630 Helpdesk Management jobs in Singapore

Incident Management Engineer

Singapore, Singapore The Rundown AI, Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time

A World-Changing Company
Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.
The Role
Incident Management Engineers (IMEs) are the driving forces of stability across Palantir’s products. IMEs help to ensure Palantir fixes critical issues immediately. When something goes wrong, IMEs are the first to respond and are responsible for triaging, troubleshooting, and coordinating the resolution of the issue.
You’ll be a member of a centralized team responsible for managing the most critical outages. You are an excellent communicator, collaborator, and troubleshooter and can use both of these skills in fast-paced and high-stakes environments. You are able to parse technical details quickly and know when to ask for help when you need it.
Whatever the issue is, you are ensuring it gets resolved at a high bar as quickly and seamlessly as possible.
Core Responsibilities
Develop a deep understanding of Palantir’s product and delivery ecosystem.
Collaborate with customer-facing, product, and infrastructure teams on the development and deployment of scalable, reliable software for our customers.
Diagnose, resolve, and prevent issues encountered in the field.
Reduce the operational overhead of responding to critical incidents at Palantir through investments in tooling, process, and automation.
Take part in a 24/7 on-call rotation responsible for coordinating Palantir’s response to mission-critical incidents, ensuring efficient resolution with minimal customer impact.
What We Value
Excellent problem solving skills.
Comfort working in a fast paced environment.
Ability to work both independently and make decisions under minimal direction, as well as collaborate as part of a team.
Experience with scripting, automation, or data analysis a plus.
What We Require
Background in Computer Science, Engineering, Information Systems, or other technical field.
Willingness and interest to travel to other Palantir locations as needed.
Life at Palantir
We want every Palantirian to achieve their best outcomes, that’s why we celebrate individuals’ strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians’ lives is just one of the ways we’re investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region.
In keeping consistent with Palantir’s values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the city and or country in which you are employed. If the posting is specified as Onsite, you are required to work from an office.
If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process, please reach out and let us know how we can help.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

AVP- IT Incident Management

$90000 - $120000 Y Mizuho Bank, Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description:

We are seeking an experienced and results-driven Incident Manager to oversee and lead incident management processes. To ensure timely resolution of incidents, coordinate effectively across teams, and implement best practices to minimize disruptions to business operations. This role requires strong expertise in incident management, clear communication skills.

Incident Management

  • Oversee the end-to-end incident lifecycle, from identification and logging to resolution and closure with technical teams, vendors, and stakeholders.
  • Drive Root Cause Analysis (RCA) for critical incidents and ensure appropriate follow-ups.
  • Develop and maintain incident management dashboards, metrics, and reports for senior leadership.
  • Facilitate discussions within the recovery team, promoting engagement and maintaining discipline.
  • Ability to translate technical incidents into business terms.

Process Improvement and SLA

  • Continuously refine and enhance incident management processes to ensure efficiency and effectiveness.
  • Identify trends and recurring issues, recommending proactive measures to prevent future incidents.
  • Lead or contribute to training sessions and knowledge-sharing initiatives on incident management practices.
  • Monitor and ensure adherence to Service Level Agreements (SLAs) for incident resolution.
  • Proactively escalate and address SLA breaches with appropriate corrective actions.

Communication

  • Ensure timely and clear communication of incident updates to stakeholders, including senior management and end users.
  • Draft and distribute incident notifications, status updates, and post-incident reports.
  • Bridge communication between technical teams and non-technical stakeholders to provide clarity and context.

Stakeholder and User Engagement

  • Collaborate closely with business users to understand their needs and minimize incident impact on operations.
  • Support Japanese-speaking stakeholders, ensuring language and cultural alignment.
  • Act as the liaison between Singapore, Japan-based teams, and global and regional IT units during incident management.

Job Requirements:

  • Tertiary degree in technology from a recognized educational institution.
  • Strong understanding of ITIL processes; ITIL certification is highly preferred
  • 6–8 years of experience in IT incident management or related roles in banking industry, with at least 2–3 years in a leadership capacity.
  • Proven experience managing critical incidents and working with international teams, including Japanese-speaking stakeholders.
  • Experience in IT Service Management, IT Operations, IT infrastructure, or Production Support.
  • Good understanding of Service Desk Operations, Escalation Management, Stakeholder Management experience including different (e.g. ServiceNow, JIRA and Salesforce) ticketing tools knowledge.
  • Strong decision-making, problem-solving abilities under pressure, prioritize and multitask effectively.
  • Excellent interpersonal skills to foster collaboration across teams and regions.
This advertiser has chosen not to accept applicants from your region.

