1,503 Cybersecurity Specialists jobs in Singapore
Manager, Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Singapore, Singapore
**Hours:**
40
**Line of Business:**
Technology Solutions
**Pay Details:**
We're committed to providing fair and equitable compensation to all our colleagues. As a candidate, we encourage you to have an open dialogue with a member of our HR Team and ask compensation related questions, including pay details for this role.
**Job Description:**
**Summary**
This is a lead role for the Protect Threat Intelligence (PTI) team within the Fusion Centre in our Singapore office. The successful candidate will support PTI's mission to provide timely, actionable, and relevant intelligence to its stakeholders within TD's follow-the-sun operating model. The candidate will be required to maintain a holistic view of the threat landscape for both current and emerging threats. The candidate should have broad intelligence collection and production expertise across a variety of intelligence functions, to include cyber, fraud, geopolitical and insider threat domains. This role requires an experienced manager familiar with leading and managing international teams to lead and coordinate intelligence operations within the Singapore Threat Intelligence Group supporting the Regional Operations. PTI operates an on-call rotation across the team (inclusive of this position).
**Job Description**
+ Enable cyber threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats.
+ Lead regional geopolitical threat analysis to assess emerging physical, cyber and other threats.
+ Use OSINT research and tooling to investigate top priority threats, applying deep knowledge of the MITRE ATT&CK framework and threat actor tradecraft.
+ Partner with Threat Management teams to understand events and support technical threat analysis of malicious cyber security incidents.
+ Identify and assess threats to supply chain by partnering effectively with Vendor Management in managing risk to TD, support response activities for supply chain incidents and pro-actively identifying emerging threats to supply chain.
+ Effectively author and review intelligence products and communications for stakeholders, operational personnel, and leadership.
+ Support cyber fraud intelligence capabilities by identifying and mitigating methods for account compromise and fraud.
+ Provide expertise and consultation to partners and/or stakeholders on a broad range of threats and emerging threats relevant to TD, its supply chain and the financial sector.
+ Proactively review internal processes and activities and identify opportunities for improvement.
+ Influence behavior to reduce risk and foster a strong technology risk management culture throughout the enterprise.
+ Drive APAC intelligence community engagement through active participation in the FS-ISAC ATIC and enhance TD's regional presence by building and expanding a robust intelligence network across the region.
+ Develop and deliver threat briefings.
**BREADTH & DEPTH**
+ 7 years experience or more in intelligence collection and production
+ 2 years experience or move of leading and managing teams
+ 2 years experience or more supporting international (follow-the-sun) operations
+ Experience and familiarity using common intelligence processes and tools, including a threat intelligence platform.
+ Proven superior oral and written communication skills and ability to translate complicated threat actor behavior to an executive audience.
+ Demonstrated tradecraft in open-source collection.
+ Excellent time management skills, including the ability to perform to a production calendar.
+ Demonstrated ability to lead shift handovers and transitions.
+ Demonstrated ability to stay abreast of emerging threat actor TTP's.
+ Advanced ability to apply real world geopolitical indicators to predict threat actor behavior.
+ Demonstrated knowledge of the current threat landscape, banking and technology standards and regulatory requirements.
**Who We Are**
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
**Our Total Rewards Package**
Our Total Rewards package reflects the investment we make in our colleagues to help them, and their families achieve their well-being goals. Total Rewards at TD includes a base salary and several other key plans such as health and well-being benefits, including medical coverage, paid time off, career development, and reward and recognition programs.
**Additional Information:**
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
**Colleague Development**
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
**Training & Onboarding**
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
**Interview Process**
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
**Accommodation**
If you require an accommodation for the recruitment / interview process (including alternate formats of materials, or accessible meeting rooms or other accommodation), please let us know and we will work with you to meet your needs.
Federal law prohibits job discrimination based on race, color, sex, sexual orientation, gender identity, national origin, religion, age, equal pay, disability and genetic information.
Cyber Threat Intelligence
Posted today
Job Viewed
Job Description
Must Have Skills
Threat Hunting - Hands-on experience conducting proactive threat hunts across endpoints, networks, and cloud; able to apply structured methodologies (MITRE ATT&CK, Diamond Model, PEAK, TAHITI, THMM).
