105 Soc Analyst jobs in Singapore
SOC Analyst
Posted 1 day ago
Job Viewed
Job Description
Roles and Responsibilities:
• Monitor network traffic, system logs, and security alerts to identify potential security incidents and unauthorized activities in a timely manner.
• esign, deploy, and manage threat detection rules and preventive security controls to safeguard critical systems and data in response to the latest threat landscape.
• P rform in-depth analysis of security events to determine the nature and scope of potential security incidents and recommend risk mitigation strategies. When necessary, carry out digital forensic for reporting and auditing purposes.
• C ntribute in threat hunting exercises or cyber projects to improve overall security posture.
Qualifications & Experience:
• Tec nical know-how and experience in solutions such as but not limited to:
• N twork Security (F/W, IPS, VPN, NAC) - Fortigate, Palo Alto
• W b Security (WAF, Web isolation) - Cloudflare, Zscaler, Microsoft
• E dpoint Security (EDR, AV, DLP) - Crowdstrike, Microsoft
• T reat Monitoring - Qradar, GoogleSec Ops, Resilient, Claroty
• V lnerability Management – Tenable, Ivanti, Microsoft
• Clo d Security – Microsoft, Palo Alto
• Ide tity Management - Microsoft, CyberArk
• T reat Hunting and Simulation – Cymulate, Crowdstrike
• 3 y ars of relevant experience in SOC environment
SOC Analyst
Posted 8 days ago
Job Viewed
Job Description
Roles and Responsibilities:
• Monitor network traffic, system logs, and security alerts to identify potential security incidents and unauthorized activities in a timely manner.
• esign, deploy, and manage threat detection rules and preventive security controls to safeguard critical systems and data in response to the latest threat landscape.
• P rform in-depth analysis of security events to determine the nature and scope of potential security incidents and recommend risk mitigation strategies. When necessary, carry out digital forensic for reporting and auditing purposes.
• C ntribute in threat hunting exercises or cyber projects to improve overall security posture.
Qualifications & Experience:
• Tec nical know-how and experience in solutions such as but not limited to:
• N twork Security (F/W, IPS, VPN, NAC) - Fortigate, Palo Alto
• W b Security (WAF, Web isolation) - Cloudflare, Zscaler, Microsoft
• E dpoint Security (EDR, AV, DLP) - Crowdstrike, Microsoft
• T reat Monitoring - Qradar, GoogleSec Ops, Resilient, Claroty
• V lnerability Management – Tenable, Ivanti, Microsoft
• Clo d Security – Microsoft, Palo Alto
• Ide tity Management - Microsoft, CyberArk
• T reat Hunting and Simulation – Cymulate, Crowdstrike
• 3 y ars of relevant experience in SOC environment
SOC Analyst
Posted 15 days ago
Job Viewed
Job Description
We are looking for a Level 1 SOC Analyst to monitor and respond to security alerts. You will be the first point of contact for identifying potential security incidents and escalating them as needed. This is a great role for someone starting their career in cybersecurity.
Key Responsibilities:- Monitor security alerts using tools like SIEM, firewalls, antivirus, etc.
- Do the first level of analysis and triage of alerts.
- Create and update incident tickets.
- Escalate critical alerts to senior analysts.
- Follow standard procedures (runbooks).
- Document all actions taken.
- Basic knowledge of cybersecurity and networking.
- Familiar with tools like SIEM or firewalls (training will be provided).
- Good communication and documentation skills.
- Willing to work in rotational shifts (24x7).
- Degree in IT/Cybersecurity or related field (or relevant certification like Security+).
- Knowledge of Windows/Linux systems.
- Basic scripting (Python, PowerShell)
- Any prior internship or hands-on lab work in cybersecurity.
