86 Security Analysis jobs in Singapore
Cybersecurity Analyst
Posted today
Job Viewed
Job Description
Cybersecurity Analyst (Entry to Mid-Level)
full time role that covers:
- Securing of servers (Linux/Apache/Nginx/WordPress etc.)
- Set up firewalls, endpoint protection, backup automation
- Run vulnerability scans & basic pentests
- Set up monitoring (via tools like OSSEC, CrowdSec, Fail2ban, etc.)
- Build reports and playbooks
- Assist with writing basic security SOPs
- Begin building services like client site audits or checklists
Job Scope
Junior Cybersecurity Analyst / IT Security Executive
Responsibilities
- Secure and maintain company-hosted servers and client websites
- Conduct vulnerability assessments for client sites
- Implement and monitor cybersecurity tools and alerts
- Draft basic IT security SOPs and checklists for internal and client use
- Assist with onboarding clients into new cybersecurity packages
- Work with marketing team to translate security features into client-facing services
Preferred Skills
- Familiar with server security, WordPress hardening, SSL, DNS, WAF
- Tools: Nessus, Nmap, OpenVAS, Fail2Ban, ClamAV
- Scripting knowledge (Bash, Python)
- Certifications like CompTIA Security+ or willingness to pursue
Cybersecurity Analyst
Posted 6 days ago
Job Viewed
Job Description
Cybersecurity Analyst (Entry to Mid-Level)
full time role that covers:
- Securing of servers (Linux/Apache/Nginx/WordPress etc.)
- Set up firewalls, endpoint protection, backup automation
- Run vulnerability scans & basic pentests
- Set up monitoring (via tools like OSSEC, CrowdSec, Fail2ban, etc.)
- Build reports and playbooks
- Assist with writing basic security SOPs
- Begin building services like client site audits or checklists
Job Scope
Junior Cybersecurity Analyst / IT Security Executive
Responsibilities
- Secure and maintain company-hosted servers and client websites
- Conduct vulnerability assessments for client sites
- Implement and monitor cybersecurity tools and alerts
- Draft basic IT security SOPs and checklists for internal and client use
- Assist with onboarding clients into new cybersecurity packages
- Work with marketing team to translate security features into client-facing services
Preferred Skills
- Familiar with server security, WordPress hardening, SSL, DNS, WAF
- Tools: Nessus, Nmap, OpenVAS, Fail2Ban, ClamAV
- Scripting knowledge (Bash, Python)
- Certifications like CompTIA Security+ or willingness to pursue
Senior Cybersecurity Analyst
Posted 1 day ago
Job Viewed
Job Description
(Job ID: 1020861)
What You’ll Do
Detection Engineering
- Design and fine-tune high-fidelity detection rules across SIEMs (Splunk, Sentinel, Devo, QRadar) and EDR platforms.
- Build custom use cases based on MITRE ATT&CK and red team insights.
- Eliminate false positives, improve alert accuracy, and continuously optimize detection logic.
- Collaborate with red/purple teams to validate and evolve detection strategies.
Threat Hunting & Intelligence
- Proactively hunt for threats across hybrid environments using telemetry from SIEM, EDR, and NDR tools.
- Leverage threat intelligence and frameworks (MITRE, Diamond Model) to build and execute targeted hunting campaigns.
- Analyze and operationalize threat intel to inform detection rules and incident response.
Incident Response
- Lead end-to-end investigations—from triage to recovery—during security incidents.
- Conduct forensic analysis and produce detailed reports with root cause and mitigation plans.
- Develop playbooks, runbooks, and coordinate across teams and clients during major events.
Collaboration & Leadership
- Mentor junior analysts and contribute to process automation and SOP development.
- Engage with customers through regular reviews, briefings, and incident updates.
- Drive continuous improvement through lessons learned, threat trends, and feedback loops.
Requirements
- 8–10+ years in SOC/MSSP environments with deep SIEM (Splunk, QRadar, Sentinel, Devo) and EDR (CrowdStrike, Defender) expertise.
- Hands-on experience with SOAR platforms, malware analysis, scripting (shell, Python), and basic Unix/Linux troubleshooting.
