194 Incident Management jobs in Singapore

Incident Management Engineer

Singapore, Singapore The Rundown AI, Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time

A World-Changing Company
Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.
The Role
Incident Management Engineers (IMEs) are the driving forces of stability across Palantir’s products. IMEs help to ensure Palantir fixes critical issues immediately. When something goes wrong, IMEs are the first to respond and are responsible for triaging, troubleshooting, and coordinating the resolution of the issue.
You’ll be a member of a centralized team responsible for managing the most critical outages. You are an excellent communicator, collaborator, and troubleshooter and can use both of these skills in fast-paced and high-stakes environments. You are able to parse technical details quickly and know when to ask for help when you need it.
Whatever the issue is, you are ensuring it gets resolved at a high bar as quickly and seamlessly as possible.
Core Responsibilities
Develop a deep understanding of Palantir’s product and delivery ecosystem.
Collaborate with customer-facing, product, and infrastructure teams on the development and deployment of scalable, reliable software for our customers.
Diagnose, resolve, and prevent issues encountered in the field.
Reduce the operational overhead of responding to critical incidents at Palantir through investments in tooling, process, and automation.
Take part in a 24/7 on-call rotation responsible for coordinating Palantir’s response to mission-critical incidents, ensuring efficient resolution with minimal customer impact.
What We Value
Excellent problem solving skills.
Comfort working in a fast paced environment.
Ability to work both independently and make decisions under minimal direction, as well as collaborate as part of a team.
Experience with scripting, automation, or data analysis a plus.
What We Require
Background in Computer Science, Engineering, Information Systems, or other technical field.
Willingness and interest to travel to other Palantir locations as needed.
Life at Palantir
We want every Palantirian to achieve their best outcomes, that’s why we celebrate individuals’ strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians’ lives is just one of the ways we’re investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region.
In keeping consistent with Palantir’s values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the city and or country in which you are employed. If the posting is specified as Onsite, you are required to work from an office.
If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process, please reach out and let us know how we can help.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

AVP- IT Incident Management

$90000 - $120000 Y Mizuho Bank, Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description:

We are seeking an experienced and results-driven Incident Manager to oversee and lead incident management processes. To ensure timely resolution of incidents, coordinate effectively across teams, and implement best practices to minimize disruptions to business operations. This role requires strong expertise in incident management, clear communication skills.

Incident Management

  • Oversee the end-to-end incident lifecycle, from identification and logging to resolution and closure with technical teams, vendors, and stakeholders.
  • Drive Root Cause Analysis (RCA) for critical incidents and ensure appropriate follow-ups.
  • Develop and maintain incident management dashboards, metrics, and reports for senior leadership.
  • Facilitate discussions within the recovery team, promoting engagement and maintaining discipline.
  • Ability to translate technical incidents into business terms.

Process Improvement and SLA

  • Continuously refine and enhance incident management processes to ensure efficiency and effectiveness.
  • Identify trends and recurring issues, recommending proactive measures to prevent future incidents.
  • Lead or contribute to training sessions and knowledge-sharing initiatives on incident management practices.
  • Monitor and ensure adherence to Service Level Agreements (SLAs) for incident resolution.
  • Proactively escalate and address SLA breaches with appropriate corrective actions.

Communication

  • Ensure timely and clear communication of incident updates to stakeholders, including senior management and end users.
  • Draft and distribute incident notifications, status updates, and post-incident reports.
  • Bridge communication between technical teams and non-technical stakeholders to provide clarity and context.

Stakeholder and User Engagement

  • Collaborate closely with business users to understand their needs and minimize incident impact on operations.
  • Support Japanese-speaking stakeholders, ensuring language and cultural alignment.
  • Act as the liaison between Singapore, Japan-based teams, and global and regional IT units during incident management.

Job Requirements:

  • Tertiary degree in technology from a recognized educational institution.
  • Strong understanding of ITIL processes; ITIL certification is highly preferred
  • 6–8 years of experience in IT incident management or related roles in banking industry, with at least 2–3 years in a leadership capacity.
  • Proven experience managing critical incidents and working with international teams, including Japanese-speaking stakeholders.
  • Experience in IT Service Management, IT Operations, IT infrastructure, or Production Support.
  • Good understanding of Service Desk Operations, Escalation Management, Stakeholder Management experience including different (e.g. ServiceNow, JIRA and Salesforce) ticketing tools knowledge.
  • Strong decision-making, problem-solving abilities under pressure, prioritize and multitask effectively.
  • Excellent interpersonal skills to foster collaboration across teams and regions.
This advertiser has chosen not to accept applicants from your region.

