185 Gsoc Specialist jobs in Singapore
GSOC Specialist
Job Viewed
Job Description
The GSOC Specialist is embedded role with one of our major MNC client. The Regional Program Manager oversees the daily operations of the Global Security Operations Center (GSOC) ensuring successful project completion. The GSOC Specialist provides analysis on intelligence gathered and serves in leadership capacity as needed.
Please apply directly at
Essential Functions:
- Represent Pinkerton's core values of integrity, vigilance, and excellence.
- Monitor publicly available open sources using proprietary systems to provide a 24/7 tactical intelligence picture.
- Monitor geopolitical and weather events that may impact business travel and company events.
- Produce intelligence products to enhance the situational awareness and operational readiness, such as flash reports, daily reports, situational reports, verbal briefs, event and travel security assessments. Longer-term products may include working with Intelligence teams on assessments to facilitate the decision-making of cross functional teams.
- Coordinate travel security logistical support through providers.
- Escalate the GSOC leadership and crisis management teams during incidents and crisis events.
- Conduct check-ins on staff and offices during incidents and crisis events. Tally responses and provide regular updates to crisis management teams.
- Support intrusion alarm escalation protocols through attending to calls from alarm monitoring vendors and activating appropriate security response, when necessary.
- All other duties, as assigned.
Education, Experience, and Certifications:
Bachelor's degree in security studies, Political Science, International Relations, Intelligence, History, Geography or related disciplines. Minimum 2 years of experience in private/public sector intelligence, risk advisory, crisis management or working in a Security Operations Centre setting Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives.
Competencies:
- Strong decision-making skills, critical thinking, and ability to remain calm under pressure.
- Ability to receive and relay direction and have ability to multi-task and coordinate several incidents at once.
- Familiarity with Open-Source Intelligence (OSINT) tools and/or access control and surveillance tools (e.g. CCURE, Everbridge, Genetec etc.) will be advantageous.
Working Conditions:
With or without reasonable accommodation, requires the physical and mental capacity to effectively perform all essential functions.
- Exposure to sensitive and confidential information.
- Regular computer usage.
- Occasional reaching and lifting of small objects and operating office equipment.
- Ability to adjust focus between close and distance vision.
- Must be able to work any shift including evenings, weekends, and holidays to ensure the successful completion of work assignments.
- Travel, as required.
Ability to Multitask
Political Science
Weather
Security Operations
Critical Thinking
Business Travel
Geography
Access Control
Surveillance
Risk Advisory
Pressure
Flash
Vigilance
Crisis Management
International Relations
Travel Security
Job No Longer Available
This position is no longer listed on WhatJobs. The employer may be reviewing applications, filled the role, or has removed the listing.
However, we have similar jobs available for you below.
SOC Analyst
Posted today
Job Viewed
Job Description
We are looking for a Level 1 SOC Analyst to monitor and respond to security alerts. You will be the first point of contact for identifying potential security incidents and escalating them as needed. This is a great role for someone starting their career in cybersecurity.
Key Responsibilities:
- Monitor security alerts using tools like SIEM, firewalls, antivirus, etc.
- Do the first level of analysis and triage of alerts.
- Create and update incident tickets.
- Escalate critical alerts to senior analysts.
- Follow standard procedures (runbooks).
- Document all actions taken.
- Basic knowledge of cybersecurity and networking.
- Familiar with tools like SIEM or firewalls (training will be provided).
- Good communication and documentation skills.
- Willing to work in rotational shifts (24x7).
- Degree in IT/Cybersecurity or related field (or relevant certification like Security+).
- Knowledge of Windows/Linux systems.
- Basic scripting (Python, PowerShell)
- Any prior internship or hands-on lab work in cybersecurity.
SOC Analyst
Posted today
Job Viewed
Job Description
• Location: Central Area
• Permanent Role
• Salary Package: Basic Salary (commensurates with experience) + Fixed Allowances + Attractive Bonus & Benefits
Responsibility:
- Conduct 24/7 monitoring of the company's information assets using various cybersecurity tools to assess internal and external threats.
- Detect, identify, and alert on potential security incidents including intrusions, abnormal behaviors, and misuse, while differentiating these from non-malicious activities.
