86 Threat Intelligence jobs in Singapore
Threat Intelligence Specialist, SPS Threat Intelligence

Posted 14 days ago
Job Viewed
Job Description
Amazon's Selling Partner Risk (SPR) team within the Selling Partner Services (SPS) space designs and implements policies, tools and technological innovations to protect customers by identifying and preventing abuse worldwide. Our growth requires highly skilled candidates who move fast, have an entrepreneurial spirit to create new solutions, a tenacity to get things done, thrive in an environment of ambiguity and change, and are capable of breaking down and solving complex problems. We value individual expression, respect different opinions, and work together to create a culture where each of us is able to contribute fully. Our unique backgrounds and perspectives strengthen our ability to achieve Amazon's mission of being Earth's most customer-centric company.
Our Threat Intelligence (TI) team is looking for an experienced Intelligence Specialist with demonstrated subject matter expertise in fraud threat intelligence either in the private or public sector. Ideal candidates have served in a capacity within the Intelligence Community performing a wide variety of support functions to include detecting, identifying, assessing, exploiting, countering and/or neutralizing the intelligence collection or adversarial efforts of threat actors. This position will be based in Singapore to support the SPS TI team's APAC outfit. You will be on a team responsible for identifying and analyzing fraud activity, discovering tactics, techniques, and procedures employed by the fraud actors, and providing intelligence support to investigations. You will identify areas for process improvement and work with other cross-functional teams to automate and streamline new and existing workflows. This position will provide you with a challenging opportunity. As a TI Specialist, you will work closely with partner teams and provide TI collection oversight. To be successful, the candidate must possess a customer-oriented attitude; have the highest standards of professionalism, and thrive in a work environment where everyone's views are respected and valued.
Key job responsibilities
- Analyze data sets and third-party intel to uncover fraud patterns.
- Investigate fraud forums, and fraud-as-a-service marketplaces.
- Write and execute SQL queries to identify abuse signals and telemetry trends.
- Collaborate across Risk, Cybersecurity, and Abuse teams to mitigate fraud.
- Conduct link analysis to identify threat actor networks.
- Monitor evolving fraud ecosystems and produce alerts and actor profiles.
- Contribute to automation and ML-based fraud detection logic.
About the team
The SPS Threat Intelligence team protects Amazon and its subsidiaries by proactively analyzing new security threats, identifying malicious actors, and researching the evolving threat landscape. We partner with teams throughout Amazon to facilitate information sharing and increase security resilience through cross-functional collaboration. We share actionable threat information and focus on continually developing collaboration and partnerships with security & intelligence teams throughout Amazon and the security industry. TI drives and enhances our ability to emulate threat actors, respond to incidents, and to stay one step ahead of our adversaries.
Basic Qualifications
- Fluent in Mandarin, reading, writing and speaking
- 4+ years in fraud investigation, threat intel, or trust & safety roles.
- SQL proficiency to extract and analyze structured data.
- Knowledge of online fraud schemes and behavioral abuse.
- OSINT skills and experience with tools like traditional threat intelligence vendors and tools.
- Strong communication skills to produce intelligence reports.
Preferred Qualifications
- Familiarity with fraud detection models and abuse metrics.
- An understanding of stealer logs, botnets, and fraud related ecosystems.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Threat Intelligence Specialist, SPS Threat Intelligence
Posted 24 days ago
Job Viewed
Job Description
Amazon's Selling Partner Risk (SPR) team within the Selling Partner Services (SPS) space designs and implements policies, tools and technological innovations to protect customers by identifying and preventing abuse worldwide. Our growth requires highly skilled candidates who move fast, have an entrepreneurial spirit to create new solutions, a tenacity to get things done, thrive in an environment of ambiguity and change, and are capable of breaking down and solving complex problems. We value individual expression, respect different opinions, and work together to create a culture where each of us is able to contribute fully. Our unique backgrounds and perspectives strengthen our ability to achieve Amazon's mission of being Earth's most customer-centric company.