EA License # 14C6941
SOC Analyst/Engineer
Posted today
Job Viewed
Job Description
Position: Junior SOC Analyst / Engineer
Experience: 3-5 years
Number of Positions: 2
Salary Range: 5k-7k
Responsibilities:- Experience in cyber security as an analyst or incident responder (in a SOC/CSIRT setup, preferably)
- In-depth knowledge of current threat landscape, offensive tooling, and OWASP and MITRE ATT&CK techniques
- Technical writing skills to present complex topics to non-technical audiences
- Excellent oral and written communication skills (English)
- Malware and exploit analysis (or reverse engineering)
- Developing hypothesis-driven threat hunts
- Analyzing various events, including but not limited to web traffic, underlying network protocols, malware, lateral movement TTPs (techniques, tactics, and procedures), or Microsoft and Linux security events
- Logfile correlation and analysis, and/or system and memory analysis
- Major incident response or breach investigation management
- Chain of custody and forensic acquisitions is a bonus
- Experience with Amazon AWS is desirable
Cybersecurity SOC Analyst
Posted today
Job Viewed
Job Description
- Analyst would be part of 24x7 Cyber Security Operations function to perform security monitoring and incident response, data loss prevention, vulnerability management, threat intelligence and threat hunting.
- Perform monitoring, research, assessment and analysis on alerts from SIEM tools.
- Follow pre-defined actions to investigate possible security incidents or perform incident response actions, including escalating to other support groups.
- Maintains standard operating procedures (SOP), processes and guidelines.
- Ensure proper functioning of systems in the Security Operations Centre.
- Send out emails to L2 and other groups and follow up accordingly.
Requirements
- Strong analytical and problem-solving skills, with the ability to quickly identify and resolve security issues.
- Proven ability to work in a fast-paced environment, prioritize tasks, and meet deadlines.
- Ability to work in a team and each individual’s contribution is crucial to the team’s objectives.
- This is a 24/7 operational work. Able to commit to 12-hour shifts, weekends and public holidays.
- Excellent communication and interpersonal skills, with the ability to effectively collaborate with cross-functional teams and convey complex security concepts to non-technical stakeholders.
- Proven ability to work in a fast-paced environment, prioritize tasks, and meet deadlines.
#J-18808-LjbffrL2 SOC ANALYST LEAD
Posted today
Job Viewed
Job Description
We are seeking an L2 SOC Analyst Lead with active threat hunting, incident response, and team leadership experience to manage a 5-8 member SOC team serving government and critical infrastructure sectors.
Operating in 24/7 shifts, you will perform advanced triage, conduct forensic investigations, front client engagements, and maintain active cyber community involvement for real-time threat intelligence.
This role requires SC clearance and deep expertise in GovTech IM8/CSA requirements.
Duties and ResponsibilitiesThreat Operations Leadership:
- Lead daily shift operations with accountability for incident SLA adherence (MTTR <15 mins for P1 cases).
- Mentor L1 analysts in alert validation, triage techniques, and playbook execution.
- Conduct purple team exercises quarterly to validate detection capabilities.
Advanced Security Operations:
- Perform deep-dive investigations (memory/disk forensics, malware analysis) using tools:
- EDR (CrowdStrike/SentinelOne)
- SIEM (Splunk ES/QRadar with SOAR integration)
- Network analysis (Wireshark, Corelight)
- Lead proactive threat hunts using MITRE ATT&CK frameworks and threat intelligence.
- Develop custom detection rules (YARA, Sigma) for APT groups targeting SEA.
Client & Governance:
- Front incident response briefings for customers & stakeholders.
- Present monthly SOC reports to clients (threat trends, gap analysis, KPIs).
- Ensure compliance with IM8, NIST 800-53, and CSA Cybersecurity Act.
Threat Intelligence Integration
Maintain participation in:
- ASEAN CERT communities
- Threat intel platforms (MISP, ThreatConnect)
- Industry groups (ISC2 Singapore, ACSC Partnership Program)
- Disseminate actionable IOCs to team during shifts.
Technical Competencies
Must-Have Tools Expertise:
- Incident Response - Velociraptor, Autopsy, SIFT Workstation
- Threat Hunting - Atomic Red Team, Kestrel analytics, ELK stack
- Forensics - Volatility, Rekall, FTK Imager
- CTI Management - MISP taxonomies, STIX/TAXII feeds, OpenCTI
Certifications:
- Required: CISSP, GCIH/GCFA, SC Security Clearance
Leadership & Experience:
- 5+ years in SOC roles with 2+ years leading teams in 24/7 environments.
