194 Incident Management jobs in Singapore
Incident Management Engineer
Posted today
Job Viewed
Job Description
A World-Changing Company
Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.
The Role
Incident Management Engineers (IMEs) are the driving forces of stability across Palantir’s products. IMEs help to ensure Palantir fixes critical issues immediately. When something goes wrong, IMEs are the first to respond and are responsible for triaging, troubleshooting, and coordinating the resolution of the issue.
You’ll be a member of a centralized team responsible for managing the most critical outages. You are an excellent communicator, collaborator, and troubleshooter and can use both of these skills in fast-paced and high-stakes environments. You are able to parse technical details quickly and know when to ask for help when you need it.
Whatever the issue is, you are ensuring it gets resolved at a high bar as quickly and seamlessly as possible.
Core Responsibilities
Develop a deep understanding of Palantir’s product and delivery ecosystem.
Collaborate with customer-facing, product, and infrastructure teams on the development and deployment of scalable, reliable software for our customers.
Diagnose, resolve, and prevent issues encountered in the field.
Reduce the operational overhead of responding to critical incidents at Palantir through investments in tooling, process, and automation.
Take part in a 24/7 on-call rotation responsible for coordinating Palantir’s response to mission-critical incidents, ensuring efficient resolution with minimal customer impact.
What We Value
Excellent problem solving skills.
Comfort working in a fast paced environment.
Ability to work both independently and make decisions under minimal direction, as well as collaborate as part of a team.
Experience with scripting, automation, or data analysis a plus.
What We Require
Background in Computer Science, Engineering, Information Systems, or other technical field.
Willingness and interest to travel to other Palantir locations as needed.
Life at Palantir
We want every Palantirian to achieve their best outcomes, that’s why we celebrate individuals’ strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians’ lives is just one of the ways we’re investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region.
In keeping consistent with Palantir’s values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the city and or country in which you are employed. If the posting is specified as Onsite, you are required to work from an office.
If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process, please reach out and let us know how we can help.
#J-18808-Ljbffr
AVP- IT Incident Management
Posted today
Job Viewed
Job Description
Job Description:
We are seeking an experienced and results-driven Incident Manager to oversee and lead incident management processes. To ensure timely resolution of incidents, coordinate effectively across teams, and implement best practices to minimize disruptions to business operations. This role requires strong expertise in incident management, clear communication skills.
Incident Management
- Oversee the end-to-end incident lifecycle, from identification and logging to resolution and closure with technical teams, vendors, and stakeholders.
- Drive Root Cause Analysis (RCA) for critical incidents and ensure appropriate follow-ups.
- Develop and maintain incident management dashboards, metrics, and reports for senior leadership.
- Facilitate discussions within the recovery team, promoting engagement and maintaining discipline.
- Ability to translate technical incidents into business terms.
Process Improvement and SLA
- Continuously refine and enhance incident management processes to ensure efficiency and effectiveness.
- Identify trends and recurring issues, recommending proactive measures to prevent future incidents.
- Lead or contribute to training sessions and knowledge-sharing initiatives on incident management practices.
- Monitor and ensure adherence to Service Level Agreements (SLAs) for incident resolution.
- Proactively escalate and address SLA breaches with appropriate corrective actions.
Communication
- Ensure timely and clear communication of incident updates to stakeholders, including senior management and end users.
- Draft and distribute incident notifications, status updates, and post-incident reports.
- Bridge communication between technical teams and non-technical stakeholders to provide clarity and context.
Stakeholder and User Engagement
- Collaborate closely with business users to understand their needs and minimize incident impact on operations.
- Support Japanese-speaking stakeholders, ensuring language and cultural alignment.
- Act as the liaison between Singapore, Japan-based teams, and global and regional IT units during incident management.
Job Requirements:
- Tertiary degree in technology from a recognized educational institution.
- Strong understanding of ITIL processes; ITIL certification is highly preferred
- 6–8 years of experience in IT incident management or related roles in banking industry, with at least 2–3 years in a leadership capacity.
- Proven experience managing critical incidents and working with international teams, including Japanese-speaking stakeholders.
- Experience in IT Service Management, IT Operations, IT infrastructure, or Production Support.