- Strong grasp of threat detection, cyber TTPs, and frameworks like MITRE ATT&CK.
- Excellent communication skills and the ability to lead cross-functional collaboration.
- SANS certification (e.g., GCIH) strongly preferred.
Bonus Points For
- Experience with threat hunting, vulnerability assessments, or DFIR.
- Familiarity with cloud platforms (AWS, Azure, GCP) and network security tools.
- Exposure to threat intel platforms like MISP.
We regret that only shortlisted candidates will be notified. However, rest assured that all applications will be updated to our resume bank for future opportunities.
Please kindly refer to the Privacy Policy of Good Job Creations for your reference:
EA Personnel Name: Ong Kang Quan Ryan
EA Personnel Registration Number: R23116952
EA License No.: 07C5771
Senior Cybersecurity Analyst
Posted 15 days ago
Job Viewed
Job Description
(Job ID: 1020861)
What You’ll Do
Detection Engineering
- Design and fine-tune high-fidelity detection rules across SIEMs (Splunk, Sentinel, Devo, QRadar) and EDR platforms.
- Build custom use cases based on MITRE ATT&CK and red team insights.
- Eliminate false positives, improve alert accuracy, and continuously optimize detection logic.
- Collaborate with red/purple teams to validate and evolve detection strategies.
Threat Hunting & Intelligence
- Proactively hunt for threats across hybrid environments using telemetry from SIEM, EDR, and NDR tools.
- Leverage threat intelligence and frameworks (MITRE, Diamond Model) to build and execute targeted hunting campaigns.
- Analyze and operationalize threat intel to inform detection rules and incident response.
Incident Response
- Lead end-to-end investigations—from triage to recovery—during security incidents.
- Conduct forensic analysis and produce detailed reports with root cause and mitigation plans.
- Develop playbooks, runbooks, and coordinate across teams and clients during major events.
Collaboration & Leadership
- Mentor junior analysts and contribute to process automation and SOP development.
- Engage with customers through regular reviews, briefings, and incident updates.
- Drive continuous improvement through lessons learned, threat trends, and feedback loops.
Requirements
- 8–10+ years in SOC/MSSP environments with deep SIEM (Splunk, QRadar, Sentinel, Devo) and EDR (CrowdStrike, Defender) expertise.
- Hands-on experience with SOAR platforms, malware analysis, scripting (shell, Python), and basic Unix/Linux troubleshooting.
- Strong grasp of threat detection, cyber TTPs, and frameworks like MITRE ATT&CK.
- Excellent communication skills and the ability to lead cross-functional collaboration.
- SANS certification (e.g., GCIH) strongly preferred.
Bonus Points For
- Experience with threat hunting, vulnerability assessments, or DFIR.
- Familiarity with cloud platforms (AWS, Azure, GCP) and network security tools.
- Exposure to threat intel platforms like MISP.
We regret that only shortlisted candidates will be notified. However, rest assured that all applications will be updated to our resume bank for future opportunities.
Please kindly refer to the Privacy Policy of Good Job Creations for your reference:
EA Personnel Name: Ong Kang Quan Ryan
EA Personnel Registration Number: R23116952
EA License No.: 07C5771
Senior Cybersecurity Analyst / Security Engineering Lead
Posted today
Job Viewed
Job Description
Get AI-powered advice on this job and more exclusive features.
We are seeking an experienced and highly skilled cybersecurity professional to join our dynamic team as a Senior Cybersecurity Analyst / Security Engineering Lead .
In this role, you will be responsible for leading advanced security engineering initiatives and providing oversight of incident monitoring and response activities within a Level 2/3 Security Operations Center (SOC) environment. You will play a critical role in proactively identifying, investigating, and mitigating security threats, as well as driving efforts to ensure robust endpoint protection and overall infrastructure security.
Responsibilities:
Cyber Incident and Forensic Investigation:
- Lead and conduct thorough cyber incident investigations, ensuring proper analysis of threats and breaches.
- Perform forensic analysis to understand the scope of security incidents and assist in data recovery, evidence preservation, and reporting.
SOC Incident Monitoring and Investigation:
- Oversee Level 2/3 SOC operations to ensure the timely identification and resolution of security threats.