- Proven track record.
- Managed ≥200 critical incidents annually
- Reduced false positives by ≥40% through detection engineering
- Led threat hunts uncovering ≥3 advanced persistent threats
- Government project experience (IM8, CSA Cyber Essentials, or equivalent).
Shift & Engagement Requirements
- Willingness for 12-hour rotational shifts (including nights/weekends).
- Monthly presentation of SOC reports to client CISOs.
- Quarterly threat briefings at events (e.g., GovWare, Cyber Security ASEAN).
L2 SOC ANALYST LEAD
Posted 1 day ago
Job Viewed
Job Description
We are seeking an L2 SOC Analyst Lead with active threat hunting, incident response, and team leadership experience to manage a 5-8 member SOC team serving government and critical infrastructure sectors.
Operating in 24/7 shifts, you will perform advanced triage, conduct forensic investigations, front client engagements, and maintain active cyber community involvement for real-time threat intelligence.
This role requires SC clearance and deep expertise in GovTech IM8/CSA requirements.
Duties and ResponsibilitiesThreat Operations Leadership:
- Lead daily shift operations with accountability for incident SLA adherence (MTTR <15 mins for P1 cases).
- Mentor L1 analysts in alert validation, triage techniques, and playbook execution.
- Conduct purple team exercises quarterly to validate detection capabilities.
Advanced Security Operations:
- Perform deep-dive investigations (memory/disk forensics, malware analysis) using tools:
- EDR (CrowdStrike/SentinelOne)
- SIEM (Splunk ES/QRadar with SOAR integration)
- Network analysis (Wireshark, Corelight)
- Lead proactive threat hunts using MITRE ATT&CK frameworks and threat intelligence.
- Develop custom detection rules (YARA, Sigma) for APT groups targeting SEA.
Client & Governance:
- Front incident response briefings for customers & stakeholders.
- Present monthly SOC reports to clients (threat trends, gap analysis, KPIs).
- Ensure compliance with IM8, NIST 800-53, and CSA Cybersecurity Act.
Threat Intelligence Integration
Maintain participation in:
- ASEAN CERT communities
- Threat intel platforms (MISP, ThreatConnect)
- Industry groups (ISC2 Singapore, ACSC Partnership Program)
- Disseminate actionable IOCs to team during shifts.
Technical Competencies
Must-Have Tools Expertise:
- Incident Response - Velociraptor, Autopsy, SIFT Workstation
- Threat Hunting - Atomic Red Team, Kestrel analytics, ELK stack
- Forensics - Volatility, Rekall, FTK Imager
- CTI Management - MISP taxonomies, STIX/TAXII feeds, OpenCTI
Certifications:
- Required: CISSP, GCIH/GCFA, SC Security Clearance
Leadership & Experience:
- 5+ years in SOC roles with 2+ years leading teams in 24/7 environments.
- Proven track record.
- Managed ≥200 critical incidents annually
- Reduced false positives by ≥40% through detection engineering
- Led threat hunts uncovering ≥3 advanced persistent threats
- Government project experience (IM8, CSA Cyber Essentials, or equivalent).
Shift & Engagement Requirements
- Willingness for 12-hour rotational shifts (including nights/weekends).
- Monthly presentation of SOC reports to client CISOs.
- Quarterly threat briefings at events (e.g., GovWare, Cyber Security ASEAN).
Be The First To Know
About the latest Soc analyst Jobs in Singapore !
L1 Cyber Security SOC Analyst
Posted today
Job Viewed
Job Description
Job Overview
We are seeking for a vigilant L1 Security Operations Center (SOC) Analyst to join our 24/7 cybersecurity team.
Operating on 12-hour rotational shifts, you will perform real-time monitoring, threat detection, and initial incident response using SIEM/XDR platforms.
The role requires foundational knowledge of network security, log analysis, and attack vectors to defend against threats while escalating complex incidents to senior analysts.
This position is critical for maintaining our security posture across global digital assets.
