156 Threat Intelligence jobs in Singapore
Threat Intelligence Specialist, SPS Threat Intelligence

Posted 11 days ago
Job Viewed
Job Description
Amazon's Selling Partner Risk (SPR) team within the Selling Partner Services (SPS) space designs and implements policies, tools and technological innovations to protect customers by identifying and preventing abuse worldwide. Our growth requires highly skilled candidates who move fast, have an entrepreneurial spirit to create new solutions, a tenacity to get things done, thrive in an environment of ambiguity and change, and are capable of breaking down and solving complex problems. We value individual expression, respect different opinions, and work together to create a culture where each of us is able to contribute fully. Our unique backgrounds and perspectives strengthen our ability to achieve Amazon's mission of being Earth's most customer-centric company.
Our Threat Intelligence (TI) team is looking for an experienced Intelligence Specialist with demonstrated subject matter expertise in fraud threat intelligence either in the private or public sector. Ideal candidates have served in a capacity within the Intelligence Community performing a wide variety of support functions to include detecting, identifying, assessing, exploiting, countering and/or neutralizing the intelligence collection or adversarial efforts of threat actors. This position will be based in Singapore to support the SPS TI team's APAC outfit. You will be on a team responsible for identifying and analyzing fraud activity, discovering tactics, techniques, and procedures employed by the fraud actors, and providing intelligence support to investigations. You will identify areas for process improvement and work with other cross-functional teams to automate and streamline new and existing workflows. This position will provide you with a challenging opportunity. As a TI Specialist, you will work closely with partner teams and provide TI collection oversight. To be successful, the candidate must possess a customer-oriented attitude; have the highest standards of professionalism, and thrive in a work environment where everyone's views are respected and valued.
Key job responsibilities
- Analyze data sets and third-party intel to uncover fraud patterns.
- Investigate fraud forums, and fraud-as-a-service marketplaces.
- Write and execute SQL queries to identify abuse signals and telemetry trends.
- Collaborate across Risk, Cybersecurity, and Abuse teams to mitigate fraud.
- Conduct link analysis to identify threat actor networks.
- Monitor evolving fraud ecosystems and produce alerts and actor profiles.
- Contribute to automation and ML-based fraud detection logic.
About the team
The SPS Threat Intelligence team protects Amazon and its subsidiaries by proactively analyzing new security threats, identifying malicious actors, and researching the evolving threat landscape. We partner with teams throughout Amazon to facilitate information sharing and increase security resilience through cross-functional collaboration. We share actionable threat information and focus on continually developing collaboration and partnerships with security & intelligence teams throughout Amazon and the security industry. TI drives and enhances our ability to emulate threat actors, respond to incidents, and to stay one step ahead of our adversaries.
Basic Qualifications
- Fluent in Mandarin, reading, writing and speaking
- 4+ years in fraud investigation, threat intel, or trust & safety roles.
- SQL proficiency to extract and analyze structured data.
- Knowledge of online fraud schemes and behavioral abuse.
- OSINT skills and experience with tools like traditional threat intelligence vendors and tools.
- Strong communication skills to produce intelligence reports.
Preferred Qualifications
- Familiarity with fraud detection models and abuse metrics.
- An understanding of stealer logs, botnets, and fraud related ecosystems.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Threat Intelligence Specialist, SPS Threat Intelligence

Posted 21 days ago
Job Viewed
Job Description
Amazon's Selling Partner Risk (SPR) team within the Selling Partner Services (SPS) space designs and implements policies, tools and technological innovations to protect customers by identifying and preventing abuse worldwide. Our growth requires highly skilled candidates who move fast, have an entrepreneurial spirit to create new solutions, a tenacity to get things done, thrive in an environment of ambiguity and change, and are capable of breaking down and solving complex problems. We value individual expression, respect different opinions, and work together to create a culture where each of us is able to contribute fully. Our unique backgrounds and perspectives strengthen our ability to achieve Amazon's mission of being Earth's most customer-centric company.
