58 Security Incident jobs in Singapore

Cyber Security Incident Response Specialist

Singapore, Singapore beBeeIncident

Posted today

Job Viewed

Tap Again To Close

Job Description

We are seeking a seasoned incident response expert to join our global Cyber Security Operations Center.

The ideal candidate will have extensive experience in responding to cyber security incidents, conducting forensic-level analysis of systems and networks, and collaborating with cross-functional teams to ensure effective incident management.

  • Develop and maintain comprehensive incident response plans and procedures.
  • Collaborate with internal stakeholders to identify and mitigate potential security threats.
  • Conduct thorough root cause analyses to determine the source and impact of security incidents.
  • Provide technical expertise and guidance to junior analysts and other team members.
  • Stay up-to-date on emerging threat trends and advise the team on best practices for incident response and prevention.

In this role, you will have the opportunity to work with a talented team of security professionals who are passionate about protecting our organization's assets and reputation. You will be responsible for developing and maintaining comprehensive incident response plans and procedures, collaborating with internal stakeholders to identify and mitigate potential security threats, and conducting thorough root cause analyses to determine the source and impact of security incidents.

To succeed in this role, you should have:

  • 5+ years of experience in incident response operations or security operations positions in a large enterprise environment.
  • Experience in investigating and handling data breaches and leading investigations to resolution.
  • A natural ability to take the lead and drive the investigation of complex technical issues, with strong analytical and problem-solving skills.
  • Extensive experience performing cyber incident response and root-cause-analysis.
  • Techincal understanding of enterprise networks, protocols, their various components and designs.
  • Strong forensics skills, and an understanding of chain of custody requirements.
  • Experience with one or more programming/scripting languages such as Python, JavaScript, Java, or C#, deep understanding of the cyber kill-chain and MITRE ATT&CK frameworks.
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Incident Response Lead

Singapore, Singapore NTT Limited

Posted 25 days ago

Job Viewed

Tap Again To Close

Job Description

Senior Information Security Incident Response Lead page is loadedSenior Information Security Incident Response Lead Apply locations Kallang, Singapore time type Full time posted on Posted Yesterday job requisition id R-

Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

We are seeking an experienced Senior Incident Response Specialist to lead and execute advanced cybersecurity investigations. This is not an entry-level SOC role. You will be responsible for detecting, analyzing, and responding to security incidents, proactively hunting for threats, conducting forensic investigations, and contributing to vulnerability management through red teaming or penetration testing where applicable. Strong proficiency with EDR solutions, SIEM log platforms, incident case management tools, and forensic analysis tools is essential.

Key Responsibilities

  • Lead and manage complex security incidents, acting as a key contact for stakeholders.
  • Perform deep analysis of security alerts to identify, mitigate, and remediate threats.
  • Conduct forensic investigations on compromised hosts, networks, and cloud environments.
  • Proactively hunt for adversarial activity and anomalous behaviors across large datasets.
  • Analyze malware samples (basic level) to determine functionality, impact, and mitigation strategies.
  • Develop and refine detection rules, improving alert fidelity and response workflows.
  • Contribute to threat intelligence gathering, analyzing attack patterns, and enhancing defensive strategies.
  • Participate in red teaming or penetration testing activities to identify and remediate vulnerabilities.
  • Provide strategic recommendations for improving the organization’s security posture.
  • Create detailed incident reports, threat intelligence assessments, and executive summaries.
  • Mentor and provide guidance to junior analysts, fostering continuous improvement in IR methodologies.

Qualifications & Requirements

Education & Experience:

  • Bachelor's or Master's degree in Computer Science, Cybersecurity, or a related field.
  • Minimum of 5 years of experience in cybersecurity, with at least 2 years in incident response, threat hunting, or forensic analysis.