- Utilize cybersecurity tools to continuously monitor system activities for signs of malicious behavior.
- Analyze and respond to emerging threats, vulnerabilities in software/hardware, and system anomalies.
- Develop automation scripts and fine-tune SIEM rules to streamline incident triage and analysis.
- Provide incident response (IR) support as needed.
- Generate actionable threat intelligence using both open-source and commercial threat feeds.
- Conduct proactive threat hunting for Indicators of Compromise (IOCs), threat actor tactics, techniques, and procedures (TTPs), and other signs of malicious activity in the environment.
- Min 1 year of relevant working experience in SOC as security analyst, IT Security Operations and Computer Emergency Response Team (CERT/CIRT)
- Diploma/ Degree in computer science/ Computer Engineering / Information Security or related certifications.
- Strong understanding of data from network diagnostic tools (e.g., ping, traceroute, nslookup).
- Certifications with GSEC, GCIH, GCIA, GCTI, GCFA, GCFE, or GNFA will be advantageous.
- Proficiency in scripting languages like Python, Bash, or PowerShell is a plus.
- Working experience with OWASP Top 10, CVSS, MITRE ATT&CK framework, Cyber Kill Chain and DevSecOps strongly preferred.
- Able to work with 24/7 work shift pattern that including weekend.
- Strong knowledge of incident response and incident handling methodologies.
Interested candidates who wish to apply for the post, you may click the Apply Now Button or send in your updated resume (in MS Word format) to
We regret to inform that only shortlisted candidates will be notified.
Careerally Pte Ltd | EA Licence: 24C2215
Ooi Chuan Yi (Jacky)| EA Registration No: R24122948
SOC Analyst
Posted today
Job Viewed
Job Description
Roles and Responsibilities:
• Monitor network traffic, system logs, and security alerts to identify potential security incidents and unauthorized activities in a timely manner.
• esign, deploy, and manage threat detection rules and preventive security controls to safeguard critical systems and data in response to the latest threat landscape.
• P rform in-depth analysis of security events to determine the nature and scope of potential security incidents and recommend risk mitigation strategies. When necessary, carry out digital forensic for reporting and auditing purposes.
• C ntribute in threat hunting exercises or cyber projects to improve overall security posture.
Qualifications & Experience:
• Tec nical know-how and experience in solutions such as but not limited to:
• N twork Security (F/W, IPS, VPN, NAC) - Fortigate, Palo Alto
• W b Security (WAF, Web isolation) - Cloudflare, Zscaler, Microsoft
• E dpoint Security (EDR, AV, DLP) - Crowdstrike, Microsoft
• T reat Monitoring - Qradar, GoogleSec Ops, Resilient, Claroty
• V lnerability Management – Tenable, Ivanti, Microsoft
• Clo d Security – Microsoft, Palo Alto
• Ide tity Management - Microsoft, CyberArk
• T reat Hunting and Simulation – Cymulate, Crowdstrike
• 3 y ars of relevant experience in SOC environment
Security Operations
Troubleshooting
Vulnerability Management
Cyber Security
Identity Management
IPS
Routing
Auditing
Networking
AV
Web Security
Threat Intelligence
Network Security
VPN
Malware Analysis
SOC Analyst
Posted today
Job Viewed
Job Description
Job Summary:
We are looking for a Level 1 SOC Analyst to monitor and respond to security alerts. You will be the first point of contact for identifying potential security incidents and escalating them as needed. This is a great role for someone starting their career in cybersecurity.
Key Responsibilities:- Monitor security alerts using tools like SIEM, firewalls, antivirus, etc.
- Do the first level of analysis and triage of alerts.
- Create and update incident tickets.
- Escalate critical alerts to senior analysts.
- Follow standard procedures (runbooks).
- Document all actions taken.
- Basic knowledge of cybersecurity and networking.
- Familiar with tools like SIEM or firewalls (training will be provided).
- Good communication and documentation skills.
- Willing to work in rotational shifts (24x7).
- Degree in IT/Cybersecurity or related field (or relevant certification like Security+).
- Knowledge of Windows/Linux systems.
- Basic scripting (Python, PowerShell)
- Any prior internship or hands-on lab work in cybersecurity.