Our Threat Intelligence (TI) team is looking for an experienced Intelligence Specialist with demonstrated subject matter expertise in fraud threat intelligence either in the private or public sector. Ideal candidates have served in a capacity within law enforcement and the intelligence community performing a wide variety of support functions to include detecting, identifying, assessing, exploiting, countering and/or neutralizing the intelligence collection or adversarial efforts of fraud actors. This position will be based in Singapore to support the SPS TI team's APAC outfit. You will be on a team responsible for identifying and analyzing fraud activity, discovering tactics, techniques, and procedures employed by the fraud actors along with new fraud trents, and providing intelligence support to investigations. You will ideally also identify areas for process improvement and work with other cross-functional teams to automate and streamline new and existing workflows. This position will provide you with a challenging opportunity. As a TI Specialist, you will work closely with partner teams and provide TI collection oversight. To be successful, the candidate must possess a customer-oriented attitude; have the highest standards of professionalism, and thrive in a work environment where everyone's views are respected and valued.
Key job responsibilities
- Investigate fraudulent/illegal activity by fraud actors across different platforms spanning the clear and deep/dark web, including fraud forums and fraud-as-a-service marketplaces, and conduct link analysis to identify fraud actor networks.
- Write and execute SQL queries and analyze large datasets as well as third-party intelligence to uncover fraud signals, patterns and trends.
- Actively strengthen intelligence gathering, and investigation SOPs.
- Contribute to automation and ML-based fraud detection logic.
- Collaborate cross-functionally with Risk, Abuse, Legal, and Cybersecurity teams to mitigate fraud.
About the team
The SPS Threat Intelligence team protects Amazon and its subsidiaries by proactively analyzing new security threats, identifying malicious actors, and researching the evolving threat landscape. We partner with teams throughout Amazon to facilitate information sharing and increase security resilience through cross-functional collaboration. We share actionable threat information and focus on continually developing collaboration and partnerships with security & intelligence teams throughout Amazon and the security industry. TI drives and enhances our ability to identify fraud actors, respond to incidents, and to stay one step ahead of our adversaries.
Basic Qualifications
- High proficiency in Mandarin Chinese (speaking, reading and writing) for China market-focused research and communication purposes.
- 4+ years' professional experience working in a threat intelligence or investigations role focused on fraud, abuse, cybercrime, or trust and safety.
- Proven experience with analyzing large datasets and performing database querying with SQL.
- Strong OSINT/DDW skills and experience with leading threat intelligence vendors and tools.
- Excellent written communication skills to produce intelligence reports.
Preferred Qualifications
- Familiarity with Chinese e-commerce market and threat landscape.
- Experience with process optimization and/or automation.
- Professional exposure to fraud detection models and abuse metrics.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Threat Intelligence Lead
Posted today
Job Viewed
Job Description
Join to apply for the Threat Intelligence Lead role at Canonical
Join to apply for the Threat Intelligence Lead role at Canonical
Get AI-powered advice on this job and more exclusive features.
The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.
This role will report to the CISO.
You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.
As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.
What you'll do in this role
- Build and own Canonical's threat intelligence strategy
- Build and maintain OSINT research environments
- Develop OSINT tradecraft, principals, and techniques
- Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
- Collaborate across teams to inform on activity of interest
- Coordinate adversary/campaign tracking
- Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
- Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
- Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
- Identify intelligence gaps and propose new tools and research projects to fill them
- Conduct briefings for executives, internal stakeholders and external customers
- An experienced threat intelligence leader (or similar)
- Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
- Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
- Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
- Experienced using threat intelligence data to influence enterprise architecture or product development decisions
- An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
- Able to travel twice a year, for company events up to two weeks long
- A professional portfolio of OSINT related scripts, tools, or frameworks
- Demonstrated involvement in the larger OSINT community (please share relevant links)
- Degree qualified, with a bachelor's degree in computer science, information security, or a related field
- Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
- Experience in a tech company or government/military signal intelligence departments
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Get notified about new Threat Intelligence Lead jobs in Singapore, Singapore .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrThreat Intelligence Specialist
Posted today
Job Viewed
Job Description
This role involves conducting in-depth analysis, due diligence and investigations of emerging threats against clients' assets, employees, executives, and operations.
- Represent core values of integrity, vigilance, and excellence.
- Conduct analysis and investigation services in a timely and professional manner with special attention to quality and accuracy.
- Complete all-source collection and research including the analyze, evaluate, and integrate data from multiple sources, identify information/intelligence gaps, specify collection requirements, and produce assessments and recommendations.