Our Threat Intelligence (TI) team is looking for an experienced Intelligence Specialist with demonstrated subject matter expertise in fraud threat intelligence either in the private or public sector. Ideal candidates have served in a capacity within law enforcement and the intelligence community performing a wide variety of support functions to include detecting, identifying, assessing, exploiting, countering and/or neutralizing the intelligence collection or adversarial efforts of fraud actors. This position will be based in Singapore to support the SPS TI team's APAC outfit. You will be on a team responsible for identifying and analyzing fraud activity, discovering tactics, techniques, and procedures employed by the fraud actors along with new fraud trents, and providing intelligence support to investigations. You will ideally also identify areas for process improvement and work with other cross-functional teams to automate and streamline new and existing workflows. This position will provide you with a challenging opportunity. As a TI Specialist, you will work closely with partner teams and provide TI collection oversight. To be successful, the candidate must possess a customer-oriented attitude; have the highest standards of professionalism, and thrive in a work environment where everyone's views are respected and valued.
Key job responsibilities
- Investigate fraudulent/illegal activity by fraud actors across different platforms spanning the clear and deep/dark web, including fraud forums and fraud-as-a-service marketplaces, and conduct link analysis to identify fraud actor networks.
- Write and execute SQL queries and analyze large datasets as well as third-party intelligence to uncover fraud signals, patterns and trends.
- Actively strengthen intelligence gathering, and investigation SOPs.
- Contribute to automation and ML-based fraud detection logic.
- Collaborate cross-functionally with Risk, Abuse, Legal, and Cybersecurity teams to mitigate fraud.
About the team
The SPS Threat Intelligence team protects Amazon and its subsidiaries by proactively analyzing new security threats, identifying malicious actors, and researching the evolving threat landscape. We partner with teams throughout Amazon to facilitate information sharing and increase security resilience through cross-functional collaboration. We share actionable threat information and focus on continually developing collaboration and partnerships with security & intelligence teams throughout Amazon and the security industry. TI drives and enhances our ability to identify fraud actors, respond to incidents, and to stay one step ahead of our adversaries.
Basic Qualifications
- High proficiency in Mandarin Chinese (speaking, reading and writing) for China market-focused research and communication purposes.
- 4+ years' professional experience working in a threat intelligence or investigations role focused on fraud, abuse, cybercrime, or trust and safety.
- Proven experience with analyzing large datasets and performing database querying with SQL.
- Strong OSINT/DDW skills and experience with leading threat intelligence vendors and tools.
- Excellent written communication skills to produce intelligence reports.
Preferred Qualifications
- Familiarity with Chinese e-commerce market and threat landscape.
- Experience with process optimization and/or automation.
- Professional exposure to fraud detection models and abuse metrics.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Threat Intelligence Lead
Posted 1 day ago
Job Viewed
Job Description
Join to apply for the Threat Intelligence Lead role at Canonical
Join to apply for the Threat Intelligence Lead role at Canonical
Get AI-powered advice on this job and more exclusive features.
The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.
This role will report to the CISO.
You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.
As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.
What you'll do in this role
- Build and own Canonical's threat intelligence strategy
- Build and maintain OSINT research environments
- Develop OSINT tradecraft, principals, and techniques
- Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
- Collaborate across teams to inform on activity of interest
- Coordinate adversary/campaign tracking
- Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
- Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
- Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
- Identify intelligence gaps and propose new tools and research projects to fill them
- Conduct briefings for executives, internal stakeholders and external customers
- An experienced threat intelligence leader (or similar)
- Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
- Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
- Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
- Experienced using threat intelligence data to influence enterprise architecture or product development decisions
- An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
- Able to travel twice a year, for company events up to two weeks long
- A professional portfolio of OSINT related scripts, tools, or frameworks
- Demonstrated involvement in the larger OSINT community (please share relevant links)
- Degree qualified, with a bachelor's degree in computer science, information security, or a related field
- Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
- Experience in a tech company or government/military signal intelligence departments
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Get notified about new Threat Intelligence Lead jobs in Singapore, Singapore .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrAVP, Cyber Threat Intelligence Analyst, Group Information Security
Posted 1 day ago
Job Viewed
Job Description
Posting Date: 23 Apr 2025
Location:
Singapore (City Area), SG, 048624
Company: United Overseas Bank Ltd
About UOBUnited Overseas Bank Limited (UOB) is a leading bank in Asia with a global network of more than 500 branches and offices in 19 countries and territories in Asia Pacific, Europe and North America. In Asia, we operate through our head office in Singapore and banking subsidiaries in China, Indonesia, Malaysia and Thailand, as well as branches and offices. Our history spans more than 80 years. Over this time, we have been guided by our values – Honorable, Enterprising, United and Committed. This means we always strive to do what is right, build for the future, work as one team and pursue long-term success.