Manager (Audit and Incident Management)

Singapore, Singapore $90000 - $120000 Y Ministry of Defence Singapore

Posted today

Job Viewed

Tap Again To Close

Job Description

Military Security Department

Permanent

What the role is

As a cyber auditor in our team, you will be responsible for conducting comprehensive security assessments, and compliance reviews. You will work with cross-functional teams to implement security best practices and help build our cyber resilience.

What you will be working on

You will plan and execute security audits across network infrastructure, applications, and systems, to assess compliance with industry standards. Following, you will document findings, prioritise vulnerabilities, and recommend remediation strategies. You will also develop and maintain audit frameworks, and security testing methodologies. You will also collaborate with IT and development teams to implement security improvements and support the organization with incident response actions and post incident assessment activities.

What we are looking for

You should have a tertiary education in an IT-related discipline, preferably with a focus on cyber-security. You should possess good writing and verbal communication skills, problem-solving and analytical skills. A passion for IT/cyber is essential. Cyber-security professional accreditation such as CISSP, CISA, CEH, and prior relevant work experience in cyber/IT related fields would be advantageous.

About Military Security Department

The Military Security Department (MSD)'s core business is in Counter Intelligence and internal security for MINDEF/SAF. MSD was formed in 1975 to counter the threats of espionage, subversion and sabotage against MINDEF/SAF. It began with two main entities, namely the Counter Intelligence Branch (CIB) and Field Security Branch (FSB). Over the years, the department has continued to evolve and our roles expanded in tandem with the changing security environment. Today, our roles also include Counter Terrorism and Cyber Security.

About your application process

If you do not hear from us within 4 weeks of the job ad closing date, we seek your understanding that it is likely that we are not moving forward with your application for this role. We thank you for your interest and would like to assure you that this does not affect your other job applications with the Public Service. We encourage you to explore and for other roles within Military Security Department or the wider Public Service.

This advertiser has chosen not to accept applicants from your region.

Technology Support III, Incident Management

JPMorganChase

Posted today

Job Viewed

Tap Again To Close

Job Description

JOB DESCRIPTION

Propel operational success with your expertise in technology support and a commitment to continuous improvement.

As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms' infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.

Job responsibilities

  • Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
  • Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
  • Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.
  • Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
  • Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
  • Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
  • Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
  • Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.

Required qualifications, capabilities, and skills

  • Bachelor's Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
  • 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
  • Demonstrated command and control, documentation, and communication skills in previous roles.
  • Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
  • Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
  • Strong understanding of the ITIL framework and experience with incident management tools.
  • Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
  • High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
  • Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.
  • Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
  • Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.

Preferred qualifications, capabilities, and skills

  • ITIL Certification.
  • Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
  • Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.

ABOUT US

J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world's most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.

We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.

ABOUT THE TEAM

Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we're setting our businesses, clients, customers and employees up for success.

This advertiser has chosen not to accept applicants from your region.

Technology Support III, Incident Management

Singapore, Singapore JPMORGAN CHASE BANK, N.A.

Posted today

Job Viewed

Tap Again To Close

Job Description

Roles & Responsibilities

Propel operational success with your expertise in technology support and a commitment to continuous improvement.

As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms' infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.

Job responsibilities


• Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.


• Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.


• Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.


• Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.


• Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.


• Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.


• Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.


• Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.

Required qualifications, capabilities, and skills


• Bachelor's Degree in Computer Science, Cybersecurity, Data Science, or related disciplines


• 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.


• Demonstrated command and control, documentation, and communication skills in previous roles.


• Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.


• Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.


• Strong understanding of the ITIL framework and experience with incident management tools.


• Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.


• High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.


• Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.


• Ability to influence senior technology managers across organizational boundaries through formal and informal channels.


• Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.

Preferred qualifications, capabilities, and skills


• ITIL Certification.


• Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.


• Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.