- Independently conduct investigations involving medium to high levels of complexity.
- Prepare case project plan and review with supervisor.
- Extract essential information and analysis from investigations and intelligence products and synthesizes into actionable reports.
- Prepare and/or review all submitted analysis and investigative reports to ensure accuracy, research and investigative sufficiency and professional quality and edit as needed.
- Establish and manage investigative files for all new cases, including data input to keep files current.
- Provide detailed analysis through specialized interpretation of threat information to guide decision makers.
- Ensure compliance with all components of the contract through appropriate measurements.
- Maintain a continued, positive relationship with the client through appropriate contact and the anticipation of service needs.
- Communicate all issues related to the client relationship, with the appropriate management personnel.
- Participate in designated training sessions and review company training materials.
- Enhance professional competencies and ensure high quality investigations.
- Submit accurate time and expense records in accordance with guidelines.
- All other duties, as assigned.
- Bachelor's degree in criminal justice, law enforcement, statistical analysis, or a related field with at least three years of corporate intelligence, investigative, and/or threat assessment experience.
- Strong interview/interrogation skills.
- Able to write detailed, accurate, complex investigative and business correspondence and present information in one-on-one and group situations.
- Excellent verbal, written, and interpersonal communication skills.
- Must be able to work under adverse and stressful conditions with little or no supervision.
- Able to solve complex problems.
- Sound judgment and discretion.
- Able to organize workload for effective implementation.
- Able to interact effectively at all levels and across diverse cultures.
- Serve as an effective team member and leader.
- Able to adapt as the external environment and organization evolves.
- Able to implement changes to operations and external/internal environment.
- Computer skills; Microsoft Office.
Threat Intelligence Career
Posted today
Job Viewed
Job Description
Cybersecurity Threat Intelligence Analyst
Job Description
- The Cybersecurity Threat Intelligence Analyst is responsible for analyzing and interpreting threat intelligence data to identify potential security risks and vulnerabilities. They will work closely with the security operations team to implement strategies to mitigate these risks.
- The ideal candidate will have a strong understanding of security protocols and procedures, as well as excellent analytical and problem-solving skills. They must be able to work effectively in a fast-paced environment and prioritize tasks to meet deadlines.
- The successful candidate will also have excellent communication and interpersonal skills, with the ability to collaborate with cross-functional teams and convey complex security concepts to non-technical stakeholders.
Requirements:
- Strong analytical and problem-solving skills
- Proven ability to work in a fast-paced environment and prioritize tasks to meet deadlines
- Excellent communication and interpersonal skills
Benefits:
- Opportunity to work in a dynamic and innovative team
- Competitive salary and benefits package
- Professional development and growth opportunities
Others:
- Must be willing to work flexible hours, including evenings and weekends
- Ability to commit to 12-hour shifts, weekends, and public holidays
Digital Threat Intelligence Specialist
Posted today
Job Viewed
Job Description
The Cyber Security Analyst is responsible for safeguarding the organization's digital assets by identifying and mitigating potential security risks, monitoring network activity for unusual behavior, and responding to incidents.
Key Responsibilities:- Ensure accurate and rapid response to security events.
- Analyze security logs, SIEM alerts, and incident reports to identify and mitigate risks.
- Respond to and investigate security incidents, including breaches, malware outbreaks, and phishing attacks. Monitor networks and systems for security breaches, alerts, and anomalous activity.
- Conduct root-cause analysis to prevent future incidents and develop incident response procedures.
- Provide analysis and trending of security log data from various security devices.
- Configure and maintain SIEM tools to align with the organization's security objectives and threat landscape.
- Create custom SIEM dashboards and reports for different stakeholders to visualize critical security metrics and incident data.
- Develop and optimize SIEM content, including rules, alerts, and correlation logic, to improve threat detection and response.
- Regularly review and tune SIEM rules to reduce false positives, enhance event correlation, and maintain relevance to evolving threats.
- Document and update SIEM processes and configurations, ensuring a high level of data accuracy and availability.
- Perform regular vulnerability scans and assist in patch management processes. Work with IT teams to prioritize and remediate them.
- Recommend solutions to mitigate risks in any activity that may potentially impact security of existing IT and information management.