About the DepartmentGroup Technology and Operations (GTO) provides software and system development, information technology support services and banking operations. We have centralized and standardized the technology components into Singapore, creating a global footprint which can be utilized for supporting our regional subsidiaries and the branches around the world. We operate and support 19 countries with this architecture to provide a secure and flexible banking infrastructure. Our Operations divisions provide transactional customer services for our businesses while also focusing on cost efficiency through process improvements, automation and straight through processing.
Job ResponsibilitiesCyber Threat Intelligence Analyst is a specialist role within UOB’s Group Security Operations Center. The incumbent will be responsible for running the cyber threat intelligence operations and enhancing the existing threat research processes. He/She must have good knowledge relating to the current cyber threat landscape and have past working experience in investigating and analysing cyber security incidents and providing assessments to enhance the detection, prevention, response and monitoring capabilities for the Bank’s security operations.
Key Responsibilities
- Participate in the intelligence cycle and manage information provided by various intelligence sources
- Perform analysis on campaigns, threat actor TTPs (Tactics, Techniques and Procedures), technical indicators of compromise, cyber-attack trend, and exploitation of technology and prepare threat assessments on new developments, threats or vulnerabilities
- Work with internal and external partners to manage the ingestion, aggregation and sharing cyber threat intelligence internally and externally
- Research on advanced threat actors' TTPs and capabilities to provide adversarial intelligence to support threat hunters
- Proactively identify threat trends and provide insights to improve overall Cybersecurity risk posture
- Support any cyber incident response and investigation
- Participate in industry threat intelligence forums to maintain up-to-date security industry awareness and attack trends
Education
- Diploma/Degree in Cyber Security/Information Technology/Engineering from recognised academic institutions
- Professional Cyber Security related qualifications (E.g. GCTI, GOSI, GCIH, GCFA, GNFA, etc.) is preferred
Technical Skills and Experience
- Minimum 5-6 years of relevant experience with at least 2-3 years of Security Operations experience
- Advanced understanding of Cyber Security concepts and how Cyber Operations are conducted
- Advanced understanding on the MITRE ATT&CK Framework and related frameworks
- Advanced understanding on adversarial mindset and motivations
- Advanced understanding on the use of threat modeling tools like STRIDE, DREAD and analytical tools like Diamond Model
- Good understanding of endpoint and network architecture
- Good understanding of modern web, cloud and container technologies
- Experienced with using commercial and OSINT threat information tools
- Experienced with the use of SIEM and TIP
Soft Skills
- Excellent writing and presentation skills
- Ability to succinctly and accurately convey verbalization of thoughts and ideas
- Ability to tailor products suitable for different consumers
- Strong analytical and problem-solving skills
- Ability to adhere to work processes and procedures
Other Requirements
- Ability to work independently
- Ability to work well with the rest of the team and department
UOB is an equal opportunity employer. UOB does not discriminate on the basis of a candidate's age, race, gender, color, religion, sexual orientation, physical or mental disability, or other non-merit factors. All employment decisions at UOB are based on business needs, job requirements and qualifications. If you require any assistance or accommodations to be made for the recruitment process, please inform us when you submit your online application.
#J-18808-LjbffrAVP, Cyber Threat Intelligence Analyst, Group Information Security
Posted 1 day ago
Job Viewed
Job Description
Join to apply for the AVP, Cyber Threat Intelligence Analyst, Group Information Security role at UOB
6 days ago Be among the first 25 applicants
Join to apply for the AVP, Cyber Threat Intelligence Analyst, Group Information Security role at UOB
Get AI-powered advice on this job and more exclusive features.