Technical Expertise:

  • Extensive experience responding to targeted attacks from APT groups, cybercriminals, and nation-state actors.
  • Strong forensic analysis skills across Windows, Linux, and macOS systems.
  • Expertise in network forensics, traffic analysis, and packet inspection (Wireshark, Zeek).
  • Proficiency in SIEM platforms (Splunk, Sentinel, QRadar) and EDR solutions (CrowdStrike, Microsoft Defender ATP).
  • Knowledge of malware analysis techniques, including static and dynamic analysis.
  • Familiarity with cloud security investigations (AWS, Azure, GCP).
  • Strong scripting skills in Python, PowerShell, or similar languages for automation.
  • Understanding of security architecture, authentication mechanisms, and enterprise IT operations is a plus.
  • Experience with vulnerability management, red teaming, or penetration testing is a plus.
  • Familiarity with MITRE ATT&CK framework and various cyber threat intelligence methodologies.

Preferred Certifications:

  • GIAC (GCFA, GNFA, GCIH, GCIA, GREM)
  • CISSP (Certified Information Systems Security Professional)
  • CEH (Certified Ethical Hacker)
  • OSCP (Offensive Security Certified Professional)
  • Cloud Security Certifications (AWS Security Specialty, Microsoft Azure Security)

Key Competencies:

  • Strong analytical and problem-solving skills in high-pressure situations.
  • Ability to manage multiple investigations efficiently while meeting deadlines.
  • Excellent verbal and written communication skills, with the ability to convey technical details to varied audiences.
  • Strong team collaboration and leadership skills, with a proactive approach to knowledge sharing.
  • Ability to work in a fast-paced environment and adapt to evolving threats and challenges.

Workplace type :

About NTT DATA
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Incident Response Lead

NTT America, Inc.

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

**Make an impact with NTT DATA**
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
We are seeking an experienced Senior Incident Response Specialist to lead and execute advanced cybersecurity investigations. This is not an entry-level SOC role. You will be responsible for detecting, analyzing, and responding to security incidents, proactively hunting for threats, conducting forensic investigations, and contributing to vulnerability management through red teaming or penetration testing where applicable. Strong proficiency with EDR solutions, SIEM log platforms, incident case management tools, and forensic analysis tools is essential.
**Key Responsibilities**
+ Lead and manage complex security incidents, acting as a key contact for stakeholders.
+ Perform deep analysis of security alerts to identify, mitigate, and remediate threats.
+ Conduct forensic investigations on compromised hosts, networks, and cloud environments.
+ Proactively hunt for adversarial activity and anomalous behaviors across large datasets.
+ Analyze malware samples (basic level) to determine functionality, impact, and mitigation strategies.
+ Develop and refine detection rules, improving alert fidelity and response workflows.
+ Contribute to threat intelligence gathering, analyzing attack patterns, and enhancing defensive strategies.
+ Participate in red teaming or penetration testing activities to identify and remediate vulnerabilities.
+ Provide strategic recommendations for improving the organization's security posture.
+ Create detailed incident reports, threat intelligence assessments, and executive summaries.
+ Mentor and provide guidance to junior analysts, fostering continuous improvement in IR methodologies.
**Qualifications & Requirements**
**Education & Experience:**
+ Bachelor's or Master's degree in Computer Science, Cybersecurity, or a related field.
+ Minimum of 5 years of experience in cybersecurity, with at least 2 years in incident response, threat hunting, or forensic analysis.
**Technical Expertise:**
+ Extensive experience responding to targeted attacks from APT groups, cybercriminals, and nation-state actors.
+ Strong forensic analysis skills across Windows, Linux, and macOS systems.
+ Expertise in network forensics, traffic analysis, and packet inspection (Wireshark, Zeek).
+ Proficiency in SIEM platforms (Splunk, Sentinel, QRadar) and EDR solutions (CrowdStrike, Microsoft Defender ATP).
+ Knowledge of malware analysis techniques, including static and dynamic analysis.
+ Familiarity with cloud security investigations (AWS, Azure, GCP).
+ Strong scripting skills in Python, PowerShell, or similar languages for automation.
+ Understanding of security architecture, authentication mechanisms, and enterprise IT operations is a plus.
+ Experience with vulnerability management, red teaming, or penetration testing is a plus.
+ Familiarity with MITRE ATT&CK framework and various cyber threat intelligence methodologies.
**Preferred Certifications:**
+ GIAC (GCFA, GNFA, GCIH, GCIA, GREM)
+ CISSP (Certified Information Systems Security Professional)
+ CEH (Certified Ethical Hacker)
+ OSCP (Offensive Security Certified Professional)
+ Cloud Security Certifications (AWS Security Specialty, Microsoft Azure Security)
**Key Competencies:**
+ Strong analytical and problem-solving skills in high-pressure situations.
+ Ability to manage multiple investigations efficiently while meeting deadlines.
+ Excellent verbal and written communication skills, with the ability to convey technical details to varied audiences.
+ Strong team collaboration and leadership skills, with a proactive approach to knowledge sharing.
+ Ability to work in a fast-paced environment and adapt to evolving threats and challenges.
**Workplace type** **:**
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Incident Response Lead