Manager (Audit and Incident Management)

Singapore, Singapore $90000 - $120000 Y Ministry of Defence Singapore

Posted today

Job Viewed

Tap Again To Close

Job Description

Military Security Department

Permanent

What the role is

As a cyber auditor in our team, you will be responsible for conducting comprehensive security assessments, and compliance reviews. You will work with cross-functional teams to implement security best practices and help build our cyber resilience.

What you will be working on

You will plan and execute security audits across network infrastructure, applications, and systems, to assess compliance with industry standards. Following, you will document findings, prioritise vulnerabilities, and recommend remediation strategies. You will also develop and maintain audit frameworks, and security testing methodologies. You will also collaborate with IT and development teams to implement security improvements and support the organization with incident response actions and post incident assessment activities.

What we are looking for

You should have a tertiary education in an IT-related discipline, preferably with a focus on cyber-security. You should possess good writing and verbal communication skills, problem-solving and analytical skills. A passion for IT/cyber is essential. Cyber-security professional accreditation such as CISSP, CISA, CEH, and prior relevant work experience in cyber/IT related fields would be advantageous.

About Military Security Department

The Military Security Department (MSD)'s core business is in Counter Intelligence and internal security for MINDEF/SAF. MSD was formed in 1975 to counter the threats of espionage, subversion and sabotage against MINDEF/SAF. It began with two main entities, namely the Counter Intelligence Branch (CIB) and Field Security Branch (FSB). Over the years, the department has continued to evolve and our roles expanded in tandem with the changing security environment. Today, our roles also include Counter Terrorism and Cyber Security.

About your application process

If you do not hear from us within 4 weeks of the job ad closing date, we seek your understanding that it is likely that we are not moving forward with your application for this role. We thank you for your interest and would like to assure you that this does not affect your other job applications with the Public Service. We encourage you to explore and for other roles within Military Security Department or the wider Public Service.

This advertiser has chosen not to accept applicants from your region.

Technology Support III, Incident Management

JPMorganChase

Posted today

Job Viewed

Tap Again To Close

Job Description

JOB DESCRIPTION

Propel operational success with your expertise in technology support and a commitment to continuous improvement.

As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms' infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.

Job responsibilities

  • Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
  • Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
  • Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.
  • Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
  • Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
  • Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
  • Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
  • Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.

Required qualifications, capabilities, and skills

  • Bachelor's Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
  • 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
  • Demonstrated command and control, documentation, and communication skills in previous roles.
  • Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
  • Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
  • Strong understanding of the ITIL framework and experience with incident management tools.
  • Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
  • High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
  • Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.
  • Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
  • Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.

Preferred qualifications, capabilities, and skills

  • ITIL Certification.
  • Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
  • Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.

ABOUT US

J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world's most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.

We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.

ABOUT THE TEAM

Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we're setting our businesses, clients, customers and employees up for success.

This advertiser has chosen not to accept applicants from your region.

Technology Support III, Incident Management

Singapore, Singapore JPMORGAN CHASE BANK, N.A.

Posted today

Job Viewed

Tap Again To Close

Job Description

Roles & Responsibilities

Propel operational success with your expertise in technology support and a commitment to continuous improvement.

As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms' infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.

Job responsibilities


• Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.


• Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.


• Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.


• Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.


• Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.


• Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.


• Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.


• Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.

Required qualifications, capabilities, and skills


• Bachelor's Degree in Computer Science, Cybersecurity, Data Science, or related disciplines


• 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.


• Demonstrated command and control, documentation, and communication skills in previous roles.


• Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.


• Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.


• Strong understanding of the ITIL framework and experience with incident management tools.


• Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.


• High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.


• Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.


• Ability to influence senior technology managers across organizational boundaries through formal and informal channels.


• Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.

Preferred qualifications, capabilities, and skills


• ITIL Certification.


• Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.


• Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.

To apply for this position, please use the following URL:

Tell employers what skills you have

customer mindset
Incident Command
Trust
Collaborative
Hardware
Defense
Identifying risks
Documentation Skills
Root Cause Analysis
Achieving Results
Penetration Testing
Cultural Diversity
Pressure
Operating Systems
Data Science
ITIL
Team Player
Stakeholder Management
Team Work
Incident Management
This advertiser has chosen not to accept applicants from your region.

