202 Security Incidents jobs in Singapore

Information Technology - Cyber Security Engineer (Threat Management and Incident Response) (Scoot)

Singapore, Singapore Singapore Airlines

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

Information Technology - Cyber Security Engineer (Threat Management and Incident Response) (Scoot)

Join to apply for the Information Technology - Cyber Security Engineer (Threat Management and Incident Response) (Scoot) role at Singapore Airlines .

Job Description

You will be a member of the Group Information Security Team responsible for responding to threats and incidents to the corporate networks, systems (on-prem and cloud), and digital assets.

Key Responsibilities
  • Perform security monitoring and incident response activities across the Scoot networks, leveraging a variety of tools and techniques.
  • Manage Security Operations Center.
  • Detect incidents through proactive “hunting” across security-relevant data sets.
  • Correlate multiple events from different devices to identify abnormal behaviour.
  • Document incident response analysis activities thoroughly.
  • Develop new, repeatable methods for finding malicious activities.
  • Provide recommendations to enhance detection and protection capabilities.
  • Present technical topics effectively to both technical and non-technical audiences.
  • Develop and follow detailed operational processes and procedures for analyzing, escalating, and remediating security incidents.
  • Prioritize multiple high-priority tasks and formulate responses in a fast-paced environment.
  • Prepare documentation for security standards, operational procedures, and system hardening.
  • Analyze endpoint, network, and application logs.
  • Assist other IT teams with security-related issues.
  • Engage with vendors and SIA team members for security reviews.
Requirements
  • Degree in Computer Engineering, Computer Science, Information Systems, or equivalent.
  • At least 5-6 years of experience in Cybersecurity Incident and Security Operations.
  • Experience in Information Security with a focus on Cyber Security Operations, Incident Response, and Detection.
  • Experience working in SOC or Computer Incident Response Team.
  • Excellent problem-solving skills, including root cause analysis and post-incident reviews.
  • Solid knowledge of computer networks and protocols.
  • Knowledge of cyber threat actors and APT groups.
  • Experience with Threat Intelligence Platforms.
  • Experience with SIEM tools, especially Splunk.
  • Professional security qualifications (e.g., GCIA, CISSP) are advantageous.
  • Preferred certifications: CISSP, CISM, CISA, ISMS, TOGAF, SABS.
  • Good interpersonal skills and ability to work independently and in teams.

We thank all candidates for your interest in Singapore Airlines, and regret that only shortlisted candidates will be notified.

Additional Details
  • Seniority level: Mid-Senior level
  • Employment type: Full-time
  • Job function: Information Technology
  • Industries: Airlines and Aviation

Referrals increase your chances of interviewing at Singapore Airlines by 2x.

Explore more roles and set job alerts for “Information Technology Security Engineer”. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Technology - Cyber Security Engineer (Threat Management and Incident Response) (Scoot)