- Coordinate and lead incident response efforts across various security systems, managing escalations effectively.
Vulnerability Assessment and Penetration Testing (VA/PT):
- Conduct vulnerability assessments and penetration testing on networks, systems, and applications.
- Provide actionable recommendations for remediation of identified vulnerabilities and ensure security measures are implemented.
Endpoint Security Management:
- Implement and manage endpoint security solutions including anti-malware, encryption, and troubleshooting of endpoint devices.
- Ensure that all endpoints are secured in compliance with company security policies.
Leadership in Security Engineering:
- Lead and mentor the security engineering team, providing guidance on the design, implementation, and maintenance of security systems.
- Oversee the development and deployment of proactive security measures, ensuring the team remains responsive to evolving cyber threats.
Ethical Hacking and Security Testing:
- Perform hands-on ethical hacking, including penetration testing and vulnerability assessments, to assess and enhance organizational security posture.
Requirements:-
Certifications:
- Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or equivalent certifications.
- CISSP (Certified Information Systems Security Professional) or equivalent certification is highly preferred.
Experience:
- 5+ years of experience in cybersecurity, with hands-on experience in incident response, digital forensics, and security engineering.
- Demonstrated experience in managing security operations within a Level 2/3 SOC environment.
- Proven experience in vulnerability assessments, penetration testing, and remediation strategies.
- Expertise in endpoint security tools and anti-malware solutions.
- Strong experience in ethical hacking and penetration testing practices.
Technical Skills:
- Deep understanding of common attack vectors and security tools (e.g., SIEM, IDS/IPS, endpoint protection).
- Strong knowledge of encryption protocols and endpoint protection strategies.
- Familiarity with network security principles, firewalls, VPNs, and intrusion detection systems.
Leadership & Communication:
- Excellent leadership, communication, and team management skills.
- Ability to clearly explain complex security issues and incident findings to non-technical stakeholders.
Only shortlisted candidate will be notified.
Seniority level- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Analyst, Information Technology, and Project Management
- Industries Information Services and Financial Services
Referrals increase your chances of interviewing at Maybank by 2x
Sign in to set job alerts for “Cyber Security Analyst” roles. Information Technology - Cyber Security Analyst (Scoot) Associate Cybersecurity Specialist (No Experience Needed) Graduate Hiring - Cybersecurity Engineer Information Technology - Cyber Security Specialist (Risk and Governance) Security Operations Engineer (Shift) - 2 year contract Information Technology - Cyber Security Engineer (Threat Management and Incident Response) (Scoot) Information Technology Security Engineer Junior Specialist, Cyber Security Defense Operations Information Technology Security Engineer Application Security Engineer (Pentester)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrIT Compliance & Cybersecurity Analyst - Financial Service
Posted today
Job Viewed
Job Description
Direct message the job poster from Monee
Talent Acquisition at Shopee | Hiring top Tech talents across Product and Compliance.About the team:
The IT Compliance & Risk unit within SeaMoney is responsible for managing the Information Technology and Cyber Security risk profiles, including risk identification, management and mitigation across the group (including overseas countries).
Job Description:
- Establish and oversee the implementation of cyber security and information technology risk policies, technology and tools, and governance processes to create solutions for minimizing losses from cyber security issues, failed internal processes, inadequate controls, emerging risks and regulatory breaches
- Support security and technology compliance to internal policies, processes, and controls, as well as compliance to external regulations while proactively evaluating existing control environment for enhancement opportunities
- Work effectively with business, operations, engineering, security and infrastructure teams on evaluating, recommending, delivering and managing security/ IT solutions across Cyber and IT domains
- Manage audit/ regulatory reviews including coordination, communications, and required actions with internal auditors, external auditors, regulators and internal stakeholders as appropriate
Requirements:
- Bachelor's degree or above in computer science, technology, finance, accountancy or related disciplines
- Bilingual in English and Mandarin to facilitate cross-border collaborations with stakeholders from China.
- Strong interest / experience in the following technology categories:
- Information Security
- Infrastructure Security
- Application and Data Security
- CI/ CD, containerisation security
- Possess solid understanding on banking-related applications and technologies in terms of products and supporting services, system and business operation procedures, risk management, regulatory compliance, etc.