EA License # 14C6941
Tell employers what skills you haveSecurity Operations
Troubleshooting
IDS
Cyber Security
Investigation
Documentation Skills
Scripting
IPS
Routing
Networking
Python
Operating Systems
Analytical Problem Solving
Threat Intelligence
Malware Analysis
SOC Analyst
Posted today
Job Viewed
Job Description
• Location: Central Area
• Permanent Role
• Salary Package: Basic Salary (commensurates with experience) + Fixed Allowances + Attractive Bonus & Benefits
Responsibility:
- Conduct 24/7 monitoring of the company's information assets using various cybersecurity tools to assess internal and external threats.
- Detect, identify, and alert on potential security incidents including intrusions, abnormal behaviors, and misuse, while differentiating these from non-malicious activities.
- Utilize cybersecurity tools to continuously monitor system activities for signs of malicious behavior.
- Analyze and respond to emerging threats, vulnerabilities in software/hardware, and system anomalies.
- Develop automation scripts and fine-tune SIEM rules to streamline incident triage and analysis.
- Provide incident response (IR) support as needed.
- Generate actionable threat intelligence using both open-source and commercial threat feeds.
- Conduct proactive threat hunting for Indicators of Compromise (IOCs), threat actor tactics, techniques, and procedures (TTPs), and other signs of malicious activity in the environment.
- Min 1 year of relevant working experience in SOC as security analyst, IT Security Operations and Computer Emergency Response Team (CERT/CIRT)
- Diploma/ Degree in computer science/ Computer Engineering / Information Security or related certifications.
- Strong understanding of data from network diagnostic tools (e.g., ping, traceroute, nslookup).
- Certifications with GSEC, GCIH, GCIA, GCTI, GCFA, GCFE, or GNFA will be advantageous.
- Proficiency in scripting languages like Python, Bash, or PowerShell is a plus.
- Working experience with OWASP Top 10, CVSS, MITRE ATT&CK framework, Cyber Kill Chain and DevSecOps strongly preferred.
- Able to work with 24/7 work shift pattern that including weekend.
- Strong knowledge of incident response and incident handling methodologies.
Interested candidates who wish to apply for the post, you may click the Apply Now Button or send in your updated resume (in MS Word format) to
We regret to inform that only shortlisted candidates will be notified.
Careerally Pte Ltd | EA Licence: 24C2215
Ooi Chuan Yi (Jacky)| EA Registration No: R
SOC Analyst
Posted 3 days ago
Job Viewed
Job Description
We are looking for a Level 1 SOC Analyst to monitor and respond to security alerts. You will be the first point of contact for identifying potential security incidents and escalating them as needed. This is a great role for someone starting their career in cybersecurity.
Key Responsibilities:- Monitor security alerts using tools like SIEM, firewalls, antivirus, etc.
- Do the first level of analysis and triage of alerts.
- Create and update incident tickets.
- Escalate critical alerts to senior analysts.
- Follow standard procedures (runbooks).
- Document all actions taken.
- Basic knowledge of cybersecurity and networking.
- Familiar with tools like SIEM or firewalls (training will be provided).
- Good communication and documentation skills.
- Willing to work in rotational shifts (24x7).
- Degree in IT/Cybersecurity or related field (or relevant certification like Security+).
- Knowledge of Windows/Linux systems.
- Basic scripting (Python, PowerShell)
- Any prior internship or hands-on lab work in cybersecurity.
EA License # 14C6941
SOC Analyst
Posted 5 days ago
Job Viewed
Job Description
Roles and Responsibilities:
• Monitor network traffic, system logs, and security alerts to identify potential security incidents and unauthorized activities in a timely manner.
• esign, deploy, and manage threat detection rules and preventive security controls to safeguard critical systems and data in response to the latest threat landscape.
• P rform in-depth analysis of security events to determine the nature and scope of potential security incidents and recommend risk mitigation strategies. When necessary, carry out digital forensic for reporting and auditing purposes.
• C ntribute in threat hunting exercises or cyber projects to improve overall security posture.