Singapore, Singapore Singapore Airlines

Posted today

Job Viewed

Tap Again To Close

Job Description

Information Technology - Cyber Security Engineer (Threat Management and Incident Response) (Scoot)
Join to apply for the
Information Technology - Cyber Security Engineer (Threat Management and Incident Response) (Scoot)
role at
Singapore Airlines .
Job Description
You will be a member of the Group Information Security Team responsible for responding to threats and incidents to the corporate networks, systems (on-prem and cloud), and digital assets.
Key Responsibilities
Perform security monitoring and incident response activities across the Scoot networks, leveraging a variety of tools and techniques.
Manage Security Operations Center.
Detect incidents through proactive “hunting” across security-relevant data sets.
Correlate multiple events from different devices to identify abnormal behaviour.
Document incident response analysis activities thoroughly.
Develop new, repeatable methods for finding malicious activities.
Provide recommendations to enhance detection and protection capabilities.
Present technical topics effectively to both technical and non-technical audiences.
Develop and follow detailed operational processes and procedures for analyzing, escalating, and remediating security incidents.
Prioritize multiple high-priority tasks and formulate responses in a fast-paced environment.
Prepare documentation for security standards, operational procedures, and system hardening.
Analyze endpoint, network, and application logs.
Assist other IT teams with security-related issues.
Engage with vendors and SIA team members for security reviews.
Requirements
Degree in Computer Engineering, Computer Science, Information Systems, or equivalent.
At least 5-6 years of experience in Cybersecurity Incident and Security Operations.
Experience in Information Security with a focus on Cyber Security Operations, Incident Response, and Detection.
Experience working in SOC or Computer Incident Response Team.
Excellent problem-solving skills, including root cause analysis and post-incident reviews.
Solid knowledge of computer networks and protocols.
Knowledge of cyber threat actors and APT groups.
Experience with Threat Intelligence Platforms.
Experience with SIEM tools, especially Splunk.
Professional security qualifications (e.g., GCIA, CISSP) are advantageous.
Preferred certifications: CISSP, CISM, CISA, ISMS, TOGAF, SABS.
Good interpersonal skills and ability to work independently and in teams.
We thank all candidates for your interest in Singapore Airlines, and regret that only shortlisted candidates will be notified.
Additional Details
Seniority level: Mid-Senior level
Employment type: Full-time
Job function: Information Technology
Industries: Airlines and Aviation
Referrals increase your chances of interviewing at Singapore Airlines by 2x.
Explore more roles and set job alerts for “Information Technology Security Engineer”.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Vice President, Information Security Threat Management Specialist, Global Information Security

Singapore, Singapore MERRILL LYNCH GLOBAL SERVICES PTE. LTD.

Posted today

Job Viewed

Tap Again To Close

Job Description

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Job Description:
The Identity Defense team aims to mitigate incidents through monitoring of network account usage, authentication activities and authentication behaviors. The team is responsible to reduce the risk associated with misuse or illicit use of accounts which grant access to Bank of America's workforce network. An Identity Defense analyst is accountable for researching, designing, engineering, implementing, and supporting solutions to prevent and detect anomalous use of accounts.
Responsibilities:
The Identity Defense Specialist will support design efforts to build out new processes, controls, and supporting governance related to implementation of human and non-human account monitoring to protect the Bank. You will utilize in-depth technical knowledge and business requirements to help implement scalable solutions, inclusive of monitoring, alerting, and escalation frameworks focused on core account protections. Leveraging your knowledge of both common and emerging threats related to account take-over, you will have an opportunity to proactively develop, implement, and influence controls and policy within the digital identity domain. You will partner with leaders from line of business organizations to triage security events and report on impacting security incidents.
The Analyst will regularly collaborate with experts in and out of our team, both in country and in other regions, so excellent communication skills are very important. The role will also involve discussion with employees as part of alert analysis and disposition. If you are seeking a demanding role within Global Information Security (GIS) and have the required skills, this will be a great opportunity for you. Typically, applicants should have 3+ years of cybersecurity or engineering experience. Responsibilities include, but are not limited to:
Actively investigate alerts related to potentially anomalous behavior/activity.
Confidently and professionally interview/question users to determine or confirm root cause.
Communicate effectively with response and business partners.
Build and monitor Splunk alerting and dashboards.
Identify areas for further process automation, simplification, and improvement.
Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
Risk management.
Comprehensively document analysis, investigative activities, actions, etc.
Required Skills:
3+ years of experience with cloud information security related activities.
3+ years of experience in an operations focused cloud information security role.
Experience conducting analysis/investigation and containment of potential data breaches or cyber security incidents.
Ability to analyze data and evaluate relevance to a specific incident under investigation.
Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
Ability to exercise independent judgment when responding to alerts.
Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
Familiarity with security vulnerabilities exploits and hacker techniques.
Familiarity identity management standards, social engineering TTPs, and the incident response lifecycle.
Familiarity with Splunk, and the ability to build queries, alerts, dashboards, etc.
Knowledgeable of current authentication-based exploits.
Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
Supportive and can work well as part of a team as well as independently.
Can remain calm under pressure.
Ability to work in a strong team-orientated environment with a sense of urgency and resilience.
Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
Desired Skills:
Desired Skills/Qualifications/Certifications:
Cloud+; AZ-900 (Azure Fundamentals), AZ-500 (Azure Security Engineer Associate), SC-900 (Security, Compliance and Identity Fundamentals); AWS Certified Security Specialty 2024
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Assistant Vice President, Information Security Threat Management Specialist, Global Information[...]