- Good understanding of Service Desk Operations, Escalation Management, Stakeholder Management experience including different (e.g. ServiceNow, JIRA and Salesforce) ticketing tools knowledge.
- Strong decision-making, problem-solving abilities under pressure, prioritize and multitask effectively.
- Excellent interpersonal skills to foster collaboration across teams and regions.
Manager (Audit and Incident Management)
Posted today
Job Viewed
Job Description
Military Security Department
Permanent
What the role is
As a cyber auditor in our team, you will be responsible for conducting comprehensive security assessments, and compliance reviews. You will work with cross-functional teams to implement security best practices and help build our cyber resilience.
What you will be working on
You will plan and execute security audits across network infrastructure, applications, and systems, to assess compliance with industry standards. Following, you will document findings, prioritise vulnerabilities, and recommend remediation strategies. You will also develop and maintain audit frameworks, and security testing methodologies. You will also collaborate with IT and development teams to implement security improvements and support the organization with incident response actions and post incident assessment activities.
What we are looking for
You should have a tertiary education in an IT-related discipline, preferably with a focus on cyber-security. You should possess good writing and verbal communication skills, problem-solving and analytical skills. A passion for IT/cyber is essential. Cyber-security professional accreditation such as CISSP, CISA, CEH, and prior relevant work experience in cyber/IT related fields would be advantageous.
About Military Security Department
The Military Security Department (MSD)'s core business is in Counter Intelligence and internal security for MINDEF/SAF. MSD was formed in 1975 to counter the threats of espionage, subversion and sabotage against MINDEF/SAF. It began with two main entities, namely the Counter Intelligence Branch (CIB) and Field Security Branch (FSB). Over the years, the department has continued to evolve and our roles expanded in tandem with the changing security environment. Today, our roles also include Counter Terrorism and Cyber Security.
About your application process
If you do not hear from us within 4 weeks of the job ad closing date, we seek your understanding that it is likely that we are not moving forward with your application for this role. We thank you for your interest and would like to assure you that this does not affect your other job applications with the Public Service. We encourage you to explore and for other roles within Military Security Department or the wider Public Service.
Technology Support III, Incident Management
Posted today
Job Viewed
Job Description
JOB DESCRIPTION
Propel operational success with your expertise in technology support and a commitment to continuous improvement.
As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms' infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.
Job responsibilities
- Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
- Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
- Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.
- Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
- Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
- Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
- Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
- Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required qualifications, capabilities, and skills
- Bachelor's Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
- 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
- Demonstrated command and control, documentation, and communication skills in previous roles.
- Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
- Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
- Strong understanding of the ITIL framework and experience with incident management tools.
- Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
- High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
- Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.
- Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
- Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred qualifications, capabilities, and skills
- ITIL Certification.
- Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
- Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
ABOUT US
J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world's most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
ABOUT THE TEAM
Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we're setting our businesses, clients, customers and employees up for success.
Technology Support III, Incident Management
Posted today
Job Viewed
Job Description
Propel operational success with your expertise in technology support and a commitment to continuous improvement.
As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms' infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.
Job responsibilities
• Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
• Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
• Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.
• Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
• Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
• Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
• Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
• Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required qualifications, capabilities, and skills
• Bachelor's Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
• 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
• Demonstrated command and control, documentation, and communication skills in previous roles.
• Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
• Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
• Strong understanding of the ITIL framework and experience with incident management tools.
• Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
• High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
• Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.
• Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
• Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred qualifications, capabilities, and skills
• ITIL Certification.
• Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
• Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
To apply for this position, please use the following URL:
Tell employers what skills you havecustomer mindset
Incident Command
Trust
Collaborative
Hardware
Defense
Identifying risks
Documentation Skills
Root Cause Analysis
Achieving Results
Penetration Testing
Cultural Diversity
Pressure
Operating Systems
Data Science
ITIL
Team Player
Stakeholder Management
Team Work
Incident Management
Manager, Incident Response & Management
Posted today
Job Viewed
Job Description
Who we are
About Stripe
Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world’s largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone’s reach while doing the most important work of your career.