- Knowledge of information security standards (i.e. ISO 27001, PCI, NIST, CIS)For IT Risk applicants, knowledge and expertise of industry Information Security Standards and relevant certifications (CISA, CISSP or equivalent); IT audit background is a plus
- Strong communication skills with English and Mandarin proficiency
- Self-driven, positive attitude and team player striving for team successResourceful and able to adapt in a dynamic environment
- Seniority level Associate
- Employment type Full-time
- Job function Information Technology and Accounting/Auditing
- Industries IT Services and IT Consulting and Technology, Information and Internet
Referrals increase your chances of interviewing at Monee by 2x
Get notified about new Cyber Security Analyst jobs in Singapore, Singapore .
Information Technology - Cyber Security Analyst (Scoot) Information Security Analyst Level II - SIEM, Tues-Sat 7am-3pm Graduate Hiring - Cybersecurity Engineer Information Technology - Cyber Security Specialist (Risk and Governance) Information Technology - Cyber Security Engineer (Threat Management and Incident Response) (Scoot) Application Security Engineer (Pentester) Intern - ONT, Information Security, Fall (July to Dec 2025) Technology & Cyber Security Risk Analyst Information Security Analyst / IT Support Engineer Security Operations Engineer (Shift) - 2 year contractWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrCybersecurity Data Analyst
Posted today
Job Viewed
Job Description
Join to apply for the Cybersecurity Data Analyst role at IMDA .
The Data Operations and Intel Division in IMDA is the cybersecurity arm that processes and analyses data to discover trends and precursors to potential incidents impacting the resilience and cybersecurity posture of the infocomm and media sectors.
Early detection of cyber threats and prompt sharing of intel for intervention actions are crucial for mitigating potential damages. You will be part of the cyber operations team to analyze and identify potential cybersecurity threats using data analytics and threat hunting techniques on big data. You will work closely with cybersecurity counterparts to proactively initiate intervention actions on identified threats.
Job Responsibilities- Analyze, correlate, interpret, and visualize data to uncover trends and patterns.
- Formulate and test threat hunting hypotheses.
- Produce insights and supporting evidence to aid decision-making.
- Compile and share intelligence with counterparts for prompt intervention actions.
- Translate concepts and results into reports and presentations for senior stakeholders.
- Degree in Computer Science, Computer Engineering, Mathematics, Statistics, Data Science, or related fields.
- Knowledge of cybersecurity concepts and applications; relevant certifications are preferred.
- At least 5 years of experience in data transformation, interpretation, and analysis.
- Knowledge of statistical techniques and experience applying them.
- Experience with big data frameworks such as Hadoop, Hive, Spark, and complex SQL queries.
- Domain knowledge in Computer Networking, Network Security, or System Security is preferred.
- Strong communication, writing, and presentation skills.
- Fast learner, self-motivated, and able to acquire new knowledge quickly.
This position will be commensurate with experience.
Only shortlisted applicants will be notified.
Additional Information- Seniority level: Mid-Senior level
- Employment type: Full-time
- Job function: Information Technology
- Industry: Government Administration
Referrals increase your chances of interviewing at IMDA by 2x.
Sign in to set job alerts for “Cyber Security Analyst” roles.
#J-18808-LjbffrBe The First To Know
About the latest Security analysis Jobs in Singapore !
Cybersecurity SOC Analyst
Posted today
Job Viewed
Job Description
- Analyst would be part of 24x7 Cyber Security Operations function to perform security monitoring and incident response, data loss prevention, vulnerability management, threat intelligence and threat hunting.
- Perform monitoring, research, assessment and analysis on alerts from SIEM tools.
- Follow pre-defined actions to investigate possible security incidents or perform incident response actions, including escalating to other support groups.
- Maintains standard operating procedures (SOP), processes and guidelines.
- Ensure proper functioning of systems in the Security Operations Centre.
- Send out emails to L2 and other groups and follow up accordingly.
Requirements
- Strong analytical and problem-solving skills, with the ability to quickly identify and resolve security issues.
- Proven ability to work in a fast-paced environment, prioritize tasks, and meet deadlines.