New
Singapore, Singapore NTT Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

Senior Information Security Incident Response Lead page is loaded

Senior Information Security Incident Response Lead

Apply locations Kallang, Singapore time type Full time posted on Posted Yesterday job requisition id R-

Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

We are seeking an experienced Senior Incident Response Specialist to lead and execute advanced cybersecurity investigations. This is not an entry-level SOC role. You will be responsible for detecting, analyzing, and responding to security incidents, proactively hunting for threats, conducting forensic investigations, and contributing to vulnerability management through red teaming or penetration testing where applicable. Strong proficiency with EDR solutions, SIEM log platforms, incident case management tools, and forensic analysis tools is essential.

Key Responsibilities

  • Lead and manage complex security incidents, acting as a key contact for stakeholders.
  • Perform deep analysis of security alerts to identify, mitigate, and remediate threats.
  • Conduct forensic investigations on compromised hosts, networks, and cloud environments.
  • Proactively hunt for adversarial activity and anomalous behaviors across large datasets.
  • Analyze malware samples (basic level) to determine functionality, impact, and mitigation strategies.
  • Develop and refine detection rules, improving alert fidelity and response workflows.
  • Contribute to threat intelligence gathering, analyzing attack patterns, and enhancing defensive strategies.
  • Participate in red teaming or penetration testing activities to identify and remediate vulnerabilities.
  • Provide strategic recommendations for improving the organization’s security posture.
  • Create detailed incident reports, threat intelligence assessments, and executive summaries.
  • Mentor and provide guidance to junior analysts, fostering continuous improvement in IR methodologies.

Qualifications & Requirements

Education & Experience:

  • Bachelor's or Master's degree in Computer Science, Cybersecurity, or a related field.
  • Minimum of 5 years of experience in cybersecurity, with at least 2 years in incident response, threat hunting, or forensic analysis.

Technical Expertise:

  • Extensive experience responding to targeted attacks from APT groups, cybercriminals, and nation-state actors.
  • Strong forensic analysis skills across Windows, Linux, and macOS systems.
  • Expertise in network forensics, traffic analysis, and packet inspection (Wireshark, Zeek).
  • Proficiency in SIEM platforms (Splunk, Sentinel, QRadar) and EDR solutions (CrowdStrike, Microsoft Defender ATP).
  • Knowledge of malware analysis techniques, including static and dynamic analysis.
  • Familiarity with cloud security investigations (AWS, Azure, GCP).
  • Strong scripting skills in Python, PowerShell, or similar languages for automation.
  • Understanding of security architecture, authentication mechanisms, and enterprise IT operations is a plus.
  • Experience with vulnerability management, red teaming, or penetration testing is a plus.
  • Familiarity with MITRE ATT&CK framework and various cyber threat intelligence methodologies.

Preferred Certifications:

  • GIAC (GCFA, GNFA, GCIH, GCIA, GREM)
  • CISSP (Certified Information Systems Security Professional)
  • CEH (Certified Ethical Hacker)
  • OSCP (Offensive Security Certified Professional)
  • Cloud Security Certifications (AWS Security Specialty, Microsoft Azure Security)

Key Competencies:

  • Strong analytical and problem-solving skills in high-pressure situations.
  • Ability to manage multiple investigations efficiently while meeting deadlines.
  • Excellent verbal and written communication skills, with the ability to convey technical details to varied audiences.
  • Strong team collaboration and leadership skills, with a proactive approach to knowledge sharing.
  • Ability to work in a fast-paced environment and adapt to evolving threats and challenges.

