381 Cybersecurity Analyst jobs in Singapore
Cybersecurity Analyst
Posted today
Job Viewed
Job Description
As a Cyber Threat (SOC) Analyst, you are required to use data collected from a variety of cyber defense tools such as intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyse events that occur within the Company's environment. You are also required to perform 24x7 monitoring on both internal and external sources to maintain current threat condition and determine which security issues may have an impact on the Company and provide accurate evaluation of the incident for escalation.
Responsibilities:
- Responsible for round-the-clock surveillance of the Company's information assets using various cyber defense tools to monitor internal and external sources.
- Provide timely detection, identification and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities.
- Use cyber defense tools for continuous monitoring and analysis of system activities to identify malicious activity.
- Analyze and respond to threats, software, and hardware vulnerabilities.
- Develop scripts, fine-tuning SIEM rules and solutions to automate the triage and analysis process.
- Provide incident response (IR) support when required.
- Produce actionable cyber threat intel from various threat intelligence sources, both open and commercial sources.
- Actively hunt for indicators of compromise (IOCs) and threat actor groups and tactics, techniques, and procedures (TTPs) in the environment.
Requirements:
- Degree or Diploma in Computer Science, Computer Engineering, or Information Security related fields.
- At least 2 years of experience working in a Security Operation Centre (SOC) or Computer Emergency Response Team (CERT/CIRT).
- Strong ability to interpret the information collected by network tools (e.g., ping, traceroute, nslookup).
- Security certifications (e.g. GSEC, GCIH, GCIA, GCTI, GCFA, GCFE, GNFA) and scripting capabilities (i.e. Python, Bash or PowerShell) are a plus.
- Working experience with OWASP Top 10, CVSS, MITRE ATT&CK framework, Cyber Kill Chain and DevSecOps strongly preferred.
- Good knowledge of different types of network communication (e.g., Local Area Network, Wide Area Network, Metropolitan Area Network, Wireless Wide Area Network, Wireless local Area Network).
- Good knowledge of incident response and handling methodologies.
- Able to work 12-hours shift but shift patterns may change according to business needs.
Cybersecurity Analyst
Posted today
Job Viewed
Job Description
The scope includes the following:
- Maintain and administer security toolsets (such as IAM, DAM, and Key Management), ensuring the tools are functioning according to the security management plan.
- Respond and perform triaging of security alerts generated from the security toolsets in a timely manner according to SLA.
- Perform security scanning and testing by using the Vulnerability Assessment tools.
- Reporting and tracking vulnerabilities and risks, and ensuring timely patching is completed to comply with the stipulated resolution time.
- Assess the applicability of newly published security vulnerabilities to components used within the environment, track and report the status until they are closed.
- Co-develop process documents and participate in initiatives to fine-tune and streamline security operations.
- Skills:
- 1-3 years hands-on experience of using common security tools like IAM (eg.IBM ISAM), DAM (eg. IBM Guardium) and Vulnerability Assessment tool (eg. Tenable Nessus)
- Security certifications and AWS Cloud certified is preferable but not a must.
- Proficient in security control principles including SOD.
- Good attitude and passionate with discovery of security gaps and actively participate in problem-solving process.
Cybersecurity Analyst
Posted today
Job Viewed
Job Description
A Cybersecurity Analyst works in a team to monitor and protect an organisation from security breaches and vulnerabilities.
The scope includes the following:
- Maintain and administer security toolsets (such as IAM, DAM, and Key Management), ensuring the tools are functioning according to the security management plan.
- Respond and perform triaging of security alerts generated from the security toolsets in a timely manner according to SLA.
- Perform security scanning and testing by using the Vulnerability Assessment tools.
- Reporting and tracking vulnerabilities and risks, and ensuring timely patching is completed to comply with the stipulated resolution time.
- Assess the applicability of newly published security vulnerabilities to components used within the environment, track and report the status until they are closed.
- Co-develop process documents and participate in initiatives to fine-tune and streamline security operations.