Qualifications & Experience:
• Tec nical know-how and experience in solutions such as but not limited to:
• N twork Security (F/W, IPS, VPN, NAC) - Fortigate, Palo Alto
• W b Security (WAF, Web isolation) - Cloudflare, Zscaler, Microsoft
• E dpoint Security (EDR, AV, DLP) - Crowdstrike, Microsoft
• T reat Monitoring - Qradar, GoogleSec Ops, Resilient, Claroty
• V lnerability Management – Tenable, Ivanti, Microsoft
• Clo d Security – Microsoft, Palo Alto
• Ide tity Management - Microsoft, CyberArk
• T reat Hunting and Simulation – Cymulate, Crowdstrike
• 3 y ars of relevant experience in SOC environment
Be The First To Know
About the latest Gsoc specialist Jobs in Singapore !
SOC Analyst
Posted 9 days ago
Job Viewed
Job Description
Roles and Responsibilities:
• Monitor network traffic, system logs, and security alerts to identify potential security incidents and unauthorized activities in a timely manner.
• esign, deploy, and manage threat detection rules and preventive security controls to safeguard critical systems and data in response to the latest threat landscape.
• P rform in-depth analysis of security events to determine the nature and scope of potential security incidents and recommend risk mitigation strategies. When necessary, carry out digital forensic for reporting and auditing purposes.
• C ntribute in threat hunting exercises or cyber projects to improve overall security posture.
Qualifications & Experience:
• Tec nical know-how and experience in solutions such as but not limited to:
• N twork Security (F/W, IPS, VPN, NAC) - Fortigate, Palo Alto
• W b Security (WAF, Web isolation) - Cloudflare, Zscaler, Microsoft
• E dpoint Security (EDR, AV, DLP) - Crowdstrike, Microsoft
• T reat Monitoring - Qradar, GoogleSec Ops, Resilient, Claroty
• V lnerability Management – Tenable, Ivanti, Microsoft
• Clo d Security – Microsoft, Palo Alto
• Ide tity Management - Microsoft, CyberArk
• T reat Hunting and Simulation – Cymulate, Crowdstrike
• 3 y ars of relevant experience in SOC environment
SOC Analyst/Engineer
Posted 5 days ago
Job Viewed
Job Description
Position: Junior SOC Analyst / Engineer
Experience: 3-5 years
Number of Positions: 2
Salary Range: 5k-7k
Responsibilities:- Experience in cyber security as an analyst or incident responder (in a SOC/CSIRT setup, preferably)
- In-depth knowledge of current threat landscape, offensive tooling, and OWASP and MITRE ATT&CK techniques
- Technical writing skills to present complex topics to non-technical audiences
- Excellent oral and written communication skills (English)
- Malware and exploit analysis (or reverse engineering)
- Developing hypothesis-driven threat hunts
- Analyzing various events, including but not limited to web traffic, underlying network protocols, malware, lateral movement TTPs (techniques, tactics, and procedures), or Microsoft and Linux security events
- Logfile correlation and analysis, and/or system and memory analysis
- Major incident response or breach investigation management
- Chain of custody and forensic acquisitions is a bonus
- Experience with Amazon AWS is desirable
Cybersecurity SOC Analyst
Posted today
Job Viewed
Job Description
- Analyst would be part of 24x7 Cyber Security Operations function to perform security monitoring and incident response, data loss prevention, vulnerability management, threat intelligence and threat hunting.
- Perform monitoring, research, assessment and analysis on alerts from SIEM tools.
- Follow pre-defined actions to investigate possible security incidents or perform incident response actions, including escalating to other support groups.
- Maintains standard operating procedures (SOP), processes and guidelines.
- Ensure proper functioning of systems in the Security Operations Centre.
- Send out emails to L2 and other groups and follow up accordingly.
- - Strong analytical and problem-solving skills, with the ability to quickly identify and resolve security issues.
- - Proven ability to work in a fast-paced environment, prioritize tasks, and meet deadlines.
- - Ability to work in a team and each individual's contribution is crucial to the team's objectives.
- - This is a 24/7 operational work. Able to commit to 12-hour shifts, weekends and public holidays.
- - Excellent communication and interpersonal skills, with the ability to effectively collaborate with cross-functional teams and convey complex security concepts to non-technical stakeholders.
- - Proven ability to work in a fast-paced environment, prioritize tasks, and meet deadlines.