To apply for this position, please use the following URL:

Tell employers what skills you have

customer mindset
Incident Command
Trust
Collaborative
Hardware
Defense
Identifying risks
Documentation Skills
Root Cause Analysis
Achieving Results
Penetration Testing
Cultural Diversity
Pressure
Operating Systems
Data Science
ITIL
Team Player
Stakeholder Management
Team Work
Incident Management
This advertiser has chosen not to accept applicants from your region.

Manager (Facility Clearance, Consultancy, and Incident Management)

Singapore, Singapore $90000 - $120000 Y Ministry of Defence Singapore

Posted today

Job Viewed

Tap Again To Close

Job Description

Military Security Department

Permanent

What the role is

In this dynamic position, you will evaluate both physical-cyber security measures across client facilities, identifying weaknesses in their security posture and recommending remediation. This role bridges the gap between physical security controls and cybersecurity defences to create holistic protection strategies.

What you will be working on

You will conduct thorough on-site security assessments of client facilities, examining physical measures to protect network and IT infrastructure, and evaluate cyber-physical control systems. You will assist clients by performing gap analysis against authority standards and regulatory requirements and develop reports with prioritized findings and actionable recommendations. You will be called on to create customized security roadmaps and implementation plans for clients, communicate with stakeholders explaining security vulnerabilities and proposed solutions, and support the organization with incident response actions and post-breach assessment activities.

What we are looking for

You should have a tertiary education in an IT-related discipline, preferably with a focus on cyber-security. You should possess good writing and verbal communication skills, problem-solving and analytical skills. A passion for IT/cyber is essential. Cyber-security professional accreditation such as CISSP, and prior relevant work experience in cyber/IT related fields would be advantageous.

About Military Security Department

The Military Security Department (MSD)'s core business is in Counter Intelligence and internal security for MINDEF/SAF. MSD was formed in 1975 to counter the threats of espionage, subversion and sabotage against MINDEF/SAF. It began with two main entities, namely the Counter Intelligence Branch (CIB) and Field Security Branch (FSB). Over the years, the department has continued to evolve and our roles expanded in tandem with the changing security environment. Today, our roles also include Counter Terrorism and Cyber Security.

About your application process

If you do not hear from us within 4 weeks of the job ad closing date, we seek your understanding that it is likely that we are not moving forward with your application for this role. We thank you for your interest and would like to assure you that this does not affect your other job applications with the Public Service. We encourage you to explore and for other roles within Military Security Department or the wider Public Service.

This advertiser has chosen not to accept applicants from your region.

Technology Support III, Incident Management & Response (IMR)

Singapore, Singapore JPMorganChase

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Overview
Propel operational success with your expertise in technology support and a commitment to continuous improvement. As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firm’s infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities).
Job Responsibilities
Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm’s infrastructure.
Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required Qualifications
Bachelor’s Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
Demonstrated command and control, documentation, and communication skills in previous roles.
Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
Strong understanding of the ITIL framework and experience with incident management tools.
Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
Ability to exercise excellent judgment and decision-making skills under pressure and know when to elevate issues.
Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred Qualifications
ITIL Certification.
Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
About Us
J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world’s most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
About the Team
Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we’re setting our businesses, clients, customers and employees up for success.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Helpdesk management Jobs in Singapore !

Technology Support III, Incident Management & Response (IMR)

$16000 Monthly JPMORGAN CHASE BANK, N.A.

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Propel operational success with your expertise in technology support and a commitment to continuous improvement.

As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms’ infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.

Job responsibilities

• Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.

• Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.

• Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.

• Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.

• Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.

• Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.

• Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.

• Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.

Required qualifications, capabilities, and skills

• Bachelor’s Degree in Computer Science, Cybersecurity, Data Science, or related disciplines

• 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.

• Demonstrated command and control, documentation, and communication skills in previous roles.

• Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.

• Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.

• Strong understanding of the ITIL framework and experience with incident management tools.

• Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.

• High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.

• Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.

• Ability to influence senior technology managers across organizational boundaries through formal and informal channels.

• Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.

Preferred qualifications, capabilities, and skills

• ITIL Certification.

• Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.

• Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.


To apply for this position, please use the following URL:

This advertiser has chosen not to accept applicants from your region.

Data Center Ops Analyst , Incident Management (Loyang) (ID: 679000)

$60000 - $120000 Y PERSOL

Posted today

Job Viewed

Tap Again To Close

Job Description

Your Role

This role is responsible for the day-to-day monitoring of network and infrastructure operations. You will deliver excellent customer service, troubleshoot issues, and escalate incidents for internal and external stakeholders contacting the Global Command Center. This is a shift-based role, requiring flexibility for rotating schedules.