- Skills:
- 1-3 years hands-on experience of using common security tools like IAM (eg.IBM ISAM), DAM (eg. IBM Guardium) and Vulnerability Assessment tool (eg. Tenable Nessus)
- Security certifications and AWS Cloud certified is preferable but not a must.
- Proficient in security control principles including SOD.
- Good attitude and passionate with discovery of security gaps and actively participate in problem-solving process.
Information Security
Security Operations
Remediation
Cyber Security
Key Management
Scripting
Security Management
Operating Systems
Windows
Threat Intelligence
Vulnerability Assessment
Network Security
DNS
Linux
CISSP
Firewalls
IT CyberSecurity Analyst
Posted today
Job Viewed
Job Description
We are hiring for IT CyberSecurity Analyst
Responsibilities- Perform cybersecurity monitoring for Client’s servers, networks, and applications
- Ensures integrity and protection of servers, networks, and applications through monitoring of vulnerability sources
- Analyse and correlate security event log from the in-scoped log source for supporting cybersecurity incident investigation
- Analyse the cyberattack anomalies and supply verdict of analysis
- Evaluate, response, and support cybersecurity incidents by adhering to established procedures including containment, eradication, recovery, and documentation
- Collaborate with infra and application teams to identify, resolve, and mitigate security events and/or an incident by advising appropriate countermeasures
- Perform triage on reported emails by correlating with other cybersecurity platforms and quarantine malicious emails from being intercepted by users
- Support Vulnerability Management practice by keeping track of its status, and advise on actionable remediation
- Understand, execute, and continuously improve Standard Operating Procedures (SOP) and security standards for the IT Security Operations team
- Keep abreast with the latest security advisory, notify respective system owners, and ensure implementation of appropriate cybersecurity measures
- Supply key metrics from various cybersecurity platforms for supporting periodic reporting needs
- Perform regular maintenance of the cybersecurity platform to ensure that it is running in an optimal condition including:
- Software or application patching, updating, or upgrading
- Completeness of ingested log sources
- Maintain IT Security Operations procedures documentation
- Diploma/degree in computer studies
- Min 2-3 years of experience working in a cybersecurity operations, incident response, vulnerability management or related field.
- Demonstrated experience in network security, server security, endpoint security, web security etc.
- Strong knowledge of security principles, technologies, and industry best practices.
- Experience with log analysis, malware analysis, and network traffic analysis.
- Excellent analytical and problem-solving skills, with the ability to quickly identify and respond to security incidents, analyze complex security issues and develop effective solutions.
- Experience in IT security/support operations with willingness to learn above mentioned tools are encouraged to apply.
Senior Cybersecurity Analyst
Posted today
Job Viewed
Job Description
Responsibilities:
Cyber Incident and Forensic Investigation
- Lead and conduct thorough cyber incident investigations, ensuring proper analysis of threats and breaches.
- Perform forensic analysis to understand the scope of security incidents and assist in data recovery, evidence preservation, and reporting
SOC Incident Monitoring and Investigation
- Oversee Level 2/3 SOC operations to ensure the timely identification and resolution of security threats.
- Coordinate and lead incident response efforts across various security systems, managing escalations effectively.
Vulnerability Assessment and Penetration Testing (VA/PT)
- Conduct vulnerability assessments and penetration testing on networks, systems, and applications.
- Provide actionable recommendations for remediation of identified vulnerabilities and ensure security measures are implemented.
Endpoint Security Management
- Implement and manage endpoint security solutions including anti-malware, encryption, and troubleshooting of endpoint devices.
- Ensure that all endpoints are secured in compliance with company security policies.
Ethical Hacking and Security Testing
- Perform hands-on ethical hacking, including penetration testing and vulnerability assessments, to assess and enhance organizational security posture.
Qualifications:
- Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or equivalent certifications.
- CISSP (Certified Information Systems Security Professional) or equivalent certification is highly preferred.
- 5+ years of experience in cybersecurity, with hands-on experience in incident response, digital forensics, and security engineering.
- Demonstrated experience in managing security operations within a Level 2/3 SOC environment.
- Proven experience in vulnerability assessments, penetration testing, and remediation strategies.