Manager, Incident Response & Management

Singapore, Singapore Monograph

Posted today

Job Viewed

Tap Again To Close

Job Description

Who we are
About Stripe
Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world’s largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone’s reach while doing the most important work of your career.
About the team
The Incident Response team is a global 24/7 team responsible for driving incident response and management from detection to resolution. Stripe is proud of its five 9s API reliability and this team is at the forefront of ensuring we keep it that way - working hand-in-hand with Reliability Eng and across the Tech Org. This team of incident response managers (IRM) is defined by our sense of ownership and how we drive incidents to resolution - marshaling the necessary cross-functional resources to respond to and resolve service outages, critical bugs, security attacks and anything that significantly impacts the users of our products. The team is user-first and ensures appropriate external communications from Stripe and senior management to keep our users informed of disruption to their experience of Stripe. The team is highly skilled in incident troubleshooting, program management, incident classifications, incident communications, incident escalation and technical adeptness as incidents can arise from anywhere and cut across products and orgs in Stripe.
What you’ll do
This position entails leading and optimizing Stripe's incident management processes and automation, ensuring efficiency and adherence to stringent incident response metrics. As the head of the incident response team, you will establish and maintain a best-in-class incident response framework, upholding the reliability standards expected of Stripe. Responsibilities include but are not limited to incident classification, escalation, and notification management, along with accountability for key incident response metrics (TTx). You will generate actionable insights to drive continuous improvement, collaborating with engineering leadership to refine incident detection, response, user communication, and tooling efficacy. Leadership and development of a highly effective 24/7 global incident response management team, characterized by urgency, programmatic ownership of incidents and communications, and the capacity to engage engineering teams, are crucial. Additionally, you will manage incident communications across multiple channels for executive and end-user audiences, and identify automation opportunities to streamline incident response workflows, thereby safeguarding users and minimizing disruption to their operations.
Responsibilities
Lead the global 24/7 team of regional managers and incident response managers with ability to be hands-on and support frontline on-call with speed, cross-functional collaboration and escalation
Develop and own Stripe's incident response and management strategy and cross-functional roadmap, ensuring it aligns with the company's reputation for reliability.
Spearhead and manage Stripe's AI-First strategy for automation of incident response workflows, partnering with the engineering team to implement required tooling enhancements.
Enhance Stripe's incident response by leading and implementing improvements derived from analyzing user-facing incidents and extracting actionable insights and learnings.
Collaborate closely with executive leadership, engineering, and operations teams to lead significant programs and reshape workflows and metrics concerning reliability and incident operations.
Manage relevant TTx metrics, particularly those related to communication and escalation. Collaborate with engineering leadership to implement necessary improvements for each metric.
Develop user-focused metrics and data to guide Stripe's incident response, reliability strategy, and user communications (including RCAs), ensuring impactful decision-making.
Who you are
We’re looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.
Minimum requirements
5+ years of management experience, including 2+ years of experience managing managers with a proven record in building, growing and transforming teams.
Extensive experience (4+ years) leading incident response for complex, large-scale distributed services with high SLOs/SLAs, coupled with deep expertise in crisis management.
Demonstrated ability to lead, influence other leaders and deliver complex strategic projects involving multiple stakeholders
Strong analytical skills, and the ability to use data to drive business decisions
Possesses proficiency in basic incident troubleshooting and a reasonable understanding of system architecture. Fluent in using SQL, Splunk, or similar query languages.
Exceptional communication abilities, capable of adapting incident updates for diverse audiences (executives, external users, internal teams).
Affinity for a fast paced work environment, crafting strategic and rapid fixes to high intensity problems with a keen eye for detail and a high bar for quality
Comfort navigating ambiguity, while identifying areas for process improvement and establishing best practices
Preferred qualifications
Experience managing geographically dispersed teams
Experience using infrastructure and application monitoring tools such as Prometheus, Sentry and others
Experience in incident response at a high-growth technology company, preferably within the payments or e-commerce sectors.
Proven ability to apply Agentic and Generative AI to revolutionize incident response, coupled with a strong grasp of current industry trends in the incident response domain.
Demonstrated history of driving engineering and process enhancements to improve incident response efficiency within a rapidly expanding technology organization.
Office-assigned Stripes spend at least 50% of the time in a given month in their local office or with users. This hits a balance between bringing people together for in-person collaboration and learning from each other, while supporting flexibility about how to do this in a way that makes sense for individuals and their teams. The annual salary range for this role in the primary location is S$208,000 - S$312,000. This range may change if you are hired in another location. For sales roles, the range provided is the role’s On Target Earnings (“OTE”) range, meaning that the range includes both the sales commissions/sales bonuses target and annual base salary for the role. This salary range may be inclusive of several career levels at Stripe and will be narrowed during the interview process based on a number of factors, including the candidate’s experience, qualifications, and specific location. Applicants interested in this role and who are not located in the primary location may request the annual salary range for their location during the interview process.
Specific benefits and details about what compensation is included in the salary range listed above will vary depending on the applicant’s location and can be discussed in more detail during the interview process. Benefits/additional compensation for this role may include: equity, company bonus or sales commissions/bonuses; retirement plans; health benefits; and wellness stipends.
Office locations
Singapore
Team
Infrastructure & Corporate Tech
Job type
Full time
Apply for this role
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Manager, Incident Response & Management