Workplace type :

About NTT DATA
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Senior Information Security Incident Response Lead

New
Singapore, Singapore NTT Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

Senior Information Security Incident Response Lead page is loaded
Senior Information Security Incident Response Lead Apply locations Kallang, Singapore time type Full time posted on Posted Yesterday job requisition id R-
Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.
We are seeking an experienced Senior Incident Response Specialist to lead and execute advanced cybersecurity investigations. This is not an entry-level SOC role. You will be responsible for detecting, analyzing, and responding to security incidents, proactively hunting for threats, conducting forensic investigations, and contributing to vulnerability management through red teaming or penetration testing where applicable. Strong proficiency with EDR solutions, SIEM log platforms, incident case management tools, and forensic analysis tools is essential.
Key Responsibilities
Lead and manage complex security incidents, acting as a key contact for stakeholders.
Perform deep analysis of security alerts to identify, mitigate, and remediate threats.
Conduct forensic investigations on compromised hosts, networks, and cloud environments.
Proactively hunt for adversarial activity and anomalous behaviors across large datasets.
Analyze malware samples (basic level) to determine functionality, impact, and mitigation strategies.
Develop and refine detection rules, improving alert fidelity and response workflows.
Contribute to threat intelligence gathering, analyzing attack patterns, and enhancing defensive strategies.
Participate in red teaming or penetration testing activities to identify and remediate vulnerabilities.
Provide strategic recommendations for improving the organization’s security posture.
Create detailed incident reports, threat intelligence assessments, and executive summaries.
Mentor and provide guidance to junior analysts, fostering continuous improvement in IR methodologies.
Qualifications & Requirements
Education & Experience:
Bachelor's or Master's degree in Computer Science, Cybersecurity, or a related field.
Minimum of 5 years of experience in cybersecurity, with at least 2 years in incident response, threat hunting, or forensic analysis.
Technical Expertise:
Extensive experience responding to targeted attacks from APT groups, cybercriminals, and nation-state actors.
Strong forensic analysis skills across Windows, Linux, and macOS systems.
Expertise in network forensics, traffic analysis, and packet inspection (Wireshark, Zeek).
Proficiency in SIEM platforms (Splunk, Sentinel, QRadar) and EDR solutions (CrowdStrike, Microsoft Defender ATP).
Knowledge of malware analysis techniques, including static and dynamic analysis.
Familiarity with cloud security investigations (AWS, Azure, GCP).
Strong scripting skills in Python, PowerShell, or similar languages for automation.
Understanding of security architecture, authentication mechanisms, and enterprise IT operations is a plus.
Experience with vulnerability management, red teaming, or penetration testing is a plus.
Familiarity with MITRE ATT&CK framework and various cyber threat intelligence methodologies.
Preferred Certifications:
GIAC (GCFA, GNFA, GCIH, GCIA, GREM)
CISSP (Certified Information Systems Security Professional)
CEH (Certified Ethical Hacker)
OSCP (Offensive Security Certified Professional)
Cloud Security Certifications (AWS Security Specialty, Microsoft Azure Security)
Key Competencies:
Strong analytical and problem-solving skills in high-pressure situations.
Ability to manage multiple investigations efficiently while meeting deadlines.
Excellent verbal and written communication skills, with the ability to convey technical details to varied audiences.
Strong team collaboration and leadership skills, with a proactive approach to knowledge sharing.
Ability to work in a fast-paced environment and adapt to evolving threats and challenges.
Workplace type :
About NTT DATA
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
Equal Opportunity Employer
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Senior Cyber Security Incident Response (L2&L3)

Singapore, Singapore Argyll Scott Singapore

Posted today

Job Viewed

Tap Again To Close

Job Description

We are seeking a Senior Cybersecurity Incident Responder to join our team on a long-term engagement. The successful candidate will play a key role in incident triage, response, and investigation , operating at Level 2 to Level 3 (L2–L3) within the Security Operations Center (SOC).