Duties and Responsibilities
Continuous Monitoring & Detection:
- Monitor SIEM/XDR tools (e.g., Splunk, Sentinel, QRadar) for security alerts across networks, endpoints, and cloud environments.
- Analyze logs from firewalls, IDS/IPS, EDR, and other security tools to identify malicious activity.
Incident Triage & Response:
- Perform initial investigation and classification of security events (malware, phishing, DDoS).
- Execute predefined playbooks for containment (e.g., isolate hosts, block IPs).
- Escalate confirmed incidents to L2/L3 analysts with detailed documentation.
Threat Intelligence Utilization:
- Apply threat intelligence feeds (e.g., MITRE ATT&CK) to contextualize alerts.
- Monitor dark web/IoC sources for emerging threats relevant to the organization.
Reporting & Documentation:
- Document incidents in ticketing systems (e.g., Jira, ServiceNow) with timelines, actions taken, and evidence.
- Generate daily shift reports highlighting threat trends, false positives, and system health.
Tool Maintenance & Optimization:
- Tune SIEM rules to reduce false positives and improve detection accuracy.
- Validate security tool configurations (e.g., firewall policies, EDR rules).
Requirements
Education:
- Diploma/Bachelor’s in Cybersecurity, IT, Computer Science, or related field.
Experience & Skills:
- More than one year in security monitoring or more than 2 years in IT support/networking with security exposure.
Hands-on experience with:
- SIEM/XDR platforms (Splunk, Azure Sentinel, etc.)
- Security tools (EDR, firewalls, IDS/IPS, email security)
- OS security (Windows/Linux log analysis)
Understanding of:
- Networking (TCP/IP, DNS, VPN, HTTP/S)
- Common attack vectors (phishing, malware, brute force)
- Cloud security fundamentals (AWS/Azure/GCP)
Technical Certifications (Preferred):
- CompTIA Security+, CySA+, CEH, or equivalent entry-level security certs
- Vendor certifications (e.g., Splunk Core User, Microsoft SC-200)
Shift Requirements:
- Willingness to work 12-hour rotational shifts (day/night), including weekends/public holidays.
- Ability to maintain focus during high-pressure overnight shifts.
Soft Skills:
- Strong analytical thinking and attention to detail.
- Effective communication for cross-team escalation.
- Adaptability in fast-paced threat environments.
- Basic knowledge of ITIL/incident management processes.
L1 Cyber Security SOC Analyst
Posted 1 day ago
Job Viewed
Job Description
Job Overview
We are seeking for a vigilant L1 Security Operations Center (SOC) Analyst to join our 24/7 cybersecurity team.
Operating on 12-hour rotational shifts, you will perform real-time monitoring, threat detection, and initial incident response using SIEM/XDR platforms.
The role requires foundational knowledge of network security, log analysis, and attack vectors to defend against threats while escalating complex incidents to senior analysts.
This position is critical for maintaining our security posture across global digital assets.
Duties and Responsibilities
Continuous Monitoring & Detection:
- Monitor SIEM/XDR tools (e.g., Splunk, Sentinel, QRadar) for security alerts across networks, endpoints, and cloud environments.
- Analyze logs from firewalls, IDS/IPS, EDR, and other security tools to identify malicious activity.
Incident Triage & Response:
- Perform initial investigation and classification of security events (malware, phishing, DDoS).
- Execute predefined playbooks for containment (e.g., isolate hosts, block IPs).
- Escalate confirmed incidents to L2/L3 analysts with detailed documentation.
Threat Intelligence Utilization:
- Apply threat intelligence feeds (e.g., MITRE ATT&CK) to contextualize alerts.
- Monitor dark web/IoC sources for emerging threats relevant to the organization.
Reporting & Documentation:
- Document incidents in ticketing systems (e.g., Jira, ServiceNow) with timelines, actions taken, and evidence.
- Generate daily shift reports highlighting threat trends, false positives, and system health.
Tool Maintenance & Optimization:
- Tune SIEM rules to reduce false positives and improve detection accuracy.
- Validate security tool configurations (e.g., firewall policies, EDR rules).