Singapore, Singapore Refine Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Who we are
About Stripe
Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world’s largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone’s reach while doing the most important work of your career.
About the team
The Incident Response team is a global 24/7 team responsible for driving incident response and management from detection to resolution. Stripe is proud of its five 9s API reliability and this team is at the forefront of ensuring we keep it that way - working hand-in-hand with Reliability Eng and across the Tech Org. This team of incident response managers (IRM) is defined by our sense of ownership and how we drive incidents to resolution - marshaling the necessary cross-functional resources to respond to and resolve service outages, critical bugs, security attacks and anything that significantly impacts the users of our products. The team is user-first and ensures appropriate external communications from Stripe and senior management to keep our users informed of disruption to their experience of Stripe. The team is highly skilled in incident troubleshooting, program management, incident classifications, incident communications, incident escalation and technical adeptness as incidents can arise from anywhere and cut across products and orgs in Stripe.
What you’ll do
This position entails leading and optimizing Stripe's incident management processes and automation, ensuring efficiency and adherence to stringent incident response metrics. As the head of the incident response team, you will establish and maintain a best-in-class incident response framework, upholding the reliability standards expected of Stripe. Responsibilities include but are not limited to incident classification, escalation, and notification management, along with accountability for key incident response metrics (TTx). You will generate actionable insights to drive continuous improvement, collaborating with engineering leadership to refine incident detection, response, user communication, and tooling efficacy. Leadership and development of a highly effective 24/7 global incident response management team, characterized by urgency, programmatic ownership of incidents and communications, and the capacity to engage engineering teams, are crucial. Additionally, you will manage incident communications across multiple channels for executive and end-user audiences, and identify automation opportunities to streamline incident response workflows, thereby safeguarding users and minimizing disruption to their operations.
Responsibilities
Lead the global 24/7 team of regional managers and incident response managers with ability to be hands-on and support frontline on-call with speed, cross-functional collaboration and escalation
Develop and own Stripe's incident response and management strategy and cross-functional roadmap, ensuring it aligns with the company's reputation for reliability.
Spearhead and manage Stripe's AI-First strategy for automation of incident response workflows, partnering with the engineering team to implement required tooling enhancements.
Enhance Stripe's incident response by leading and implementing improvements derived from analyzing user-facing incidents and extracting actionable insights and learnings.
Collaborate closely with executive leadership, engineering, and operations teams to lead significant programs and reshape workflows and metrics concerning reliability and incident operations.
Manage relevant TTx metrics, particularly those related to communication and escalation. Collaborate with engineering leadership to implement necessary improvements for each metric.
Develop user-focused metrics and data to guide Stripe's incident response, reliability strategy, and user communications (including RCAs), ensuring impactful decision-making.
Who you are
We’re looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.
Minimum requirements
5+ years of management experience, including 2+ years of experience managing managers with a proven record in building, growing and transforming teams.
Extensive experience (4+ years) leading incident response for complex, large-scale distributed services with high SLOs/SLAs, coupled with deep expertise in crisis management.
Demonstrated ability to lead, influence other leaders and deliver complex strategic projects involving multiple stakeholders
Strong analytical skills, and the ability to use data to drive business decisions
Possesses proficiency in basic incident troubleshooting and a reasonable understanding of system architecture. Fluent in using SQL, Splunk, or similar query languages.
Exceptional communication abilities, capable of adapting incident updates for diverse audiences (executives, external users, internal teams).
Affinity for a fast paced work environment, crafting strategic and rapid fixes to high intensity problems with a keen eye for detail and a high bar for quality
Comfort navigating ambiguity, while identifying areas for process improvement and establishing best practices
Preferred qualifications
Experience managing geographically dispersed teams
Experience using infrastructure and application monitoring tools such as Prometheus, Sentry and others
Experience in incident response at a high-growth technology company, preferably within the payments or e-commerce sectors.
Proven ability to apply Agentic and Generative AI to revolutionize incident response, coupled with a strong grasp of current industry trends in the incident response domain.
Demonstrated history of driving engineering and process enhancements to improve incident response efficiency within a rapidly expanding technology organization.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Incident management Jobs in Singapore !