- Ensure compliance with industry regulations (e.g., GDPR, ISO 27001) and company policies.
- Assist in the development, implementation, and maintenance of security policies, standards, and guidelines.
- Assist in training staff on security best practices, including phishing awareness and data protection.
- Help develop educational materials and conduct periodic security awareness training.
- Advise and consult internal/external customers on risk assessment, threat modeling, and vulnerability management. Perform risk assessments and recommend security measures to mitigate potential risks.
- Document risks, vulnerabilities, and remediation strategies in a detailed risk management report.
- Maintain up-to-date knowledge of the IT security industry, including awareness of new or revised security solutions, improved security processes, and development of new attacks and threat vectors.
- Manage and optimize security tools, such as firewalls, antivirus software, and intrusion detection/prevention systems (IDPS).
- Perform 1st-level troubleshooting on servers and network issues with regards to log collection/security tools.
- Generate reports on security metrics, incidents, and remediation efforts for management.
- Maintain accurate documentation of incidents, security changes, and system configurations.
SOC Threat Intelligence Specialist
Posted today
Job Viewed
Job Description
SOC Threat Intelligence Analyst
Description:
A threat intelligence analyst plays a vital role in the security operations center, tasked with monitoring and analyzing network activity to identify potential threats. This includes continuous monitoring of system activities for signs of malicious behavior, conducting proactive threat hunting, and generating actionable threat intelligence using open-source and commercial threat feeds.
Responsibilities:
- Monitor and analyze network traffic for suspicious activity
- Conduct proactive threat hunting to identify Indicators of Compromise (IOCs) and threat actor tactics, techniques, and procedures (TTPs)
- Develop and implement SIEM rules to streamline incident triage and analysis
- Provide incident response support as needed
Requirements:
Skills and Qualifications:
- Minimum 1 year of relevant working experience in SOC as security analyst, IT Security Operations, and Computer Emergency Response Team (CERT/CIRT)
- Diploma/ Degree in computer science/computer engineering/information security or related certifications
- Strong understanding of data from network diagnostic tools
- Certifications with GSEC, GCIH, GCIA, GCTI, GCFA, GCFE, or GNFA will be advantageous
- Proficiency in scripting languages like Python, Bash, or PowerShell is a plus
- Working experience with OWASP Top 10, CVSS, MITRE ATT&CK framework, Cyber Kill Chain, and DevSecOps strongly preferred
Benefits:
- 24/7 operations
- Incident response and incident handling methodologies
How to Apply:
Interested candidates who wish to apply should submit their updated resume in MS Word format to the relevant hiring authority.
Tell employers what skills you have- Information Security
- Tactics
- SIEM
- Security Operations
- Technical Analysis
- Remediation
- 24/7 operations
- Incident Response
- Security Operations Center
- Cyber Security
- Root Cause Analysis
- Scripting
- Cyber Defense
- Emergency Response
- Threat Intelligence
- DevSecOps
- Security Incident Response
- Firewalls
Be The First To Know
About the latest Threat intelligence Jobs in Singapore !
Vice President, Threat Intelligence Centre
Posted 24 days ago
Job Viewed
Job Description
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world's leading financial groups. Across the globe, we're 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world's most trusted financial group, it's part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
**Job Responsibilities:**
The IRMD Threat Intelligence Centre is to ensure that key activities in furnishing MUFG with actionable intelligence by identifying, analysing, and tracking potential cyber threats that could impact the bank.
**Threat Intelligence Centre Functions**
+ Lead and oversee the Threat intelligence Centre.
+ Strategize and influence Cybersecurity roadmap and architecture blueprint.
+ Provide and present cybersecurity executive summary to the stake holders.
+ Review and advise the team on Threat Intelligence matters.
+ Ensure the timeliness of service offering.
+ Lead collection of information for different level of cyber threat intelligence, ranging from strategic, tactical to operational.
+ Review the analysis of information collected to produce actionable intelligence.
+ Utilise internal and OSINT tools to research threat, vulnerabilities, and intelligence on various threat actors relevant to MUFG.
+ Lead and review the process of managing and finetuning threat intelligence sources to fit the bank's operating environment.
+ Lead and review the development and maintenance threat actor and TTP knowledge base.
+ Create comprehensive reports about current threat landscape and trends of interest to MUFG.