  • This is a 12-month extendable contract with strong potential for renewal based on performance as the project is on a long-term basis.

This position is ideal for an experienced security analyst with strong technical skills and hands-on experience using CrowdStrike , conducting log analysis , and managing real-world incident investigations.

Key Responsibilities
  • Perform advanced incident triage, response and investigation of security alerts from various sources
  • Lead or support L2–L3 incident response efforts , including containment, eradication, and recovery
  • Analyze logs from firewalls, intrusion prevention systems (IPS), proxies , and other security platforms
  • Use CrowdStrike EDR to identify and respond to threats across endpoints
  • Collaborate with SOC, threat intel, and infrastructure teams for coordinated response
  • Document findings and create incident reports, timelines, and root cause analysis
  • Contribute to playbook updates and process improvements based on lessons learned
  • Participate in threat hunting and detection rule tuning as needed
Requirements
  • 4–6+ years of experience in Cybersecurity Incident Response / SOC operations
  • Experience in advanced incident triage, response and investigation of security alerts from various sources
  • Hands-on experience with:
    • CrowdStrike or similar EDR platforms
    • Log analysis from firewall, IPS, proxy, and endpoint systems
    • SIEM tools for alert triage and investigation
  • Deep understanding of attack vectors, malware behavior, and threat actor TTPs (MITRE ATT&CK)
  • Familiarity with incident management frameworks (e.g., NIST, SANS)
  • Excellent analytical, documentation, and communication skills
  • Ability to work independently and under pressure in fast-paced environments
  • Relevant certifications a plus: GCIH, GCFA, CEH, or equivalent

Argyll Scott Consulting Pte Ltd

Argyll Scott Asia is acting as an Employment Business in relation to this vacancy.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Cyber Security Incident Response (L2&L3)

New
Singapore, Singapore Argyll Scott Singapore

Posted today

Job Viewed

Tap Again To Close

Job Description

We are seeking a Senior Cybersecurity Incident Responder to join our team on a long-term engagement. The successful candidate will play a key role in incident triage, response, and investigation , operating at Level 2 to Level 3 (L2–L3) within the Security Operations Center (SOC).

  • This is a 12-month extendable contract with strong potential for renewal based on performance as the project is on a long-term basis.

This position is ideal for an experienced security analyst with strong technical skills and hands-on experience using CrowdStrike , conducting log analysis , and managing real-world incident investigations.

Key Responsibilities
  • Perform advanced incident triage, response and investigation of security alerts from various sources
  • Lead or support L2–L3 incident response efforts , including containment, eradication, and recovery
  • Analyze logs from firewalls, intrusion prevention systems (IPS), proxies , and other security platforms
  • Use CrowdStrike EDR to identify and respond to threats across endpoints
  • Collaborate with SOC, threat intel, and infrastructure teams for coordinated response
  • Document findings and create incident reports, timelines, and root cause analysis
  • Contribute to playbook updates and process improvements based on lessons learned
  • Participate in threat hunting and detection rule tuning as needed
Requirements
  • 4–6+ years of experience in Cybersecurity Incident Response / SOC operations
  • Experience in advanced incident triage, response and investigation of security alerts from various sources
  • Hands-on experience with:
    • CrowdStrike or similar EDR platforms
    • Log analysis from firewall, IPS, proxy, and endpoint systems
    • SIEM tools for alert triage and investigation
  • Deep understanding of attack vectors, malware behavior, and threat actor TTPs (MITRE ATT&CK)
  • Familiarity with incident management frameworks (e.g., NIST, SANS)
  • Excellent analytical, documentation, and communication skills
  • Ability to work independently and under pressure in fast-paced environments
  • Relevant certifications a plus: GCIH, GCFA, CEH, or equivalent

Argyll Scott Consulting Pte Ltd

Argyll Scott Asia is acting as an Employment Business in relation to this vacancy.