About UOB
United Overseas Bank Limited (UOB) is a leading bank in Asia with a global network of more than 500 branches and offices in 19 countries and territories in Asia Pacific, Europe and North America. In Asia, we operate through our head office in Singapore and banking subsidiaries in China, Indonesia, Malaysia and Thailand, as well as branches and offices. Our history spans more than 80 years. Over this time, we have been guided by our values – Honorable, Enterprising, United and Committed. This means we always strive to do what is right, build for the future, work as one team and pursue long-term success. It is how we work, consistently, be it towards the company, our colleagues or our customers.
About UOB
United Overseas Bank Limited (UOB) is a leading bank in Asia with a global network of more than 500 branches and offices in 19 countries and territories in Asia Pacific, Europe and North America. In Asia, we operate through our head office in Singapore and banking subsidiaries in China, Indonesia, Malaysia and Thailand, as well as branches and offices. Our history spans more than 80 years. Over this time, we have been guided by our values – Honorable, Enterprising, United and Committed. This means we always strive to do what is right, build for the future, work as one team and pursue long-term success. It is how we work, consistently, be it towards the company, our colleagues or our customers.
About The Department
Group Technology and Operations (GTO) provides software and system development, information technology support services and banking operations.
We have centralized and standardized the technology components into Singapore, creating a global footprint which can be utilized for supporting our regional subsidiaries and the branches around the world. We operate and support 19 countries with this architecture to provide a secure and flexible banking infrastructure.
Our Operations divisions provide transactional customer services for our businesses while also focusing on cost efficiency through process improvements, automation and straight through processing.
Job Responsibilities
Cyber Threat Intelligence Analyst is a specialist role within UOB’s Group Security Operations Center. The incumbent will be responsible for running the cyber threat intelligence operations and enhancing the existing threat research processes. He/She must have good knowledge relating to the current cyber threat landscape and have past working experience in investigating and analysing cyber security incidents and providing assessments to enhance the detection, prevention, response and monitoring capabilities for the Bank’s security operations.
Key Responsibilities
- Participate in the intelligence cycle and manage information provided by various intelligence sources
- Perform analysis on campaigns, threat actor TTPs (Tactics, Techniques and Procedures), technical indicators of compromise, cyber-attack trend, and exploitation of technology and prepare threat assessments on new developments, threats or vulnerabilities
- Work with internal and external partners to manage the ingestion, aggregation and sharing cyber threat intelligence internally and externally
- Research on advanced threat actors' TTPs and capabilities to provide adversarial intelligence to support threat hunters
- Proactively identify threat trends and provide insights to improve overall Cybersecurity risk posture
- Support any cyber incident response and investigation
- Participate in industry threat intelligence forums to maintain up-to-date security industry awareness and attack trends
Education
- Diploma/Degree in Cyber Security/Information Technology/Engineering from recognised academic institutions
- Professional Cyber Security related qualifications (E.g. GCTI, GOSI, GCIH, GCFA, GNFA, etc.) is preferred
- Minimum 5-6 years of relevant experience with at least 2-3 years of Security Operations experience
- Advanced understanding of Cyber Security concepts and how Cyber Operations are conducted
- Advanced understanding on the MITRE ATT&CK Framework and related frameworks
- Advanced understanding on adversarial mindset and motivations
- Advanced understanding on the use of threat modeling tools like STRIDE, DREAD and analytical tools like Diamond Model
- Good understanding of endpoint and network architecture
- Good understanding of modern web, cloud and container technologies
- Experienced with using commercial and OSINT threat information tools
- Experienced with the use of SIEM and TIP
- Excellent writing and presentation skills
- Ability to succinctly and accurately convey verbalization of thoughts and ideas
- Ability to tailor products suitable for different consumers
- Strong analytical and problem-solving skills
- Ability to adhere to work processes and procedures
- Ability to work independently
- Ability to work well with the rest of the team and department
UOB is an equal opportunity employer. UOB does not discriminate on the basis of a candidate's age, race, gender, color, religion, sexual orientation, physical or mental disability, or other non-merit factors. All employment decisions at UOB are based on business needs, job requirements and qualifications. If you require any assistance or accommodations to be made for the recruitment process, please inform us when you submit your online application.