About the team
The Incident Response team is a global 24/7 team responsible for driving incident response and management from detection to resolution. Stripe is proud of its five 9s API reliability and this team is at the forefront of ensuring we keep it that way - working hand-in-hand with Reliability Eng and across the Tech Org. This team of incident response managers (IRM) is defined by our sense of ownership and how we drive incidents to resolution - marshaling the necessary cross-functional resources to respond to and resolve service outages, critical bugs, security attacks and anything that significantly impacts the users of our products. The team is user-first and ensures appropriate external communications from Stripe and senior management to keep our users informed of disruption to their experience of Stripe. The team is highly skilled in incident troubleshooting, program management, incident classifications, incident communications, incident escalation and technical adeptness as incidents can arise from anywhere and cut across products and orgs in Stripe.
What you’ll do
This position entails leading and optimizing Stripe's incident management processes and automation, ensuring efficiency and adherence to stringent incident response metrics. As the head of the incident response team, you will establish and maintain a best-in-class incident response framework, upholding the reliability standards expected of Stripe. Responsibilities include but are not limited to incident classification, escalation, and notification management, along with accountability for key incident response metrics (TTx). You will generate actionable insights to drive continuous improvement, collaborating with engineering leadership to refine incident detection, response, user communication, and tooling efficacy. Leadership and development of a highly effective 24/7 global incident response management team, characterized by urgency, programmatic ownership of incidents and communications, and the capacity to engage engineering teams, are crucial. Additionally, you will manage incident communications across multiple channels for executive and end-user audiences, and identify automation opportunities to streamline incident response workflows, thereby safeguarding users and minimizing disruption to their operations.
Responsibilities
Lead the global 24/7 team of regional managers and incident response managers with ability to be hands-on and support frontline on-call with speed, cross-functional collaboration and escalation
Develop and own Stripe's incident response and management strategy and cross-functional roadmap, ensuring it aligns with the company's reputation for reliability.
Spearhead and manage Stripe's AI-First strategy for automation of incident response workflows, partnering with the engineering team to implement required tooling enhancements.
Enhance Stripe's incident response by leading and implementing improvements derived from analyzing user-facing incidents and extracting actionable insights and learnings.
Collaborate closely with executive leadership, engineering, and operations teams to lead significant programs and reshape workflows and metrics concerning reliability and incident operations.
Manage relevant TTx metrics, particularly those related to communication and escalation. Collaborate with engineering leadership to implement necessary improvements for each metric.
Develop user-focused metrics and data to guide Stripe's incident response, reliability strategy, and user communications (including RCAs), ensuring impactful decision-making.
Who you are
We’re looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.
Minimum requirements
5+ years of management experience, including 2+ years of experience managing managers with a proven record in building, growing and transforming teams.
Extensive experience (4+ years) leading incident response for complex, large-scale distributed services with high SLOs/SLAs, coupled with deep expertise in crisis management.
Demonstrated ability to lead, influence other leaders and deliver complex strategic projects involving multiple stakeholders
Strong analytical skills, and the ability to use data to drive business decisions
Possesses proficiency in basic incident troubleshooting and a reasonable understanding of system architecture. Fluent in using SQL, Splunk, or similar query languages.
Exceptional communication abilities, capable of adapting incident updates for diverse audiences (executives, external users, internal teams).
Affinity for a fast paced work environment, crafting strategic and rapid fixes to high intensity problems with a keen eye for detail and a high bar for quality
Comfort navigating ambiguity, while identifying areas for process improvement and establishing best practices
Preferred qualifications
Experience managing geographically dispersed teams
Experience using infrastructure and application monitoring tools such as Prometheus, Sentry and others
Experience in incident response at a high-growth technology company, preferably within the payments or e-commerce sectors.
Proven ability to apply Agentic and Generative AI to revolutionize incident response, coupled with a strong grasp of current industry trends in the incident response domain.
Demonstrated history of driving engineering and process enhancements to improve incident response efficiency within a rapidly expanding technology organization.