What You'll Do

  • Work a 12-hour morning shift on a rotating schedule.
  • Deliver Tier I network support and customer service for mission-critical, 24/7 Data Centers.
  • Participate in a weekly on-call rotation supporting 24/7 operations.
  • Provide both proactive and reactive assistance to external customers.
  • Support the network environment—logging unfamiliar issues, owning resolution efforts, or escalating as required.
  • Receive, triage, and respond to incoming phone calls, emails, and portal tickets from internal and external users.
  • Detect and analyze alarms to perform basic fault isolation and troubleshooting; escalate to Tier II, Tier III, or management when needed.
  • Generate and publish incident, maintenance, and advisory notifications for internal and external stakeholders at site or regional levels.
  • Prioritize tasks to meet defined KPIs and service-level commitments.
  • Maintain clear, effective communication with Tier II, Tier III, and management for urgent or high-priority cases.
  • Document incidents, maintenance, and problem details in real-time.
  • Ensure customer SLAs are consistently met.
  • Maintain current knowledge through training—both internal and external—as well as continued education and professional development.

What You'll Need

  • Minimum 1 year of experience in a 24/7 Network Operations Center, Contact Center, or equivalent environment.
  • At least 1 year of customer service or technical support experience (or equivalent).
  • Strong written and verbal communication skills for both colleagues and customers.
  • Ability to multi-task and effectively prioritize responsibilities.
  • 12 hours fixed shift based role, 7am to 7pm (including weekends, public holiday) with 3-4 days working pattern.

Interested candidates who wish to apply for the advertised position, please click on "Apply". We regret that only shortlisted candidates will be notified.

EA License No.: 01C4394 (PERSOLKELLY Singapore PTE LTD)

By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOL Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at You acknowledge that you have read, understood, and agree with the Privacy Policy.

This advertiser has chosen not to accept applicants from your region.

Data Center Ops Analyst , Incident Management (Loyang) (ID: 679000)

$60000 - $80000 Y PERSOL

Posted today

Job Viewed

Tap Again To Close

Job Description

Your Role

This role is responsible for the day-to-day monitoring of network and infrastructure operations. You will deliver excellent customer service, troubleshoot issues, and escalate incidents for internal and external stakeholders contacting the Global Command Center. This is a shift-based role, requiring flexibility for rotating schedules.

What You'll Do

  • Work a 12-hour morning shift on a rotating schedule.
  • Deliver Tier I network support and customer service for mission-critical, 24/7 Data Centers.
  • Participate in a weekly on-call rotation supporting 24/7 operations.
  • Provide both proactive and reactive assistance to external customers.
  • Support the network environment—logging unfamiliar issues, owning resolution efforts, or escalating as required.
  • Receive, triage, and respond to incoming phone calls, emails, and portal tickets from internal and external users.
  • Detect and analyze alarms to perform basic fault isolation and troubleshooting; escalate to Tier II, Tier III, or management when needed.
  • Generate and publish incident, maintenance, and advisory notifications for internal and external stakeholders at site or regional levels.
  • Prioritize tasks to meet defined KPIs and service-level commitments.
  • Maintain clear, effective communication with Tier II, Tier III, and management for urgent or high-priority cases.
  • Document incidents, maintenance, and problem details in real-time.
  • Ensure customer SLAs are consistently met.
  • Maintain current knowledge through training—both internal and external—as well as continued education and professional development.

What You'll Need

  • Minimum 1 year of experience in a 24/7 Network Operations Center, Contact Center, or equivalent environment.
  • At least 1 year of customer service or technical support experience (or equivalent).
  • Strong written and verbal communication skills for both colleagues and customers.
  • Ability to multi-task and effectively prioritize responsibilities.
  • 12 hours fixed shift based role, 7am to 7pm (including weekends, public holiday) with 3-4 days working pattern.

Interested candidates who wish to apply for the advertised position, please click on "Apply". We regret that only shortlisted candidates will be notified.

EA License No.: 01C4394 (PERSOLKELLY Singapore PTE LTD)

By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOL Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at You acknowledge that you have read, understood, and agree with the Privacy Policy.

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Helpdesk Management Jobs