Apply now and make a difference. Seniority level
- Seniority level Not Applicable
- Employment type Full-time
- Job function Information Technology
- Industries Banking and Financial Services
Referrals increase your chances of interviewing at UOB by 2x
Sign in to set job alerts for “Threat Intelligence Analyst” roles. Manager Roles in Cyber Security Fusion Center (Express of Interest)-R-246029 Senior Officer, SOC Analyst, Group Information SecurityWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrAVP, Cyber Threat Intelligence Analyst, Group Information Security
Posted 1 day ago
Job Viewed
Job Description
Posting Date: 23 Apr 2025
Location:
Singapore (City Area), SG, 048624
Company: United Overseas Bank Ltd
About UOBUnited Overseas Bank Limited (UOB) is a leading bank in Asia with a global network of more than 500 branches and offices in 19 countries and territories in Asia Pacific, Europe and North America. In Asia, we operate through our head office in Singapore and banking subsidiaries in China, Indonesia, Malaysia and Thailand, as well as branches and offices. Our history spans more than 80 years. Over this time, we have been guided by our values – Honorable, Enterprising, United and Committed. This means we always strive to do what is right, build for the future, work as one team and pursue long-term success. It is how we work, consistently, be it towards the company, our colleagues or our customers.
About the DepartmentGroup Technology and Operations (GTO) provides software and system development, information technology support services and banking operations. We have centralized and standardized the technology components into Singapore, creating a global footprint which can be utilized for supporting our regional subsidiaries and the branches around the world. We operate and support 19 countries with this architecture to provide a secure and flexible banking infrastructure. Our Operations divisions provide transactional customer services for our businesses while also focusing on cost efficiency through process improvements, automation and straight through processing.
Job ResponsibilitiesCyber Threat Intelligence Analyst is a specialist role within UOB’s Group Security Operations Center. The incumbent will be responsible for running the cyber threat intelligence operations and enhancing the existing threat research processes. He/She must have good knowledge relating to the current cyber threat landscape and have past working experience in investigating and analysing cyber security incidents and providing assessments to enhance the detection, prevention, response and monitoring capabilities for the Bank’s security operations.
Key Responsibilities
- Participate in the intelligence cycle and manage information provided by various intelligence sources
- Perform analysis on campaigns, threat actor TTPs (Tactics, Techniques and Procedures), technical indicators of compromise, cyber-attack trend, and exploitation of technology and prepare threat assessments on new developments, threats or vulnerabilities
- Work with internal and external partners to manage the ingestion, aggregation and sharing cyber threat intelligence internally and externally
- Research on advanced threat actors' TTPs and capabilities to provide adversarial intelligence to support threat hunters
- Proactively identify threat trends and provide insights to improve overall Cybersecurity risk posture
- Support any cyber incident response and investigation
- Participate in industry threat intelligence forums to maintain up-to-date security industry awareness and attack trends
Education
- Diploma/Degree in Cyber Security/Information Technology/Engineering from recognised academic institutions
- Professional Cyber Security related qualifications (E.g. GCTI, GOSI, GCIH, GCFA, GNFA, etc.) is preferred
Technical Skills and Experience
- Minimum 5-6 years of relevant experience with at least 2-3 years of Security Operations experience
- Advanced understanding of Cyber Security concepts and how Cyber Operations are conducted
- Advanced understanding on the MITRE ATT&CK Framework and related frameworks
- Advanced understanding on adversarial mindset and motivations
- Advanced understanding on the use of threat modeling tools like STRIDE, DREAD and analytical tools like Diamond Model
- Good understanding of endpoint and network architecture
- Good understanding of modern web, cloud and container technologies
- Experienced with using commercial and OSINT threat information tools
- Experienced with the use of SIEM and TIP
Soft Skills
- Excellent writing and presentation skills
- Ability to succinctly and accurately convey verbalization of thoughts and ideas
- Ability to tailor products suitable for different consumers
- Strong analytical and problem-solving skills
- Ability to adhere to work processes and procedures
Other Requirements
- Ability to work independently
- Ability to work well with the rest of the team and department
UOB is an equal opportunity employer. UOB does not discriminate on the basis of a candidate's age, race, gender, color, religion, sexual orientation, physical or mental disability, or other non-merit factors. All employment decisions at UOB are based on business needs, job requirements and qualifications. If you require any assistance or accommodations to be made for the recruitment process, please inform us when you submit your online application.