Singapore, Singapore Bank of America

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview
Bank of America aims to mitigate incidents through monitoring of network account usage, authentication activities and authentication behaviors. The Identity Defense team reduces risk associated with misuse or illicit use of accounts which grant access to Bank of America's workforce network. An Identity Defense analyst researches, designs, engineering, implementing, and supporting solutions to prevent and detect anomalous use of accounts.
Responsibilities
Actively investigate alerts related to potentially anomalous behavior/activity.
Confidently and professionally interview/question users to determine or confirm root cause.
Communicate effectively with response and business partners.
Build and monitor Splunk alerting and dashboards.
Identify areas for further process automation, simplification, and improvement.
Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
Risk management.
Comprehensively document analysis, investigative activities, actions, etc.
Required Skills
3+ years of experience with cloud information security related activities.
3+ years of experience in an operations focused cloud information security role.
Experience conducting analysis/investigation and containment of potential data breaches or cyber security incidents.
Ability to analyze data and evaluate relevance to a specific incident under investigation.
Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
Ability to exercise independent judgment when responding to alerts.
Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
Familiarity with security vulnerabilities exploits and hacker techniques.
Familiarity identity management standards, social engineering TTPs, and the incident response lifecycle.
Familiarity with Splunk, and the ability to build queries, alerts, dashboards, etc.
Knowledgeable of current authentication-based exploits.
Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
Supportive and can work well as part of a team as well as independently.
Can remain calm under pressure.
Ability to work in a strong team-orientated environment with a sense of urgency and resilience.
Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
Desired Skills
Cloud+; AZ-900 (Azure Fundamentals), AZ-500 (Azure Security Engineer Associate), SC-900 (Security, Compliance and Identity Fundamentals); AWS Certified Security Specialty 2024
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Assistant Vice President, Information Security Threat Management Specialist, Global Information S...