Cyber Threat Intelligence (CTI) - Ability to develop/manage threat intel, map adversary behaviors, and translate findings into actionable intelligence fortechnical and executive stakeholders.
Incident Investigation & Analysis - Skilled in analyzing logs, network traffic,and endpoint data; conducting root cause analysis; documenting reports; and collaborating with IR and SOC teams.
Security Tools Proficiency - not specific but Experience with SIEM (e.g., Splunk, Sentinel), EDR/XDR platforms, network monitoring, data pipelines, and threat hunting tools.
Scripting & Automation - Proficiency in Python and/or PowerShell for developing custom scripts, automating hunts, and improving efficiency.
OS & Cloud Knowledge - Strong understanding of Windows, Linux, macOS; exposure to cloud environments (AWS, Azure, GCP) and container security.
Adversary Tactics & Malware Analysis - Knowledge of malware behaviors, intrusion techniques, and detection strategies to disrupt adversary activities.
Communication , Stakeholder Management & Reporting - Strong written and verbal skills to present findings, reports, and recommendations clearly to both technical teams and executives.
Day to day :
Threat Hunting and Analysis
•Conduct proactive threat hunting activities across various environments (endpoints, networks, cloud).
•Develop and maintain threat hunting hypotheses based on current threat intelligence and organizational risk assessments.
•Apply structured threat hunting methodologies leveraging frameworks such as MITRE ATT&CK, PEAK, TAHITI, THMM and Diamond Model to guide hypothesis creation, evidence collection and iterative improvements.
•Deep technical knowledge of adversary tactics, malware analysis, intrusion detection and cloud security.
Tooling and Automation
•Familiar with EDR/XDR solutions, SIEM platform, data pipeline and threat hunting tooling to detect and disrupt adversary tactics.
•Develop custom scripts and tools to automate threat hunting processes and improve efficiency.
•Leverage various threat hunting techniques, including but not limited to, YARA rules, IOC analysis, and behavioral based analysis.
Incident Investigation
•Analyze security logs, network traffic, and endpoint data to identify malicious activity and potential threats.
•Investigate security incidents and provide detailed reports on findings, including root cause analysis and remediation recommendations.
•Collaborate with other security teams (incident response, vulnerability management, etc.) to share threat intelligence and coordinate security efforts.
Cyber Threat Intelligence (CTI)
•Develop and manage Cyber Threat Intelligence while staying up to date on the latest threat landscape, attack techniques, and emerging technologies.
•Map advisory behaviors to ATT&CK techniques and translate findings into actionable intelligence.
•Share actionable intelligence with internal teams and external stakeholders.
•Present findings and recommendations to technical and executive audiences.
Continuous Improvement
•Contributes to the development and improvement of threat hunting strategies, processes and playbooks aligning with PEAK and TAHITI cycles for structural threat hunting.
•Develop and maintain a strong understanding of the organization's infrastructure and applications to strengthen awareness of evolving threats and adversary behavior.
•Drive maturing of the overall security operations service.
Tactics
MacOS
Security Operations
Remediation
Pipelines
Vulnerability Management
Powershell
Root Cause Analysis
Scripting
Incident Investigation
Python
Verbal Skills
Threat Intelligence
Intrusion Detection
Evidence
Malware Analysis
Threat Intelligence Specialist
Posted today
Job Viewed
Job Description
About the Role:
This is an exciting opportunity to join our team as a skilled Cyber Threat Hunting Strategist. As a key member of our security operations, you will play a vital role in detecting and disrupting adversary tactics.