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security incident Jobs in Singapore !

Security Specialist (Incident Response)

Singapore, Singapore HRS TALENTS PTE. LTD.

Posted 16 days ago

Job Viewed

Tap Again To Close

Job Description

  • Engage in digital forensics and incident response efforts, including investigating complex and large-scale cyberattacks. This includes analyzing logs, performing host and network forensics, and examining malicious software.
  • Take part in proactive threat hunting operations, identifying advanced threats and targeted attacks within client environments, and support security evaluations and simulation exercises.
  • Detect and analyze indicators of compromise (IOCs) and understand adversaries’ tools, techniques, and procedures (TTPs) to determine the occurrence and impact of security breaches.
  • Enhance and apply tools and processes to strengthen the organization's capabilities in investigation and threat detection.
  • Work closely with internal IT and cybersecurity teams throughout the course of an investigation.
  • Produce detailed and professional reports summarizing investigation findings and insights.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Cyber Threat Analyst (Offensive Security, Threat Hunting & Incident Response)

Singapore, Singapore Marina Bay Sands

Posted 25 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Senior Cyber Threat Analyst (Offensive Security, Threat Hunting & Incident Response) role at Marina Bay Sands .

1 day ago Be among the first 25 applicants

Join to apply for the Senior Cyber Threat Analyst (Offensive Security, Threat Hunting & Incident Response) role at Marina Bay Sands .

LOVE WHAT YOU DO? THERE IS A PLACE FOR YOU HERE!

Be part of our diverse and inclusive team.

Job Responsibilities

The candidate is expected to perform the following activities:

  • Adversarial Simulation: Perform comprehensive analyses and simulations to mimic cyber threats and identify vulnerabilities. Execute intel-led security testing and red/purple team exercises using frameworks such as MITRE Cyber Threat Informed Defence and TIBER-EU. Conduct attack simulation exercises using Tactics, Techniques, and Procedures (TTPs) that cyber threat actors use to plan and execute cyber-attacks.
Red Team Activities
  • Conduct authorized offensive security operations to test the effectiveness of cyber defenses and simulate cyber-attacks. Perform social engineering assessments (email phishing, vishing, physical access attacks) to simulate password theft, system infiltration, and malware/ransomware deployment.
Forensics And Incident Response
  • Lead cyber incident investigations and response efforts. Collaborate with cybersecurity specialists to maintain and update security testing methodologies.
General Responsibilities
  • Ensure consistent and regular attendance. Perform other related duties as assigned.
Job Requirements

Education & Certification

  • Degree or diploma with at least 5-10 years of hands-on cybersecurity experience in relevant areas. Preferred certifications: CISSP, OSCP, CRTP, CRTO, OSWE.

Experience

  • Experience in Gaming, Banking, or Critical Infrastructure InfoComm Industry is an advantage. Effective verbal and written communication skills. Proficiency with offensive security tools such as Cobalt Strike, Empire, Havoc, Mythic. Experience in setting up red teaming Command and Control (C2) infrastructure, including web/proxy servers, redirectors, domain fronting. Skills in developing malicious payloads and understanding obfuscation and encryption techniques. Proficiency in at least one scripting language (e.g., Bash, PowerShell) and/or programming language (e.g., Python, C, C#, C++, Java). Understanding of basic networking concepts and Internet protocols (e.g., TCP/IP, HTTP(S), SMTP, DNS, SSL/TLS). Knowledge of industry-recognized security testing standards and penetration testing methodology. Strong understanding of enterprise technologies, operations, and security evaluations.

Other Prerequisites

  • Strong analytical and problem-solving skills. Advanced written and verbal communication skills. Ability to foster an efficient, innovative, and team-oriented work environment. Proactive, dedicated, innovative, resourceful, and able to work under pressure. Excellent communication and interpersonal skills to present ideas and results to both technical and non-technical audiences. Thrive in a fast-paced, dynamic, and global working environment. Adapt quickly to changing priorities and complete tasks within established timeframes. Establish and maintain cooperative working relationships with team members, management, and external contacts. Maintain composure under pressure and meet deadlines with stakeholders.