Singapore, Singapore Bank of America

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

Assistant Vice President, Information Security Threat Management Specialist, Global Information Security
Singapore, Singapore
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge
Refer a friend
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge ( Description:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
**Job Description:**
The Identity Defense team aims to mitigate incidents through monitoring of network account usage, authentication activities and authentication behaviors. The team is responsible to reduce the risk associated with misuse or illicit use of accounts which grant access to Bank of America's workforce network. An Identity Defense analyst is accountable for researching, designing, engineering, implementing, and supporting solutions to prevent and detect anomalous use of accounts.
**Responsibilities:**
The Identity Defense Specialist will support design efforts to build out new processes, controls, and supporting governance related to implementation of human and non-human account monitoring to protect the Bank. You will utilize in-depth technical knowledge and business requirements to help implement scalable solutions, inclusive of monitoring, alerting, and escalation frameworks focused on core account protections. Leveraging your knowledge of both common and emerging threats related to account take-over, you will have an opportunity to proactively develop, implement, and influence controls and policy within the digital identity domain. You will partner with leaders from line of business organizations to triage security events and report on impacting security incidents.
The Analyst will regularly collaborate with experts in and out of our team, both in country and in other regions, so excellent communication skills are very important. The role will also involve discussion with employees as part of alert analysis and disposition. If you are seeking a demanding role within Global Information Security (GIS) and have the required skills, this will be a great opportunity for you. Typically, applicants should have 3+ years of cybersecurity or engineering experience. Responsibilities include, but are not limited to:
+ Actively investigate alerts related to potentially anomalous behavior/activity.
+ Confidently and professionally interview/question users to determine or confirm root cause.
+ Communicate effectively with response and business partners.
+ Build and monitor Splunk alerting and dashboards.
+ Identify areas for further process automation, simplification, and improvement.
+ Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
+ Risk management.
+ Comprehensively document analysis, investigative activities, actions, etc.
**Required Skills:**
+ 3+ years of experience with cloud information security related activities.
+ 3+ years of experience in an operations focused cloud information security role.
+ Experience conducting analysis/investigation and containment of potential data breaches or cyber security incidents.
+ Ability to analyze data and evaluate relevance to a specific incident under investigation.
+ Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
+ Ability to exercise independent judgment when responding to alerts.
+ Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
+ Familiarity with security vulnerabilities exploits and hacker techniques.
+ Familiarity identity management standards, social engineering TTPs, and the incident response lifecycle.
+ Familiarity with Splunk, and the ability to build queries, alerts, dashboards, etc.
+ Knowledgeable of current authentication-based exploits.
+ Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
+ Supportive and can work well as part of a team as well as independently.
+ Can remain calm under pressure.
+ Ability to work in a strong team-orientated environment with a sense of urgency and resilience.
+ Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
**Desired Skills:**
Desired Skills/Qualifications/Certifications:
Cloud+; AZ-900 (Azure Fundamentals), AZ-500 (Azure Security Engineer Associate), SC-900 (Security, Compliance and Identity Fundamentals); AWS Certified Security Specialty 2024
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
To view the "Know your Rights" poster, CLICK HERE ( .
View the LA County Fair Chance Ordinance ( .
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
This advertiser has chosen not to accept applicants from your region.

Security Analyst

Singapore, Singapore Singtel Group

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

Select how often (in days) to receive an alert:

NCS is a leading technology services firm that operates across the Asia Pacific region in over 20 cities, providing consulting, digital services, technology solutions, and more. We believe in harnessing the power of technology to achieve extraordinary things, creating lasting value and impact for our communities, partners, and people. Our diverse workforce of 13,000 has delivered large-scale, mission-critical, and multi-platform projects for governments and enterprises in Singapore and the APAC region.

As a Security Analyst, this incumbent will perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise

What will you do?

  • Perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise
  • Conduct basic investigations of security events, including malware infections and unauthorized access attempts.
  • Determine the nature, mechanisms and scope of incident by performing event correlation and historical searches to determine the extent of a security compromise
  • Escalate complex or highly suspicious alerts for further investigation and response.
  • Record details of all activities, including investigations performed, findings and remediation steps taken.
  • Collects data, evidence, and context necessary for further escalation.
  • Perform event correlation across the In-Scope Institutions to identify similar attack pattern and spread of attack.
  • Handling case management, generating tickets and reports when required, and tracking open tickets until closure

The ideal candidate should possess:

  • Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, or related field.
  • Able to commit to permanent night shifts
  • Team player and able to work independently.
  • Experience in analysing data and review alerts

We are driven by our AEIOU beliefs—Adventure, Excellence, Integrity, Ownership, and Unity —and we seek individuals who embody these values in both their professional and personal lives. We are committed to our Impact: Valuing our clients, Growing our people, and Creating our future .

Together, we make the extraordinary happen .

Learn more about us at ncs.co and visit our LinkedIn career site.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Analyst

Singapore, Singapore Recruit Avenue

Posted today

Job Viewed

Tap Again To Close

Job Description

Role Overview

Our client, a leading global commodities brokerage and financial services firm, is seeking an IAM Operations Analyst to support and manage identity lifecycle processes, authentication, authorization, and access control across a full stack of business applications. The role will work closely with IT, security, and infrastructure teams to ensure secure and compliant access management.

