat Intelligence, Critical Event Management Analysts monitor global threat feeds and operational alerts to protect ByteDance personnel and assets. Responsibilities include triaging alerts related to weather, security, travel, and regional instability, then coordinating appropriate response actions, escalating to law enforcement if necessary, and compiling response reports. Monitor Everbridge Visual Command Center (VCC), InternationalSOS emails, and open-source tools for real-time incidents affecting ByteDance assets and travelers. Monitor tools or queries for specific stakeholder requests. Report on violence, severe weather, or threats to life, property, and assets. Coordinate emergency responses, including with law enforcement if required. Verify incident information accuracy through secondary sources. Generate heatmaps to highlight affected areas during significant events. Collaborate with security and operational teams for a coordinated response. Implement incident containment and mitigation strategies. Document incident details, response actions, and lessons learned. Follow SOPs, MOPs, Runbooks, and Playbooks. Physical Security and Safety The analyst monitors access control systems, CCTV, and safety-related alarms (e.g., fire, electrical, leaks). Responsibilities include reviewing footage, responding to security anomalies, and reporting incidents to security engineering teams while ensuring compliance with safety procedures Monitor Closed-Circuit Television (CCTV) and Access Control Systems (ACS). Track alarms for safety events including electrical issues, fire hazards, equipment failures, and water leaks. Review camera footage for quality and area coverage. Investigate and report access control incidents. Report findings to the Security and Safety Engineering teams. Follow SOPs, MOPs, Runbooks, and Playbooks. Familiarity with Lenel and Genetec systems. Cloud Incident Response and Monitoring As hybrid environments become more critical to business operations, IRC Analysts will be expected to monitor and support both on-premises infrastructure and cloud-based systems. Analysts will assist in identifying and responding to cloud-related incidents across platforms such as AWS, GCP, and Azure. Responsibilities include: Real-time monitoring of cloud infrastructure using tools such as AWS CloudWatch, Azure Monitor, and GCP Stackdriver. Incident triage and escalation of alerts related to cloud-based services and resources (e.g., compute, storage, networking). Coordination with Cloud Engineers and DevOps teams during cross-environment incidents to ensure rapid resolution and clear communications. Identification and classification of cloud service anomalies, including misconfigurations, degraded services, and unauthorized access attempts. Understanding of cloud-native architectures such as virtual private clouds (VPC), IAM, container orchestration (e.g., Kubernetes), and serverless functions. Documentation of root cause analysis (RCA) and corrective actions for cloud incidents, feeding back into playbooks and runbooks. Basic scripting and automation skills (Python, Bash, or PowerShell) for incident analysis and tooling. Awareness of cloud security protocols, including encryption, IAM policies, and compliance standards like ISO 27001 and SOC 2. Qualifications

Required Qualifications / Soft Skills 2+ years of experience in a NOC, command center, or similar 24/7 operations environment Ability to quickly triage and prioritize multiple incidents based on risk Knowledge of systems including IP Networks, DC Environment, and Server Health Strong written and verbal communication skills Works well under pressure and within deadlines Excellent communication and collaboration abilities Strong analytical and problem-solving skills Ability to work independently and as part of a team Familiarity with data protection laws such as GDPR This is an on-site role at client facilities Must be willing to work variable shifts, including nights, weekends, and holidays Preferred Qualifications Degree in Information Technology Networking knowledge (IP, DNS, load balancing) Experience with Grafana, ticketing systems, and DC infrastructure. Certifications such as CompTIA Server+ or Schneider Electric DCCA Experience with Lenel, Genetec, or Avigilon systems is a plus Proficiency with programming/scripting tools #J-18808-Ljbffr Industry

Other Category

IT & Technology Sub Category

Database, Analytics & BI
This advertiser has chosen not to accept applicants from your region.

Lead, Cybersecurity Incident Response

409051 Paya Lebar Road, Singapore $7500 Monthly SOURCEO PTE. LTD.

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description

Job Title

Lead, Cybersecurity Incident Response






Job Description & Requirements

Key Responsibilities

Lead the response to cybersecurity incidents, including malware infections, data breaches, and insider threats.


Minimum of 5 years of experience in lead Cybersecurity incident response

  • Strong expertise in incident response, threat hunting, and forensic analysis.
  • Experience with SIEM tools (e.g., Elastic, Splunk).
  • Proficiency in network security, malware analysis, and log analysis.
  • Familiarity with cloud security (AWS, Azure, GCP) and container security.
  • Experience with cloud security tools and AI-powered security analytics (AWS Guard Duty, Azure Sentinel, Google Chronicle).
  • Familiarity with AI/ML-driven anomaly detection and behavioral analysis techniques.
  • Knowledge of security solutions (EDR, XDR, NDR, WAF, Proxy, Firewall, Email Security).
  • Scripting and automation skills (Python, PowerShell, Bash).
  • Deep understanding of the MITRE ATT&CK framework, cyber kill chain, and machine learning models for cybersecurity applications.
  • Excellent communication and report-writing skills and the ability to work under pressure scenarios.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Soc analyst Jobs in Singapore !

Security Analyst/Engineer (SOC)

Singapore, Singapore NCS PTE. Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

Description

NCS is a leading technology services firm that operates across the Asia Pacific region in over 20 cities, providing consulting, digital services, technology solutions, and more. We believe in harnessing the power of technology to achieve extraordinary things, creating lasting value and impact for our communities, partners, and people. Our diverse workforce of 13,000 has delivered large-scale, mission-critical, and multi-platform projects for governments and enterprises in Singapore and the APAC region.