Marina Bay Sands is committed to building a diverse, equitable and inclusive workforce, providing equal opportunities as we grow our talent base to match our growth ambitions in Singapore. Our employees are committed to adhere to and abide by all rules, regulations, policies and procedures, including the rules of conduct and business ethics of the Company.

Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Hospitality
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Cyber Threat Analyst (Offensive Security, Threat Hunting & Incident Response)

Singapore, Singapore Marina Bay Sands

Posted today

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Senior Cyber Threat Analyst (Offensive Security, Threat Hunting & Incident Response) role at Marina Bay Sands .

1 day ago Be among the first 25 applicants

Join to apply for the Senior Cyber Threat Analyst (Offensive Security, Threat Hunting & Incident Response) role at Marina Bay Sands .

LOVE WHAT YOU DO? THERE IS A PLACE FOR YOU HERE!

Be part of our diverse and inclusive team.

Job Responsibilities

The candidate is expected to perform the following activities:

  • Adversarial Simulation: Perform comprehensive analyses and simulations to mimic cyber threats and identify vulnerabilities. Execute intel-led security testing and red/purple team exercises using frameworks such as MITRE Cyber Threat Informed Defence and TIBER-EU. Conduct attack simulation exercises using Tactics, Techniques, and Procedures (TTPs) that cyber threat actors use to plan and execute cyber-attacks.

Red Team Activities

  • Conduct authorized offensive security operations to test the effectiveness of cyber defenses and simulate cyber-attacks. Perform social engineering assessments (email phishing, vishing, physical access attacks) to simulate password theft, system infiltration, and malware/ransomware deployment.

Forensics And Incident Response

  • Lead cyber incident investigations and response efforts. Collaborate with cybersecurity specialists to maintain and update security testing methodologies.

General Responsibilities

  • Ensure consistent and regular attendance. Perform other related duties as assigned.

Job Requirements

Education & Certification

  • Degree or diploma with at least 5-10 years of hands-on cybersecurity experience in relevant areas. Preferred certifications: CISSP, OSCP, CRTP, CRTO, OSWE.

Experience

  • Experience in Gaming, Banking, or Critical Infrastructure InfoComm Industry is an advantage. Effective verbal and written communication skills. Proficiency with offensive security tools such as Cobalt Strike, Empire, Havoc, Mythic. Experience in setting up red teaming Command and Control (C2) infrastructure, including web/proxy servers, redirectors, domain fronting. Skills in developing malicious payloads and understanding obfuscation and encryption techniques. Proficiency in at least one scripting language (e.g., Bash, PowerShell) and/or programming language (e.g., Python, C, C#, C++, Java). Understanding of basic networking concepts and Internet protocols (e.g., TCP/IP, SMTP, DNS, SSL/TLS). Knowledge of industry-recognized security testing standards and penetration testing methodology. Strong understanding of enterprise technologies, operations, and security evaluations.

Other Prerequisites

  • Strong analytical and problem-solving skills. Advanced written and verbal communication skills. Ability to foster an efficient, innovative, and team-oriented work environment. Proactive, dedicated, innovative, resourceful, and able to work under pressure. Excellent communication and interpersonal skills to present ideas and results to both technical and non-technical audiences. Thrive in a fast-paced, dynamic, and global working environment. Adapt quickly to changing priorities and complete tasks within established timeframes. Establish and maintain cooperative working relationships with team members, management, and external contacts. Maintain composure under pressure and meet deadlines with stakeholders.

Marina Bay Sands is committed to building a diverse, equitable and inclusive workforce, providing equal opportunities as we grow our talent base to match our growth ambitions in Singapore. Our employees are committed to adhere to and abide by all rules, regulations, policies and procedures, including the rules of conduct and business ethics of the Company.

Seniority level

  • Mid-Senior level

Employment type

  • Full-time

Job function

  • Information Technology

Industries

  • Hospitality
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Incident Jobs