+ Develop, maintain, and enhance threat intelligence processes, procedure, and services.
+ Support the incident response function with relevant intelligence during incident response.
+ Support and participate in threat hunting activities.
+ Strengthen security measures by proactively identifying security weaknesses and implementing adjustments.
+ Provide insights and influence the cybersecurity roadmap of MUFG.
+ Guide, advise the team on threat intelligence procedures.
+ Continuously keep up to date with emerging threat trends within the cybersecurity landscape.
+ Engage and collaborate with the Global Intelligence team to standardize and uplift Threat intelligence standards for MUFG.
**People:**
+ Act as a role model to team members and adhere to all company policies / guidelines.
+ Responsible for assisting team lead to manage (objective setting & performance management) for direct reporting.
**Job Requirements:**
+ Minimum 8 years of proven experience in cyber threat intelligence analysis, including the ability to identify, assess, and respond to various cyber threats.
+ Possessed security certifications such as SANS, GCTI, CISSP.
+ Experience in CTI framework like Mitre ATT&CK, Cyber kill chain and Diamond model.
+ Bachelor's degree in computer science, Cybersecurity, or related field.
+ Up-to-date knowledge on cyber security technologies (TIPS, SIEM, SOAR, EDR and etc)
+ Strong analytical skills and the ability to envision solutions to complex security problems.
+ Proficiency in cybersecurity technologies and threat intelligence platforms.
+ Extensive understanding of internet security issues and threat landscape.
+ Strong knowledge of threat hunting, forensics, and incident response processes is an added advantage.
+ Experience with various cybersecurity tools and network monitoring systems.
+ Strong written and verbal communication skills.
+ Ability to work in a high-pressure environment.
_We regret to inform that only shortlisted applicants will be notified._
Mitsubishi UFJ Financial Group (MUFG) is an equal opportunity employer. We view our employees as our key assets as they are fundamental to our long-term growth and success. MUFG is committed to hiring based on merit and organsational fit, regardless of race, religion or gender.
At MUFG, our colleagues are our greatest assets. Our Culture Principles provide a roadmap for how each of our colleagues must think and act to become more client-obsessed, inclusive and innovative. They reflect who we are, who we want to be and what we expect from one another. We are excited to see you take the next step in exploring a career with us and encourage you to spend more time reviewing them!
**Our Culture Principles**
+ Client Centric
+ People Focused
+ Listen Up. Speak Up.
+ Innovate & Simplify
+ Own & Execute
Information Security Analyst
Posted today
Job Viewed
Job Description
XTX Markets is a leading algorithmic trading firm which uses state-of-the-art machine learning technology to produce price forecasts for over 50,000 financial instruments across equities, fixed income, currencies, commodities and crypto. It uses those forecasts to trade on exchanges and alternative trading venues, and to offer differentiated liquidity directly to clients worldwide. The firm trades over $250bn a day across 35 countries and has over 250 employees based in London, Singapore, New York, Paris, Bristol, Mumbai, Yerevan and Kajaani.
We leverage the talent of the people who work here, modern computational techniques and state-of-the-art research infrastructure to analyse large data sets across markets quickly and efficiently, to maximize the effectiveness of our proprietary trading algorithms. We are actively seeking new methods and ideas. The models that drive our trading strategies have evolved considerably over the last 10 years, from econometric methods that gave our company its name, to trees, to neural networks, to modern deep learning architectures.
XTX Markets has an unrivalled level of computational resources in the trading industry, with a growing research cluster currently containing over 25,000 GPUs with 650 petabytes of usable storage. Teams across the firm include world-class researchers with backgrounds in pure math, programming, physics, computer science and machine learning. The firm is also constructing a large-scale data centre in Finland to future-proof its significant computational capabilities.
At XTX Markets technology is our business and we are a diverse organization which attracts outstanding talent from across all industry backgrounds. We are focused on teamwork and our people collaborate on all aspects of the business, working openly and with respect for each other, our clients and the market. Our culture is non-hierarchical and one where everyone is valued. We strive for excellence in everything we do.
The Team
The Information Security team at XTX Markets are accountable for all aspects of the firm’s physical and IT security. From obtaining and transforming events and signals into actionable intelligence to helping design and implement authentication/authorisation systems, alongside third-party risk assessment and global regulatory compliance. This role is based in our Singapore office, and you will work closely with the Risk and Information Security teams in our London HQ.