Key Responsibilities


• Design and implement IAM frameworks aligned with security best practices and business needs


• Manage user provisioning, deprovisioning, and role-based access control across multiple systems


• Ensure compliance with regulations (e.g., GDPR, SOX) and internal security policies


• Maintain documentation of user access policies and audit logs for reporting purposes


• Conduct role-based access control (RBAC) reviews to minimize excessive or inappropriate permissions


• Collaborate with IT, security, and business stakeholders to align IAM initiatives with organizational goals


• Lead investigations into access-related incidents and recommend remediation measures


• Promote security awareness and train staff on access policies and procedures


• Oversee IAM team activities, including performance appraisals and ensuring SLAs are met


• Monitor and manage Jira queues to ensure timely resolution of requests

Requirements


• Strong knowledge of IAM tools (e.g., Okta, SailPoint, CyberArk, Azure AD) and technologies such as SSO, MFA, and RBAC


• Solid understanding of security principles such as least privilege, identity governance, and privileged access management


• Familiarity with compliance frameworks and regulations such as GDPR, SOX, HIPAA, ISO


• Strong problem-solving, analytical, and communication skills with the ability to work across technical and non-technical teams


• Experience conducting audits, producing reports, and ensuring IAM systems comply with legal and regulatory standards


• Ability to respond effectively to access-related incidents and manage IAM operations in high-pressure situations


• Experience working in regulated industries such as financial services


• Proven ability to engage stakeholders and present IAM risks and performance to senior leadership

Yang Lily, Recruit Avenue Pte. Ltd.

EA License Number: 23C1935 | EA Personnel Number: R

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security incidents Jobs in Singapore !

Security Analyst

Singapore, Singapore Singtel Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Select how often (in days) to receive an alert:
NCS is a leading technology services firm that operates across the Asia Pacific region in over 20 cities, providing consulting, digital services, technology solutions, and more. We believe in harnessing the power of technology to achieve extraordinary things, creating lasting value and impact for our communities, partners, and people. Our diverse workforce of 13,000 has delivered large-scale, mission-critical, and multi-platform projects for governments and enterprises in Singapore and the APAC region.
As a Security Analyst, this incumbent will perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise
What will you do?
Perform initial analysis (e.g. analysing and reviewing alerts, eliminating false positives and determining severity of threats) to determine impact of compromise
Conduct basic investigations of security events, including malware infections and unauthorized access attempts.
Determine the nature, mechanisms and scope of incident by performing event correlation and historical searches to determine the extent of a security compromise
Escalate complex or highly suspicious alerts for further investigation and response.
Record details of all activities, including investigations performed, findings and remediation steps taken.
Collects data, evidence, and context necessary for further escalation.
Perform event correlation across the In-Scope Institutions to identify similar attack pattern and spread of attack.
Handling case management, generating tickets and reports when required, and tracking open tickets until closure
The ideal candidate should possess:
Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, or related field.
Able to commit to permanent night shifts
Team player and able to work independently.
Experience in analysing data and review alerts
We are driven by our
AEIOU beliefs—Adventure, Excellence, Integrity, Ownership, and Unity —and we seek individuals who embody these values in both their professional and personal lives. We are
committed to our Impact: Valuing our clients, Growing our people, and Creating our future .
Together, we
make the extraordinary happen .
Learn more about us at ncs.co and visit our LinkedIn career site.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Security Analyst 3

Singapore, Singapore Oracle

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview

Join to apply for the Security Analyst 3 role at Oracle .

We are looking for professionals with experience protecting critical infrastructure to help defend Oracle cloud infrastructure. Our team is skilled in threat hunting, analyzing indicators of compromise (IOCs), investigating adverse security events, security incident management, and digital forensics across IaaS, PaaS and SaaS environments. You will be part of a corporate security operations center responsible for defending infrastructure from adversaries and insider threats. This includes using tools to analyze and respond to threats, creating tools/scripts to aid in analysis, and responding in real time to adverse security events. The Senior SOC Analyst will leverage advanced security tooling and automation to rapidly detect and respond to real-time security alerts and events and conduct detailed root cause investigations. The analyst will work closely with other SOC personnel, forensics, incident response, and engineering partners to mitigate a wide variety of threats and malicious activity.