- Expertise in endpoint security tools and anti-malware solutions.
- Strong experience in ethical hacking and penetration testing practices.
- Deep understanding of common attack vectors and security tools (e.g., SIEM, IDS/IPS, endpoint protection).
- Strong knowledge of encryption protocols and endpoint protection strategies.
- Familiarity with network security principles, firewalls, VPNs, and intrusion detection systems.
- Ability to clearly explain complex security issues and incident findings to non-technical stakeholders.
Senior Cybersecurity Analyst
Posted today
Job Viewed
Job Description
We are seeking an experienced and highly skilled cybersecurity professional to join our dynamic team as a Senior Cybersecurity Analyst / Security Engineering Lead .
In this role, you will be responsible for leading advanced security engineering initiatives and providing oversight of incident monitoring and response activities within a Level 2/3 Security Operations Center (SOC) environment. You will play a critical role in proactively identifying, investigating, and mitigating security threats, as well as driving efforts to ensure robust endpoint protection and overall infrastructure security.
Responsibilities:
Cyber Incident and Forensic Investigation:
- Lead and conduct thorough cyber incident investigations, ensuring proper analysis of threats and breaches.
- Perform forensic analysis to understand the scope of security incidents and assist in data recovery, evidence preservation, and reporting.
SOC Incident Monitoring and Investigation:
- Oversee Level 2/3 SOC operations to ensure the timely identification and resolution of security threats.
- Coordinate and lead incident response efforts across various security systems, managing escalations effectively.
Vulnerability Assessment and Penetration Testing (VA/PT):
- Conduct vulnerability assessments and penetration testing on networks, systems, and applications.
- Provide actionable recommendations for remediation of identified vulnerabilities and ensure security measures are implemented.
Endpoint Security Management:
- Implement and manage endpoint security solutions including anti-malware, encryption, and troubleshooting of endpoint devices.
- Ensure that all endpoints are secured in compliance with company security policies.
Leadership in Security Engineering:
- Lead and mentor the security engineering team, providing guidance on the design, implementation, and maintenance of security systems.
- Oversee the development and deployment of proactive security measures, ensuring the team remains responsive to evolving cyber threats.
Ethical Hacking and Security Testing:
- Perform hands-on ethical hacking, including penetration testing and vulnerability assessments, to assess and enhance organizational security posture.
Requirements:-
Certifications:
- Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or equivalent certifications.
- CISSP (Certified Information Systems Security Professional) or equivalent certification is highly preferred.
Experience:
- 5+ years of experience in cybersecurity, with hands-on experience in incident response, digital forensics, and security engineering.
- Demonstrated experience in managing security operations within a Level 2/3 SOC environment.
- Proven experience in vulnerability assessments, penetration testing, and remediation strategies.
- Expertise in endpoint security tools and anti-malware solutions.
- Strong experience in ethical hacking and penetration testing practices.
Technical Skills:
- Deep understanding of common attack vectors and security tools (e.g., SIEM, IDS/IPS, endpoint protection).
- Strong knowledge of encryption protocols and endpoint protection strategies.
- Familiarity with network security principles, firewalls, VPNs, and intrusion detection systems.
Leadership & Communication:
- Excellent leadership, communication, and team management skills.
Ability to clearly explain complex security issues and incident findings to non-technical stakeholders.
Only shortlisted candidate will be notified.
Senior Cybersecurity Analyst
Posted today
Job Viewed
Job Description
In this role, you will be responsible for leading advanced security engineering initiatives and providing oversight of incident monitoring and response activities within a Level 2/3 Security Operations Center (SOC) environment. You will play a critical role in proactively identifying, investigating, and mitigating security threats, as well as driving efforts to ensure robust endpoint protection and overall infrastructure security.
Responsibilities:
Cyber Incident and Forensic Investigation:
- Lead and conduct thorough cyber incident investigations, ensuring proper analysis of threats and breaches.
- Perform forensic analysis to understand the scope of security incidents and assist in data recovery, evidence preservation, and reporting.