Responsibilities:
* Conduct proactive threat hunting activities across various environments (endpoints, networks, cloud)
* Develop and maintain threat hunting hypotheses based on current threat intelligence and organizational risk assessments
* Apply structured threat hunting methodologies leveraging frameworks such as MITRE ATT&CK, PEAK, TAHITI, THMM and Diamond Model to guide hypothesis creation, evidence collection and iterative improvements
Required Skills & Qualifications:
* Familiar with EDR/XDR solutions, SIEM platform, data pipeline and threat hunting tooling to detect and disrupt adversary tactics
* Develop custom scripts and tools to automate threat hunting processes and improve efficiency
* Leverage various threat hunting techniques, including but not limited to, YARA rules, IOC analysis, and behavioral based analysis
Cyber Threat Intelligence (CTI):
* Develop and manage Cyber Threat Intelligence while staying up to date on the latest threat landscape, attack techniques, and emerging technologies
* Map advisory behaviors to ATT&CK techniques and translate findings into actionable intelligence
* Share actionable intelligence with internal teams and external stakeholders
Continuous Improvement:
* Contributes to the development and improvement of threat hunting strategies, processes and playbooks aligning with PEAK and TAHITI cycles for structural threat hunting
* Develop and maintain a strong understanding of the organization's infrastructure and applications to strengthen awareness of evolving threats and adversary behavior
Manager, Threat Intelligence
Posted today
Job Viewed
Job Description
Manager, Senior Threat Intelligence Analyst page is loaded# Manager, Senior Threat Intelligence Analystremote type:
Hybridlocations:
Singapore, Singaporetime type:
Full timeposted on:
Posted Todayjob requisition id:
R_ **Work Location**:Singapore, Singapore**Hours:**40**Line of Business:**Technology Solutions**Pay Details:**We’re committed to providing fair and equitable compensation to all our colleagues. As a candidate, we encourage you to have an open dialogue with a member of our HR Team and ask compensation related questions, including pay details for this role.**Job Description:***Summary**This role is for a Manager, Senior Threat Intelligence Analyst for the Protect Threat Intelligence (PTI) team. The successful candidate will support PTI's mission to provide timely, actionable, and relevant intelligence to its stakeholders within TD's follow-the-sun operating model. The candidate will be required to maintain a holistic view of the threat landscape for both current and emerging threats. The candidate should have broad intelligence collection and production expertise across a variety of intelligence functions, to include cyber, fraud, geopolitical and insider threat domains. This role requires an experienced manager familiar with leading and managing international teams to lead and coordinate intelligence operations within the Singapore Threat Intelligence Group supporting the Regional Operations. PTI operates an on-call rotation across the team (inclusive of this position).**Job Description*** Enable cyber threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats.* Lead regional geopolitical threat analysis to assess emerging physical, cyber and other threats.* Use OSINT research and tooling to investigate top priority threats, applying deep knowledge of the MITRE ATT&CK framework and threat actor tradecraft.* Partner with Threat Management teams to understand events and support technical threat analysis of malicious cyber security incidents.* Identify and assess threats to supply chain by partnering effectively with Vendor Management in managing risk to TD, support response activities for supply chain incidents and pro-actively identifying emerging threats to supply chain.* Effectively author and review intelligence products and communications for stakeholders, operational personnel, and leadership.* Support cyber fraud intelligence capabilities by identifying and mitigating methods for account compromise and fraud.* Provide expertise and consultation to partners and/or stakeholders on a broad range of threats and emerging threats relevant to TD, its supply chain and the financial sector.* Proactively review internal processes and activities and identify opportunities for improvement.* Influence behavior to reduce risk and foster a strong technology risk management culture throughout the enterprise.* Drive APAC intelligence community engagement through active participation in the FS-ISAC ATIC and enhance TD's regional presence by building and expanding a robust intelligence network across the region.* Develop and deliver threat briefings.**BREADTH & DEPTH*** 7 years experience or more in intelligence collection and production* 2 years experience or move of leading and managing teams* 2 years experience or more supporting international (follow-the-sun) operations* Experience and familiarity using common intelligence processes and tools, including a threat intelligence platform.* Proven superior oral and written communication skills and ability to translate complicated threat actor behavior to an executive audience.* Demonstrated tradecraft in open-source collection.* Excellent time management skills, including the ability to perform to a production calendar.* Demonstrated ability to lead shift handovers and transitions.* Demonstrated ability to stay abreast of emerging threat actor TTP’s.* Advanced ability to apply real world geopolitical indicators to predict threat actor behavior.* Demonstrated knowledge of the current threat landscape, banking and technology standards and regulatory requirements.**Who We Are**TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you’ve got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we’re here to support you towards your goals. As an organization, we keep growing – and so will you.**Our Total Rewards Package**
Our Total Rewards package reflects the investment we make in our colleagues to help them, and their families achieve their well-being goals. Total Rewards at TD includes a base salary and several other key plans such as health and well-being benefits, including medical coverage, paid time off, career development, and reward and recognition programs.**Additional Information:**
We’re delighted that you’re considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we’re committed to providing the support our colleagues need to thrive both at work and at home.