The Role
As our first Information Security Analyst, you’ll work to ensure that XTX Markets’ data and infrastructure meet – and, where appropriate, exceed – the requirements of global regulators and auditors.
You will:
- Develop and automate compliance workflows (detection, analysis, business justifications, evidence-gathering).
- Liaise with external auditors to resolve findings and document compensating controls.
- Manage third-party/vendor risk assessments and ongoing security reviews.
You’ll also have opportunities to contribute across the security function: improving our vulnerability-management program, enhancing our detection framework, and helping triage and respond to security alerts. You will actively collaborate with a range of stakeholders within the firm.
- 3+ years in Information Security, with a focus on audit/compliance.
- Programming/scripting skills (e.g. Python, PowerShell) particularly for automating repeatable tasks.
- Strong written and verbal communication skills.
- Rapid learner with outstanding attention to detail.
- Self-starter: able to work autonomously, prioritise tasks, and admit mistakes.
- Able to write clear, succinct business justifications and technical documentation.
- Hands-on proficiency with vulnerability management/compliance platforms (e.g. Tenable Nessus).
- Familiarity with Indian information-security regulations and audit practices (SEBI, NSE, etc.)
- An academic foundation in computer science or a related subject would be beneficial.
*
indicates a required field
First Name *
Last Name *
Preferred First Name
Email *
Phone
Resume/CV
Enter manually
Accepted file types: pdf, doc, docx, txt, rtf
Enter manually
Accepted file types: pdf, doc, docx, txt, rtf
Website
Please indicate what right to work you have in Singapore. * Select.
#J-18808-LjbffrInformation Security Manager
Posted today
Job Viewed
Job Description
Posted 29 July 2025 Salary S$12000 - S$13000 per annum + Variable Bonus Location Singapore Job type Permanent Discipline Technology Reference 283869_1753768672
Our client is seeking an experienced Information Security Manager to lead and strengthen their security operations. This role will focus on monitoring, detecting, and responding to cyber threats, managing security technologies, driving vulnerability management initiatives, and ensuring compliance with industry regulations. The position will work closely with IT, engineering, and risk management teams to maintain a secure and resilient environment.
Key Responsibilities:
1. Security Operations & Incident Response
- Lead and enhance the operations of the Security Operations Center (SOC), ensuring timely monitoring, detection, and incident response.
- Manage and optimize the use of SIEM, EDR, IDS/IPS, and other security technologies.
- Oversee the full incident response lifecycle, including investigation, containment, eradication, and recovery.
- Conduct post-incident reviews and implement continuous improvements.
2. Vulnerability & Threat Management
- Coordinate vulnerability scanning, penetration testing, and remediation activities.
- Stay informed of emerging threats and ensure proactive security measures are implemented.
- Partner with IT and engineering teams to address vulnerabilities and harden systems.
3. Security Compliance & Risk Management
- Ensure compliance with relevant regulatory frameworks (e.g., PCI DSS, MAS TRM, GDPR).
- Support internal and external audits, risk assessments, and regulatory reviews.
- Maintain and continuously update security policies, standards, and procedures
4. Security Awareness & Collaboration
- Lead security awareness and training initiatives across the organization.
- Collaborate with DevOps and engineering teams to embed security into CI/CD pipelines.
- Engage with external vendors, partners, and law enforcement on security-related matters.
Key Requirements:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum 5 years of experience in information security, with at least 2 years in a leadership or management role within security operations.
- Hands-on experience with security technologies such as SIEM (Splunk, Azure Sentinel), EDR, IDS/IPS, firewalls, and cloud security platforms (AWS, Azure, GCP).
- Strong understanding of threat intelligence, malware analysis, and forensic investigation tools.
- Knowledge of regulatory compliance frameworks, particularly within the financial services sector (PCI DSS, MAS TRM, GDPR).
If this job isn't quite right for you, but you know someone who would be great at this role, why not take advantage of our referral scheme? We offer SGD1,000 or SGD350 in shopping vouchers for every referred candidate who we place in a role. Terms & Conditions Apply.
#J-18808-Ljbffr