- Ability to work in a team and each individual’s contribution is crucial to the team’s objectives.
- This is a 24/7 operational work. Able to commit to 12-hour shifts, weekends and public holidays.
- Excellent communication and interpersonal skills, with the ability to effectively collaborate with cross-functional teams and convey complex security concepts to non-technical stakeholders.
- Proven ability to work in a fast-paced environment, prioritize tasks, and meet deadlines.
#J-18808-LjbffrSecurity Analyst
Posted today
Job Viewed
Job Description
Press Tab to Move to Skip to Content Link
Select how often (in days) to receive an alert:
Select how often (in days) to receive an alert:
NCS is a leading technology services firm that operates across the Asia Pacific region in over 20 cities, providing consulting, digital services, technology solutions, and more. We believe in harnessing the power of technology to achieve extraordinary things, creating lasting value and impact for our communities, partners, and people. Our diverse workforce of 13,000 has delivered large-scale, mission-critical, and multi-platform projects for governments and enterprises in Singapore and the APAC region.
As a Security Operations Center (SOC) Analyst, you'll play a crucial part in maintaining, monitoring, and enhancing our IT security infrastructure. You'll be at the forefront of incident response, patch management, and system integrity, ensuring our digital assets remain secure and operational.
What will you do?
- Act as Incident first responder for a 24/7 staffed SOC.
- Monitor security sensors and review logs to identify network anomalies or intrusions.
- Perform initial analysis of security alerts.
- Escalate security incidents using established policies and procedures in a timely manner.
- Work with customers to analysis potential security incidents, identifying root cause and implement mitigation step(s)/ remedial action(s).
- Performing Response action based on standardize workflow and agreement with clients.
- Assist with the development of incident response plans, workflows, and SOPs.
- Provide threat and vulnerability analysis security advisory services.
- Fulfil Change Requests, Service Requests and respond to internal / external enquiries with regards to Incident Management.
The ideal candidate should possess:
- Professional security certifications such as GCIA will be an advantage.
- Experience in managing security alerts and identifying network intrusions
- Able to work well as a team and with different stakeholders
We are driven by our AEIOU beliefs—Adventure, Excellence, Integrity, Ownership, and Unity —and we seek individuals who embody these values in both their professional and personal lives. We are committed to our Impact: Valuing our clients, Growing our people, and Creating our future .
Together, we make the extraordinary happen .
Learn more about us at ncs.co and visit our LinkedIn career site.
#J-18808-LjbffrSecurity Analyst
Posted today
Job Viewed
Job Description
Select how often (in days) to receive an alert:
NCS is a leading technology services firm that operates across the Asia Pacific region in over 20 cities, providing consulting, digital services, technology solutions, and more. We believe in harnessing the power of technology to achieve extraordinary things, creating lasting value and impact for our communities, partners, and people. Our diverse workforce of 13,000 has delivered large-scale, mission-critical, and multi-platform projects for governments and enterprises in Singapore and the APAC region.
As a Security Analyst, this incumbent will perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise
What will you do?
- Perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise
- Conduct basic investigations of security events, including malware infections and unauthorized access attempts.
- Determine the nature, mechanisms and scope of incident by performing event correlation and historical searches to determine the extent of a security compromise
- Escalate complex or highly suspicious alerts for further investigation and response.
- Record details of all activities, including investigations performed, findings and remediation steps taken.
- Collects data, evidence, and context necessary for further escalation.
- Perform event correlation across the In-Scope Institutions to identify similar attack pattern and spread of attack.
- Handling case management, generating tickets and reports when required, and tracking open tickets until closure
The ideal candidate should possess:
- Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, or related field.
- Able to commit to permanent night shifts
- Team player and able to work independently.
- Experience in analysing data and review alerts
We are driven by our AEIOU beliefs—Adventure, Excellence, Integrity, Ownership, and Unity —and we seek individuals who embody these values in both their professional and personal lives. We are committed to our Impact: Valuing our clients, Growing our people, and Creating our future .
Together, we make the extraordinary happen .
Learn more about us at ncs.co and visit our LinkedIn career site.
#J-18808-Ljbffr