**Colleague Development**
If you’re interested in a specific career path or are looking to build certain skills, we want to help you succeed. You’ll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD – and we’re committed to helping you identify opportunities that support your goals.**Training & Onboarding**
We will provide training and onboarding sessions to ensure that you’ve got everything you need to succeed in your new role.**Interview Process**
We’ll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.**Accommodation**If you require an accommodation for the recruitment / interview process (including alternate formats of materials, or accessible meeting rooms or other accommodation), please let us know and we will work with you to meet your needs.**Our Values**
At TD we’re guided by our purpose to enrich the lives of our customers, communities and colleagues, and share a set of values that shape our culture and guide our behavior. In exchange for how our colleagues show up to help TD succeed, we are committed to delivering a colleague experience grounded in Impact, Growth and a Culture of Care. No matter where you work across TD, we empower you to make an impact at work and in your community, explore and grow your career and be part of our caring and inclusive culture.
**Our Commitment to Diversity, Equity, and Inclusion**
At TD, we’re committed
#J-18808-Ljbffr
Head, Cyber Threat Intelligence
Posted 5 days ago
Job Viewed
Job Description
Join to apply for the Head, Cyber Threat Intelligence role at IMDA
This role exists to lead and manage the team in the provision of Cyber Threat Intelligence to secure the Telecommunications and Media sectors and support national cybersecurity efforts within the vision and mission of IMDA.
Responsibilities
- Guide the team performing research and analysis of emerging or relevant cybersecurity threats impacting Telecommunications and Media sectors with threat assessment and sectoral impact.
- This includes attack techniques, vulnerabilities and exploits, threat detections rules, signatures (e.g., Yara, Snort), recommendations to detect or prevent related threats.
- Oversee regular or ad-hoc threat intelligence reports are produced are disseminated to key stakeholders, including advisories or alerts to operators are carried out according to Standard Operating Procedures.
- Supervise Security Engineers to ensure implemented systems and technologies support operational capabilities and comply to IT standards.
- This includes strategy and planning to build and operate Incident/Alert management system, Threat Intelligence Platform with integration to intelligence sources to synthesize across the sectors for dissemination and response.
Requirements
- Information Security/Technology, Computer Science/Engineering related qualification
- 10 years or more working experience in enterprise cyber security incident investigations digital forensics or cyber threat intelligence related areas and leading such teams
- Experience preparing and presenting threat briefings to information security and technology stakeholders in senior management, operations and to customers
- Experience publishing cyber threat, campaign or vulnerability exploit research
- Knowledge in telecommunications, broadcast, media equipment and technologies, enterprise environments
- Relevant professional certifications including GIAC GCFA, GREM, GCFE, GCIH or CREST CCTIM, CRTIA, CPTIA.
- Proficiency in Threat Intelligence Platforms deployment
- Strong analytical skills with passion to overcome challenges
- Strong influencing and communication skills
Only shortlisted candidates will be notified. Position will be commensurate with experience.
Seniority level- Director
- Full-time
- Information Technology
- Government Administration
Cyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
We are seeking a skilled and experienced Threat Hunter to work in the Security Operations team. The ideal candidate should be a proactive and resourceful individual with a passion for identifying and neutralizing advanced threats to strengthen the company's defenses. This role requires a deep understanding of threat hunting methodologies, a strong analytical mindset, and exceptional communication skills. The role is expected to potentially work overtime in the event of responding to Security Incident to accommodate and manage Group's Threat Intelligence services/program.
Key Responsibilities
Threat Hunting and Analysis
• Conduct proactive threat hunting activities across various environments (endpoints, networks, cloud).
• Develop and maintain threat hunting hypotheses based on current threat intelligence and organizational risk assessments.
• Apply structured threat hunting methodologies leveraging frameworks such as MITRE ATT&CK, PEAK, TAHITI, THMM and Diamond Model to guide hypothesis creation, evidence collection and iterative improvements.
• Deep technical knowledge of adversary tactics, malware analysis, intrusion detection and cloud security.
Tooling and Automation
• Familiar with EDR/XDR solutions, SIEM platform, data pipeline and threat hunting tooling to detect and disrupt adversary tactics.
• Develop custom scripts and tools to automate threat hunting processes and improve efficiency.