Technology Support III, Incident Management & Response (IMR)

Singapore, Singapore JPMorganChase

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Overview
Propel operational success with your expertise in technology support and a commitment to continuous improvement. As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firm’s infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities).
Job Responsibilities
Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm’s infrastructure.
Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required Qualifications
Bachelor’s Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
Demonstrated command and control, documentation, and communication skills in previous roles.
Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
Strong understanding of the ITIL framework and experience with incident management tools.
Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
Ability to exercise excellent judgment and decision-making skills under pressure and know when to elevate issues.
Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred Qualifications
ITIL Certification.
Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
About Us
J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world’s most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
About the Team
Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we’re setting our businesses, clients, customers and employees up for success.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Technology Support III, Incident Management & Response (IMR)

$16000 Monthly JPMORGAN CHASE BANK, N.A.

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Propel operational success with your expertise in technology support and a commitment to continuous improvement.

As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms’ infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.

Job responsibilities

• Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.

• Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.

• Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.

• Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.

• Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.

• Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.

• Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.

• Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.

Required qualifications, capabilities, and skills

• Bachelor’s Degree in Computer Science, Cybersecurity, Data Science, or related disciplines

• 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.

• Demonstrated command and control, documentation, and communication skills in previous roles.

• Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.

• Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.

• Strong understanding of the ITIL framework and experience with incident management tools.

• Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.

• High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.

• Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.

• Ability to influence senior technology managers across organizational boundaries through formal and informal channels.

• Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.

Preferred qualifications, capabilities, and skills

• ITIL Certification.

• Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.

• Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.


To apply for this position, please use the following URL:

This advertiser has chosen not to accept applicants from your region.

Manager (Facility Clearance, Consultancy, and Incident Management)

Singapore, Singapore $90000 - $120000 Y Ministry of Defence Singapore

Posted today

Job Viewed

Tap Again To Close

Job Description

Military Security Department

Permanent

What the role is

In this dynamic position, you will evaluate both physical-cyber security measures across client facilities, identifying weaknesses in their security posture and recommending remediation. This role bridges the gap between physical security controls and cybersecurity defences to create holistic protection strategies.

What you will be working on

You will conduct thorough on-site security assessments of client facilities, examining physical measures to protect network and IT infrastructure, and evaluate cyber-physical control systems. You will assist clients by performing gap analysis against authority standards and regulatory requirements and develop reports with prioritized findings and actionable recommendations. You will be called on to create customized security roadmaps and implementation plans for clients, communicate with stakeholders explaining security vulnerabilities and proposed solutions, and support the organization with incident response actions and post-breach assessment activities.

What we are looking for

You should have a tertiary education in an IT-related discipline, preferably with a focus on cyber-security. You should possess good writing and verbal communication skills, problem-solving and analytical skills. A passion for IT/cyber is essential. Cyber-security professional accreditation such as CISSP, and prior relevant work experience in cyber/IT related fields would be advantageous.

About Military Security Department

The Military Security Department (MSD)'s core business is in Counter Intelligence and internal security for MINDEF/SAF. MSD was formed in 1975 to counter the threats of espionage, subversion and sabotage against MINDEF/SAF. It began with two main entities, namely the Counter Intelligence Branch (CIB) and Field Security Branch (FSB). Over the years, the department has continued to evolve and our roles expanded in tandem with the changing security environment. Today, our roles also include Counter Terrorism and Cyber Security.

About your application process

If you do not hear from us within 4 weeks of the job ad closing date, we seek your understanding that it is likely that we are not moving forward with your application for this role. We thank you for your interest and would like to assure you that this does not affect your other job applications with the Public Service. We encourage you to explore and for other roles within Military Security Department or the wider Public Service.

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Incident Management Jobs