Responsibilities
  • Support shifts and on call rotations
  • Detect and respond to security events and threats from alerting, escalations, and other sources
  • Lead complex investigations and conduct deep analysis of security events focused on rapid containment, remediation, and mitigation
  • Work closely with security engineering teams to improve monitoring, detection, and tooling
  • Understand the threat landscape, emerging trends, and incorporate this understanding into day-to-day security monitoring
  • Operate SOC technologies, including but not limited to a Security Information Event Management (SIEM) platform, IDS, SOAR, Firewalls, Anti-Malware solutions, and insider threat tooling
  • Assist with security incident response activities
  • Prepare assigned reports for the SOC manager
  • Provide high quality written and verbal reports as required
  • Actively monitor and respond to the SIEM alert queue and triage alerts
  • Investigate alerts using standard operating procedures
  • Monitor several screens, systems, and alerts simultaneously
  • This role is open to Singaporeans only
  • Must meet eligibility requirements for obtaining and maintaining a Singapore government security clearance
  • This role may involve working on government projects which require security clearance; willingness to provide necessary personal details for clearance is required
Qualifications
  • 8+ years of Incident Response, Security Operations Center, and/or Forensic Analyst experience
  • Comfortable working in an ambiguous, fast-paced, unpredictable environment
  • Experience in a highly collaborative, team-centric, event-driven operations team
  • Experience with querying across large data sets to understand complex problems
  • Strong attention to detail
  • Experience in fields such as national security, military, intelligence, law enforcement, criminology, or related areas
  • Experience with Windows, UNIX/Linux, and MacOS
  • Experience performing open source research on a variety of topics
  • Excellent verbal and written communication skills with the ability to convey technical information to non-technical staff
About Us

As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. We’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.

Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Singapore, Singapore RiDiK (A subsidiary of CLPS. Nasdaq: CLPS)

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Summary

We’re looking for a Full stack developer-Cybersecurity Analyst to support our team in Job Singapore . This role offers the opportunity to work on meaningful projects, collaborate with talented colleagues, and contribute to the success of a growing company. If you’re someone who takes initiative, values continuous learning, and thrives in a collaborative setting, we’d love to hear from you.

Key Responsibilities
  • Possess a degree in Computer Science/Information Technology or related fields.
  • At least 5 to 7 years working in a cybersecurity operations function or similar.
  • Deep understanding of cybersecurity frameworks, attack techniques (MITRE ATT&CK), and threat detection methodologies .
  • Working knowledge of Data Science, AI technologies such as NLP, Machine Learning and Generative AI .
  • Experienced with programming languages, preferably Python, C++/C# or R with experience in AI-related libraries (e.g., TensorFlow, PyTorch, Scikit-learn ).
  • Strong analytical and practitioner skills, combined with excellent written and verbal communication skills.
  • Ability to break down complex problems and articulate them clearly to a non-technical audience.
  • Relevant certifications in SANS, OffSec or other relevant credentials is a plus.
  • Ability to work independently and as part of a team in a fast-paced, dynamic environment.
About CLPS RiDiK

RiDiK is a global technology solutions provider and a subsidiary of CLPS Incorporation (NASDAQ: CLPS), delivering cutting-edge end-to-end services across banking, wealth management, and e-commerce. With deep expertise in AI, cloud, big data, and blockchain, we support clients across Asia, North America, and the Middle East in driving digital transformation and achieving sustainable growth. Operating from regional hubs in 10 countries and backed by a global delivery network, we combine local insight with technical excellence to deliver real, measurable impact. Join RiDiK and be part of an innovative, fast-growing team shaping the future of technology across industries.

Seniority level
  • Associate
Employment type
  • Contract
Job function
  • Other
Industries
  • IT Services and IT Consulting

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Incidents Jobs