Office-assigned Stripes spend at least 50% of the time in a given month in their local office or with users. This hits a balance between bringing people together for in-person collaboration and learning from each other, while supporting flexibility about how to do this in a way that makes sense for individuals and their teams. The annual salary range for this role in the primary location is S$208,000 - S$312,000. This range may change if you are hired in another location. For sales roles, the range provided is the role’s On Target Earnings (“OTE”) range, meaning that the range includes both the sales commissions/sales bonuses target and annual base salary for the role. This salary range may be inclusive of several career levels at Stripe and will be narrowed during the interview process based on a number of factors, including the candidate’s experience, qualifications, and specific location. Applicants interested in this role and who are not located in the primary location may request the annual salary range for their location during the interview process.
Specific benefits and details about what compensation is included in the salary range listed above will vary depending on the applicant’s location and can be discussed in more detail during the interview process. Benefits/additional compensation for this role may include: equity, company bonus or sales commissions/bonuses; retirement plans; health benefits; and wellness stipends.
Office locations
Singapore
Team
Infrastructure & Corporate Tech
Job type
Full time
Apply for this role
#J-18808-Ljbffr
Manager, Incident Response & Management
Posted today
Job Viewed
Job Description
Who we are
About Stripe
Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world’s largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone’s reach while doing the most important work of your career.
About the team
The Incident Response team is a global 24/7 team responsible for driving incident response and management from detection to resolution. Stripe is proud of its five 9s API reliability and this team is at the forefront of ensuring we keep it that way - working hand-in-hand with Reliability Eng and across the Tech Org. This team of incident response managers (IRM) is defined by our sense of ownership and how we drive incidents to resolution - marshaling the necessary cross-functional resources to respond to and resolve service outages, critical bugs, security attacks and anything that significantly impacts the users of our products. The team is user-first and ensures appropriate external communications from Stripe and senior management to keep our users informed of disruption to their experience of Stripe. The team is highly skilled in incident troubleshooting, program management, incident classifications, incident communications, incident escalation and technical adeptness as incidents can arise from anywhere and cut across products and orgs in Stripe.
What you’ll do
This position entails leading and optimizing Stripe's incident management processes and automation, ensuring efficiency and adherence to stringent incident response metrics. As the head of the incident response team, you will establish and maintain a best-in-class incident response framework, upholding the reliability standards expected of Stripe. Responsibilities include but are not limited to incident classification, escalation, and notification management, along with accountability for key incident response metrics (TTx). You will generate actionable insights to drive continuous improvement, collaborating with engineering leadership to refine incident detection, response, user communication, and tooling efficacy. Leadership and development of a highly effective 24/7 global incident response management team, characterized by urgency, programmatic ownership of incidents and communications, and the capacity to engage engineering teams, are crucial. Additionally, you will manage incident communications across multiple channels for executive and end-user audiences, and identify automation opportunities to streamline incident response workflows, thereby safeguarding users and minimizing disruption to their operations.
Responsibilities
Lead the global 24/7 team of regional managers and incident response managers with ability to be hands-on and support frontline on-call with speed, cross-functional collaboration and escalation
Develop and own Stripe's incident response and management strategy and cross-functional roadmap, ensuring it aligns with the company's reputation for reliability.
Spearhead and manage Stripe's AI-First strategy for automation of incident response workflows, partnering with the engineering team to implement required tooling enhancements.
Enhance Stripe's incident response by leading and implementing improvements derived from analyzing user-facing incidents and extracting actionable insights and learnings.
Collaborate closely with executive leadership, engineering, and operations teams to lead significant programs and reshape workflows and metrics concerning reliability and incident operations.
Manage relevant TTx metrics, particularly those related to communication and escalation. Collaborate with engineering leadership to implement necessary improvements for each metric.
Develop user-focused metrics and data to guide Stripe's incident response, reliability strategy, and user communications (including RCAs), ensuring impactful decision-making.
Who you are
We’re looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.
Minimum requirements
5+ years of management experience, including 2+ years of experience managing managers with a proven record in building, growing and transforming teams.
Extensive experience (4+ years) leading incident response for complex, large-scale distributed services with high SLOs/SLAs, coupled with deep expertise in crisis management.
Demonstrated ability to lead, influence other leaders and deliver complex strategic projects involving multiple stakeholders
Strong analytical skills, and the ability to use data to drive business decisions
Possesses proficiency in basic incident troubleshooting and a reasonable understanding of system architecture. Fluent in using SQL, Splunk, or similar query languages.