• Leverage various threat hunting techniques, including but not limited to, YARA rules, IOC analysis, and behavioral based analysis.
Incident Investigation
• Analyze security logs, network traffic, and endpoint data to identify malicious activity and potential threats.
• Investigate security incidents and provide detailed reports on findings, including root cause analysis and remediation recommendations.
• Collaborate with other security teams (incident response, vulnerability management, etc.) to share threat intelligence and coordinate security efforts.
Cyber Threat Intelligence (CTI)
• Develop and manage Cyber Threat Intelligence while staying up to date on the latest threat landscape, attack techniques, and emerging technologies.
• Map advisory behaviors to ATT&CK techniques and translate findings into actionable intelligence.
• Share actionable intelligence with internal teams and external stakeholders.
• Present findings and recommendations to technical and executive audiences.
Continuous Improvement
• Contributes to the development and improvement of threat hunting strategies, processes and playbooks aligning with PEAK and TAHITI cycles for structural threat hunting.
• Develop and maintain a strong understanding of the organization's infrastructure and applications to strengthen awareness of evolving threats and adversary behavior.
• Drive maturing of the overall security operations service.
Qualifications & Skill
Required
• Bachelor's degree in Computer Science, Cybersecurity, or a related field.
• At least 3+ years of experience in cybersecurity, with a minimum of 1-2 years focused on threat hunting.
• Strong understanding of various operating systems (Windows, Linux, macOS).
• Experience with various security tools and technologies (SIEM, EDR, network monitoring tools).
• Proficiency in scripting (Python, PowerShell).
• Strong analytical and problem-solving skills.
• Excellent communication and presentation skills to translate technical findings into business impact.
Preferred
• Experience with threat intelligence platforms, feeds and CTI frameworks.
• Relevant security certifications (e.g., SANS GIAC, GNFA, GCFA, Offensive Security, etc)
• Experience with cloud platforms (AWS, Azure, GCP) and container security is a plus.
Tactics
MacOS
Security Operations
Remediation
Vulnerability Management
Powershell
Root Cause Analysis
Scripting
Incident Investigation
Python
Operating Systems
Threat Intelligence
Intrusion Detection
Presentation Skills
Evidence
Malware Analysis
Head, Cyber Threat Intelligence
Posted today
Job Viewed
Job Description
Join to apply for the
Head, Cyber Threat Intelligence
role at
IMDA
This role exists to lead and manage the team in the provision of Cyber Threat Intelligence to secure the Telecommunications and Media sectors and support national cybersecurity efforts within the vision and mission of IMDA.
Responsibilities
Guide the team performing research and analysis of emerging or relevant cybersecurity threats impacting Telecommunications and Media sectors with threat assessment and sectoral impact.
This includes attack techniques, vulnerabilities and exploits, threat detections rules, signatures (e.g., Yara, Snort), recommendations to detect or prevent related threats.
Oversee regular or ad-hoc threat intelligence reports are produced are disseminated to key stakeholders, including advisories or alerts to operators are carried out according to Standard Operating Procedures.
Supervise Security Engineers to ensure implemented systems and technologies support operational capabilities and comply to IT standards.
This includes strategy and planning to build and operate Incident/Alert management system, Threat Intelligence Platform with integration to intelligence sources to synthesize across the sectors for dissemination and response.
Requirements
Information Security/Technology, Computer Science/Engineering related qualification
10 years or more working experience in enterprise cyber security incident investigations digital forensics or cyber threat intelligence related areas and leading such teams
Experience preparing and presenting threat briefings to information security and technology stakeholders in senior management, operations and to customers
Experience publishing cyber threat, campaign or vulnerability exploit research
Knowledge in telecommunications, broadcast, media equipment and technologies, enterprise environments
Relevant professional certifications including GIAC GCFA, GREM, GCFE, GCIH or CREST CCTIM, CRTIA, CPTIA.
Proficiency in Threat Intelligence Platforms deployment
Strong analytical skills with passion to overcome challenges
Strong influencing and communication skills
Only shortlisted candidates will be notified. Position will be commensurate with experience.
Seniority level
Director
Employment type
Full-time
Job function
Information Technology
Government Administration
#J-18808-Ljbffr
Be The First To Know
About the latest Cybersecurity specialists Jobs in Singapore !