As a Security Analyst, this incumbent will perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise

What will you do?

  • Perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise
  • Conduct basic investigations of security events, including malware infections and unauthorized access attempts.
  • Determine the nature, mechanisms and scope of incident by performing event correlation and historical searches to determine the extent of a security compromise
  • Escalate complex or highly suspicious alerts for further investigation and response.
  • Record details of all activities, including investigations performed, findings and remediation steps taken.
  • Collects data, evidence, and context necessary for further escalation.
  • Perform event correlation across the In-Scope Institutions to identify similar attack pattern and spread of attack.
  • Handling case management, generating tickets and reports when required, and tracking open tickets until closure

The ideal candidate should possess:

  • Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, or related field.
  • Able to commit to 24/7 standby
  • 2-5 years of experience in SOC operations.
  • Team player and able to work independently.
  • Experience in analysing data and review alerts

We are driven by our AEIOU beliefs—Adventure, Excellence, Integrity, Ownership, and Unity —and we seek individuals who embody these values in both their professional and personal lives. We are committed to our Impact: Valuing our clients, Growing our people, and Creating our future .

Together, we make the extraordinary happen .

Learn more about us at ncs.co and visit our LinkedIn career site.

#J-18808-Ljbffr

Industry

Other

Category

IT & Technology

Sub Category

Quality Management

This advertiser has chosen not to accept applicants from your region.

Security Analyst/Engineer (SOC)

Singapore, Singapore NCS PTE. Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

Description

NCS is a leading technology services firm that operates across the Asia Pacific region in over 20 cities, providing consulting, digital services, technology solutions, and more. We believe in harnessing the power of technology to achieve extraordinary things, creating lasting value and impact for our communities, partners, and people. Our diverse workforce of 13,000 has delivered large-scale, mission-critical, and multi-platform projects for governments and enterprises in Singapore and the APAC region. As a Security Analyst, this incumbent will perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise What will you do? Perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise Conduct basic investigations of security events, including malware infections and unauthorized access attempts. Determine the nature, mechanisms and scope of incident by performing event correlation and historical searches to determine the extent of a security compromise Escalate complex or highly suspicious alerts for further investigation and response. Record details of all activities, including investigations performed, findings and remediation steps taken. Collects data, evidence, and context necessary for further escalation. Perform event correlation across the In-Scope Institutions to identify similar attack pattern and spread of attack. Handling case management, generating tickets and reports when required, and tracking open tickets until closure The ideal candidate should possess: Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, or related field. Able to commit to 24/7 standby 2-5 years of experience in SOC operations. Team player and able to work independently. Experience in analysing data and review alerts We are driven by our

AEIOU beliefs—Adventure, Excellence, Integrity, Ownership, and Unity

—and we seek individuals who embody these values in both their professional and personal lives. We are

committed to our Impact: Valuing our clients, Growing our people, and Creating our future

. Together, we

make the extraordinary happen

. Learn more about us at ncs.co and visit our LinkedIn career site. #J-18808-Ljbffr Industry

Other Category

IT & Technology Sub Category

Quality Management
This advertiser has chosen not to accept applicants from your region.

SOC Advanced Cyber Defense Analyst (AVP)

Singapore, Singapore Citigroup

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description
**Principle Responsibilities:**
+ Provide guidance to SOC Tier 1 and SOC Tier 2 analysts
+ Participate in major security events as subject matter expert.
+ Proactively hunt for potential malicious activities in the bank's environment
+ Research and identify emerging cyber security threats and validate detection capabilities of existing security technologies against the threats.
+ Enhance current deployment of commercial tools used by Security Operations Center.
+ Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
+ Identify redundant tasks and automate them to increase efficiency of the SOCteam
+ Utilize SOAR to develop playbooks for automating complex use cases
+ Evaluate new technologies against SOC requirements in proof of concepts
**Requirements:**
The candidate should have Security Operations Center / Threat Hunt / Incident Response experience. He/she should be able to perform the SOC analyst Tier 2 duties in addition to following experience and advanced threat analysis skills:
+ 5+ years working in the security & operations fields
+ Bachelor's Degree or higher preferred
+ Possess strong fundamental knowledge of network (TCP/IP) and operating system (Windows/Linux)
+ Hands-on experience with cyber security solutions; SIEM, AV, NIDS, EDR etc
+ Ability to investigate network traffic, read and interpret logs and packet captures
+ Experience in web/shell programming and debugging codes
+ Experience in cloud computing and security controls
+ Familiar with malware and memory analysis techniques
+ Critical thinking and analytical skills
+ Good written and oral communications skills
+ Team player with the ability to work independently
+ Experience in Reverse-engineering of malware and/or Web application attack is a plus
---
**Job Family Group:**
Technology
---
**Job Family:**
Information Security
---
**Time Type:**
Full time
---
_Citi is an equal opportunity employer, and qualified candidates will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other characteristic protected by law._
_If you are a person with a disability and need a reasonable accommodation to use our search tools and/or apply for a career opportunity review_ _Accessibility at Citi ( _._
_View Citi's_ _EEO Policy Statement ( _and the_ _Know Your Rights ( _poster._
Citi is an equal opportunity and affirmative action employer.
Minority/Female/Veteran/Individuals with Disabilities/Sexual Orientation/Gender Identity.
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Soc Analyst Jobs