Exceptional communication abilities, capable of adapting incident updates for diverse audiences (executives, external users, internal teams).
Affinity for a fast paced work environment, crafting strategic and rapid fixes to high intensity problems with a keen eye for detail and a high bar for quality
Comfort navigating ambiguity, while identifying areas for process improvement and establishing best practices
Preferred qualifications
Experience managing geographically dispersed teams
Experience using infrastructure and application monitoring tools such as Prometheus, Sentry and others
Experience in incident response at a high-growth technology company, preferably within the payments or e-commerce sectors.
Proven ability to apply Agentic and Generative AI to revolutionize incident response, coupled with a strong grasp of current industry trends in the incident response domain.
Demonstrated history of driving engineering and process enhancements to improve incident response efficiency within a rapidly expanding technology organization.
#J-18808-Ljbffr
Be The First To Know
About the latest Incident management Jobs in Singapore !
Technology Support III, Incident Management & Response (IMR)
Posted today
Job Viewed
Job Description
Job Overview
Propel operational success with your expertise in technology support and a commitment to continuous improvement. As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firm’s infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities).
Job Responsibilities
Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm’s infrastructure.
Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required Qualifications
Bachelor’s Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
Demonstrated command and control, documentation, and communication skills in previous roles.
Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
Strong understanding of the ITIL framework and experience with incident management tools.
Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
Ability to exercise excellent judgment and decision-making skills under pressure and know when to elevate issues.
Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred Qualifications
ITIL Certification.
Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
About Us
J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world’s most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
About the Team
Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we’re setting our businesses, clients, customers and employees up for success.
#J-18808-Ljbffr
Technology Support III, Incident Management & Response (IMR)
Posted 9 days ago
Job Viewed
Job Description
Propel operational success with your expertise in technology support and a commitment to continuous improvement.
As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms’ infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.
Job responsibilities
• Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
• Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
• Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.
• Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
• Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
• Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
• Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
• Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required qualifications, capabilities, and skills
• Bachelor’s Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
• 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
• Demonstrated command and control, documentation, and communication skills in previous roles.
• Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
• Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
• Strong understanding of the ITIL framework and experience with incident management tools.
• Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
• High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
• Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.
• Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
• Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred qualifications, capabilities, and skills
• ITIL Certification.
• Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
• Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
To apply for this position, please use the following URL:
Manager (Facility Clearance, Consultancy, and Incident Management)
Posted today
Job Viewed
Job Description
Military Security Department
Permanent
What the role is
In this dynamic position, you will evaluate both physical-cyber security measures across client facilities, identifying weaknesses in their security posture and recommending remediation. This role bridges the gap between physical security controls and cybersecurity defences to create holistic protection strategies.
What you will be working on
You will conduct thorough on-site security assessments of client facilities, examining physical measures to protect network and IT infrastructure, and evaluate cyber-physical control systems. You will assist clients by performing gap analysis against authority standards and regulatory requirements and develop reports with prioritized findings and actionable recommendations. You will be called on to create customized security roadmaps and implementation plans for clients, communicate with stakeholders explaining security vulnerabilities and proposed solutions, and support the organization with incident response actions and post-breach assessment activities.
What we are looking for
You should have a tertiary education in an IT-related discipline, preferably with a focus on cyber-security. You should possess good writing and verbal communication skills, problem-solving and analytical skills. A passion for IT/cyber is essential. Cyber-security professional accreditation such as CISSP, and prior relevant work experience in cyber/IT related fields would be advantageous.
About Military Security Department
The Military Security Department (MSD)'s core business is in Counter Intelligence and internal security for MINDEF/SAF. MSD was formed in 1975 to counter the threats of espionage, subversion and sabotage against MINDEF/SAF. It began with two main entities, namely the Counter Intelligence Branch (CIB) and Field Security Branch (FSB). Over the years, the department has continued to evolve and our roles expanded in tandem with the changing security environment. Today, our roles also include Counter Terrorism and Cyber Security.
About your application process
If you do not hear from us within 4 weeks of the job ad closing date, we seek your understanding that it is likely that we are not moving forward with your application for this role. We thank you for your interest and would like to assure you that this does not affect your other job applications with the Public Service. We encourage you to explore and for other roles within Military Security Department or the wider Public Service.