Cyber Threat Intelligence Engineer
Posted today
Job Viewed
Job Description
We are seeking a CTI Engineer to lead our cyber security threat intelligence efforts. This role involves collecting and analyzing data to identify potential threats, developing strategies to mitigate them, and supporting incident response.
Key Responsibilities:
Develop and maintain threat intelligence processes and procedures to identify and mitigate potential threats.
Analyze data to identify patterns and trends, and provide actionable intelligence to support incident response and detection operations.
Conduct research and stay up-to-date on the latest methods and trends in threat intelligence analysis, and present findings to internal stakeholders.
Key Requirements:
A degree in Computer Science, Computer Engineering, or a related field, with at least 5 years of experience in cyber security, including 2 years in threat intelligence and threat hunting roles.
Familiarity with relevant regulations, including the Cyber Security Act 2018, Cybersecurity Code of Practice, and MAS Cyber Hygiene and Technology Risk Management Guidelines.
Strong knowledge of operating systems, networking protocols, and cyber threat intelligence frameworks, including the Lockheed Martin Cyber Kill Chain and MITRE ATT&CK.
#J-18808-Ljbffr
Cyber Threat Intelligence Specialist
Posted today
Job Viewed
Job Description
Overview
We are seeking a proactive and analytical Cyber Threat Intelligence Specialist to strengthen the cybersecurity defenses. In this role, you will play a key part in identifying, analyzing, and mitigating emerging cyber threats to critical infrastructure and enterprise systems.
Responsibilities
Monitor and analyze cyber threats, producing timely intelligence briefings and reports.
Research threat actors’ tactics, techniques, and procedures (TTPs) and recommend mitigations.
Support cyber incident investigations, malware analysis, and threat/risk assessments.
Develop and maintain processes, threat detection queries, and intelligence documentation.
Collaborate with stakeholders to ensure effective communication of cyber risks and intelligence findings.
Requirements
Minimum 5 years of experience in threat intelligence, with experience leading teams or projects.
Strong understanding of cyber threats, MITRE ATT&CK framework, and threat analysis methodologies.
Excellent analytical, communication, and interpersonal skills, with relevant certifications preferred (e.g., CREST, GIAC).
Be at the forefront of defending digital infrastructure from real-world threats. Apply now and be part of the team!
Role details
Seniority level: Associate
Employment type: Full-time
Job function: Information Technology
Industries: Staffing and Recruiting
#J-18808-Ljbffr
Regional Threat Intelligence Specialist
Posted today
Job Viewed
Job Description
The Regional Threat Intelligence Specialist will work within the Global Security Intelligence function of a major technology client, and will focus on the production of reports and other threat-related products. This role will support threat, vulnerability, and risk assessments, as well as some other analytical content for the APAC region and be a key contributor to the development and maintenance of the organisation's threat intelligence program.
Please note:
this position will be hired on an initial fixed-term contract until the end of 2025 with good potential for further extension thereafter.
Responsibilities:
Conduct in-depth research and analysis on specific locations within the APAC region, assessing threats from natural hazards, infrastructure, terrorism, and political instability, among others.
Produce clear, concise, and actionable intelligence reports tailored to stakeholders, including threat summaries, trending topics, and vulnerability assessments.
Monitor and research emerging trends and topics related to data centers that could impact facility development, supply chains, and site operations.
Collaborate with other analysts and internal stakeholders to gather site information and bolster assessments.
Visit client datacentres to conduct on the ground analysis of local risks.
Produce well-informed, concise and relevantbriefings / presentations tailored to varied stakeholdersand business needs.
Manage time effectively so that several projects with tight deadlines can be juggled simultaneously.
Bachelor’s Degree with 3-5 years of experience in risk analysis and / or intelligence gathering.
Excellent writing skills with a keen attention to detail. Strong written and verbal interpersonal and communication skills.
Demonstrated ability to work independently and collaboratively in a distributed team environment.
Superior research and Open-Source Intelligence (OSINT) skills.
Demonstrated knowledge of security analysis and risk assessments for physical security or security operations and planning.
Familiarity with or ability to quickly become expert in geopolitical risk analysis platforms, such as Seerist.
Language capabilities in Japanese or Hindi would be well regarded but are not essential.
Candidates should be located in Singapore and have full work rights.
#J-18808-Ljbffr