- Oversee Level 2/3 SOC operations to ensure the timely identification and resolution of security threats.
- Coordinate and lead incident response efforts across various security systems, managing escalations effectively.
- Conduct vulnerability assessments and penetration testing on networks, systems, and applications.
- Provide actionable recommendations for remediation of identified vulnerabilities and ensure security measures are implemented.
- Implement and manage endpoint security solutions including anti-malware, encryption, and troubleshooting of endpoint devices.
- Ensure that all endpoints are secured in compliance with company security policies.
- Lead and mentor the security engineering team, providing guidance on the design, implementation, and maintenance of security systems.
- Oversee the development and deployment of proactive security measures, ensuring the team remains responsive to evolving cyber threats.
- Perform hands-on ethical hacking, including penetration testing and vulnerability assessments, to assess and enhance organizational security posture.
Certifications:
- Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or equivalent certifications.
- CISSP (Certified Information Systems Security Professional) or equivalent certification is highly preferred.
- 5+ years of experience in cybersecurity, with hands-on experience in incident response, digital forensics, and security engineering.
- Demonstrated experience in managing security operations within a Level 2/3 SOC environment.
- Proven experience in vulnerability assessments, penetration testing, and remediation strategies.
- Expertise in endpoint security tools and anti-malware solutions.
- Strong experience in ethical hacking and penetration testing practices.
- Deep understanding of common attack vectors and security tools (e.g., SIEM, IDS/IPS, endpoint protection).
- Strong knowledge of encryption protocols and endpoint protection strategies.
- Familiarity with network security principles, firewalls, VPNs, and intrusion detection systems.
- Excellent leadership, communication, and team management skills.
- Ability to clearly explain complex security issues and incident findings to non-technical stakeholders.
Be The First To Know
About the latest Cybersecurity analyst Jobs in Singapore !
IT CyberSecurity Analyst
Posted today
Job Viewed
Job Description
Responsibilities:
- Perform cybersecurity monitoring for Client's servers, networks, and applications
- Ensures integrity and protection of servers, networks, and applications through monitoring of vulnerability sources
- Analyse and correlate security event log from the in-scoped log source for supporting cybersecurity incident investigation
- Analyse the cyberattack anomalies and supply verdict of analysis
- Evaluate, response, and support cybersecurity incidents by adhering to established procedures including containment, eradication, recovery, and documentation
- Collaborate with infra and application teams to identify, resolve, and mitigate security events and/or an incident by advising appropriate countermeasures
- Perform triage on reported emails by correlating with other cybersecurity platforms and quarantine malicious emails from being intercepted by users
- Support Vulnerability Management practice by keeping track of its status, and advise on actionable remediation
- Understand, execute, and continuously improve Standard Operating Procedures (SOP) and security standards for the IT Security Operations team
- Keep abreast with the latest security advisory, notify respective system owners, and ensure implementation of appropriate cybersecurity measures
- Supply key metrics from various cybersecurity platforms for supporting periodic reporting needs
- Perform regular maintenance of the cybersecurity platform to ensure that it is running in an optimal condition including:
- Software or application patching, updating, or upgrading
- Completeness of ingested log sources
- Maintain IT Security Operations procedures documentation
- Diploma/degree in computer studies
- Min 2-3 years of experience working in a cybersecurity operations, incident response, vulnerability management or related field.
- Demonstrated experience in network security, server security, endpoint security, web security etc.
- Strong knowledge of security principles, technologies, and industry best practices.
- Experience with log analysis, malware analysis, and network traffic analysis.
- Excellent analytical and problem-solving skills, with the ability to quickly identify and respond to security incidents, analyze complex security issues and develop effective solutions.
- Experience in IT security/support operations with willingness to learn above mentioned tools are encouraged to apply.