Requirements
Education:
- Diploma/Bachelor’s in Cybersecurity, IT, Computer Science, or related field.
Experience & Skills:
- More than one year in security monitoring or more than 2 years in IT support/networking with security exposure.
Hands-on experience with:
- SIEM/XDR platforms (Splunk, Azure Sentinel, etc.)
- Security tools (EDR, firewalls, IDS/IPS, email security)
- OS security (Windows/Linux log analysis)
Understanding of:
- Networking (TCP/IP, DNS, VPN, HTTP/S)
- Common attack vectors (phishing, malware, brute force)
- Cloud security fundamentals (AWS/Azure/GCP)
Technical Certifications (Preferred):
- CompTIA Security+, CySA+, CEH, or equivalent entry-level security certs
- Vendor certifications (e.g., Splunk Core User, Microsoft SC-200)
Shift Requirements:
- Willingness to work 12-hour rotational shifts (day/night), including weekends/public holidays.
- Ability to maintain focus during high-pressure overnight shifts.
Soft Skills:
- Strong analytical thinking and attention to detail.
- Effective communication for cross-team escalation.
- Adaptability in fast-paced threat environments.
- Basic knowledge of ITIL/incident management processes.
L1 Cyber Security SOC Analyst Intern
Posted 1 day ago
Job Viewed
Job Description
Job Overview
We are seeking for a vigilant L1 Security Operations Center (SOC) Analyst to join our 24/7 cybersecurity team.
Operating on 12-hour rotational shifts, you will perform real-time monitoring, threat detection, and initial incident response using SIEM/XDR platforms.
The role requires foundational knowledge of network security, log analysis, and attack vectors to defend against threats while escalating complex incidents to senior analysts.
This position is critical for maintaining our security posture across global digital assets.
Duties and Responsibilities
Continuous Monitoring & Detection:
- Monitor SIEM/XDR tools (e.g., Splunk, Sentinel, QRadar) for security alerts across networks, endpoints, and cloud environments.
- Analyze logs from firewalls, IDS/IPS, EDR, and other security tools to identify malicious activity.
Incident Triage & Response:
- Perform initial investigation and classification of security events (malware, phishing, DDoS).
- Execute predefined playbooks for containment (e.g., isolate hosts, block IPs).
- Escalate confirmed incidents to L2/L3 analysts with detailed documentation.
Threat Intelligence Utilization:
- Apply threat intelligence feeds (e.g., MITRE ATT&CK) to contextualize alerts.
- Monitor dark web/IoC sources for emerging threats relevant to the organization.
Reporting & Documentation:
- Document incidents in ticketing systems (e.g., Jira, ServiceNow) with timelines, actions taken, and evidence.
- Generate daily shift reports highlighting threat trends, false positives, and system health.
Tool Maintenance & Optimization:
- Tune SIEM rules to reduce false positives and improve detection accuracy.
- Validate security tool configurations (e.g., firewall policies, EDR rules).
Requirements
Education:
- Diploma/Bachelor’s in Cybersecurity, IT, Computer Science, or related field.
Experience & Skills:
- More than one year in security monitoring or more than 2 years in IT support/networking with security exposure.
Hands-on experience with:
- SIEM/XDR platforms (Splunk, Azure Sentinel, etc.)
- Security tools (EDR, firewalls, IDS/IPS, email security)
- OS security (Windows/Linux log analysis)
Understanding of:
- Networking (TCP/IP, DNS, VPN, HTTP/S)
- Common attack vectors (phishing, malware, brute force)
- Cloud security fundamentals (AWS/Azure/GCP)
Technical Certifications (Preferred):
- CompTIA Security+, CySA+, CEH, or equivalent entry-level security certs
- Vendor certifications (e.g., Splunk Core User, Microsoft SC-200)
Shift Requirements:
- Willingness to work 12-hour rotational shifts (day/night), including weekends/public holidays.
- Ability to maintain focus during high-pressure overnight shifts.
Soft Skills:
- Strong analytical thinking and attention to detail.
- Effective communication for cross-team escalation.
- Adaptability in fast-paced threat environments.
- Basic knowledge of ITIL/incident management processes.