IT CyberSecurity Analyst
Posted today
Job Viewed
Job Description
We are hiring for IT CyberSecurity Analyst
Responsibilities:
- Perform cybersecurity monitoring for Client's servers, networks, and applications
- Ensures integrity and protection of servers, networks, and applications through monitoring of vulnerability sources
- Analyse and correlate security event log from the in-scoped log source for supporting cybersecurity incident investigation
- Analyse the cyberattack anomalies and supply verdict of analysis
- Evaluate, response, and support cybersecurity incidents by adhering to established procedures including containment, eradication, recovery, and documentation
- Collaborate with infra and application teams to identify, resolve, and mitigate security events and/or an incident by advising appropriate countermeasures
- Perform triage on reported emails by correlating with other cybersecurity platforms and quarantine malicious emails from being intercepted by users
- Support Vulnerability Management practice by keeping track of its status, and advise on actionable remediation
- Understand, execute, and continuously improve Standard Operating Procedures (SOP) and security standards for the IT Security Operations team
- Keep abreast with the latest security advisory, notify respective system owners, and ensure implementation of appropriate cybersecurity measures
- Supply key metrics from various cybersecurity platforms for supporting periodic reporting needs
- Perform regular maintenance of the cybersecurity platform to ensure that it is running in an optimal condition including:
- Software or application patching, updating, or upgrading
- Completeness of ingested log sources
- Maintain IT Security Operations procedures documentation
Requirements;
- Diploma/degree in computer studies
- Min 2-3 years of experience working in a cybersecurity operations, incident response, vulnerability management or related field.
- Demonstrated experience in network security, server security, endpoint security, web security etc.
- Strong knowledge of security principles, technologies, and industry best practices.
- Experience with log analysis, malware analysis, and network traffic analysis.
- Excellent analytical and problem-solving skills, with the ability to quickly identify and respond to security incidents, analyze complex security issues and develop effective solutions.
- Experience in IT security/support operations with willingness to learn above mentioned tools are encouraged to apply.
Information Security
Security Operations
Troubleshooting
Dashboard
Windows 10
Vulnerability Management
Cyber Security
Active Directory
Windows 7
Cybersecurity Framework Application
Compliance
Operating Systems
Windows
Web Security
Regulatory Requirements
Vulnerability Assessment
Network Security
CISSP
Malware Analysis
Technical Support
IT CyberSecurity Analyst
Posted 12 days ago
Job Viewed
Job Description
We are hiring for IT CyberSecurity Analyst
Responsibilities:
- Perform cybersecurity monitoring for Client’s servers, networks, and applications
- Ensures integrity and protection of servers, networks, and applications through monitoring of vulnerability sources
- Analyse and correlate security event log from the in-scoped log source for supporting cybersecurity incident investigation
- Analyse the cyberattack anomalies and supply verdict of analysis
- Evaluate, response, and support cybersecurity incidents by adhering to established procedures including containment, eradication, recovery, and documentation
- Collaborate with infra and application teams to identify, resolve, and mitigate security events and/or an incident by advising appropriate countermeasures
- Perform triage on reported emails by correlating with other cybersecurity platforms and quarantine malicious emails from being intercepted by users
- Support Vulnerability Management practice by keeping track of its status, and advise on actionable remediation
- Understand, execute, and continuously improve Standard Operating Procedures (SOP) and security standards for the IT Security Operations team
- Keep abreast with the latest security advisory, notify respective system owners, and ensure implementation of appropriate cybersecurity measures
- Supply key metrics from various cybersecurity platforms for supporting periodic reporting needs
- Perform regular maintenance of the cybersecurity platform to ensure that it is running in an optimal condition including:
- Software or application patching, updating, or upgrading
- Completeness of ingested log sources
- Maintain IT Security Operations procedures documentation
Requirements;
- Diploma/degree in computer studies
- Min 2-3 years of experience working in a cybersecurity operations, incident response, vulnerability management or related field.
- Demonstrated experience in network security, server security, endpoint security, web security etc.
- Strong knowledge of security principles, technologies, and industry best practices.
- Experience with log analysis, malware analysis, and network traffic analysis.
- Excellent analytical and problem-solving skills, with the ability to quickly identify and respond to security incidents, analyze complex security issues and develop effective solutions.
- Experience in IT security/support operations with willingness to learn above mentioned tools are encouraged to apply.