#J-18808-LjbffrThreat Intelligence Engineer, Security Assurance
Posted 9 days ago
Job Viewed
Job Description
About the Company
Founded in 2012, ByteDance's mission is to inspire creativity and enrich life. With a suite of more than a dozen products, including TikTok as well as platforms specific to the China market, including Toutiao, Douyin, and Xigua, ByteDance has made it easier and more fun for people to connect with, consume, and create content.
Why Join Us
Creation is the core of ByteDance's purpose. Our products are built to help imaginations thrive. This is doubly true of the teams that make our innovations possible.
Together, we inspire creativity and enrich life - a mission we aim towards achieving every day.
To us, every challenge, no matter how ambiguous, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At ByteDance, we create together and grow together. That's how we drive impact - for ourselves, our company, and the users we serve.
Join us.
About the Team
The Security Assurance Team is researching offensive and defensive technology and skills to continuously improve the company's fundamental security, data security, and business security levels. We strive to minimize the impact of 0-day vulnerabilities and incidents. Our team provides a range of security services, including SDLC, vulnerability management, extreme critical risks discovery, supply chain security, network defense, red teaming, underground market crackdown, threat detection, emergency response, threat intelligence, and information security investigation.
Responsibilities
- Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
- Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
- Respond to user incident reports and evaluates the type and severity of security events.
- Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules
- Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
- Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
- In-depth understanding of various business risks such as eCommerce/Payment/Advertisment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
Minimum Qualifications
- More than 3 years of security or anti-fraud work experience with high learning ability.
- Familiar with the various attack methods of the underground industry, experience in penetration testing and data analysis is preferred.
- Good data analysis skills and observation, able to accurately describe and identify attack patterns, and understand key points from large datasets.
- Good communication and coordination skills, strong analytical skills, process management skills, experience in cross-team cooperation, strong execution.
Preferred Requirements
- Automatic data gathering and analysis tools development and scripting skills are preferred.
- Reversing engineering is preferred.
ByteDance is committed to creating an inclusive space where employees are valued for their skills, experiences, and unique perspectives. Our platform connects people from across the globe and so does our workplace. At ByteDance, our mission is to inspire creativity and enrich life. To achieve that goal, we are committed to celebrating our diverse voices and to creating an environment that reflects the many communities we reach. We are passionate about this and hope you are too.
Be The First To Know
About the latest Threat intelligence Jobs in Singapore !
Professional Officer (all levels) (Cybersecurity - AI & Threat Intelligence)
Posted 1 day ago
Job Viewed
Job Description
Job no: 498857
Department: Professional Officers
Contract type: Contract
Apply now
The Professional Officers Division (POD) houses a centralized pool of academic staff under the Professional Officers scheme. Professional Officers come with specialised and deep technical skills acquired through extensive industry experience. They form the talent pool which brings a much-needed industry perspective to student learning. They facilitate applied learning and applied research in SIT, complementing the academic expertise of the faculty to bring industry practices and applications into the curriculum.
Professional Officers leverage on their industry experiences to create authentic learning environments, where discovery and innovation take place. They act as coaches and mentors to students during practical learning activities such as laboratory sessions, Capstone Projects and the Integrated Work Study Programme (IWSP). Professional Officers could also lead or work with faculty on industry innovation projects to provide solutions to the industry.
In addition to their role in applied learning and applied research, Professional Officers manage the centralised laboratory facilities and resources in SIT. With Technical Officers, laboratory safety professionals, and administrators in POD, they jointly develop central policies and processes for the safe and seamless operation of laboratories in SIT
Key Responsibilities
- Design and teach labs & practice modules.
- Mentor students in Capstone Projects and the Integrated Work Study Programme (IWSP).
- Lead or co-lead innovation projects with industry.
- Manage labs and equipment to support academic programmes and applied research.
- Ensure safety in labs.
Job Requirements
Education & Certifications:
- A degree in Cybersecurity, Data Science, AI, Engineering, or related fields from a recognized University.
- A Master’s degree or a major in Information Security is preferred.
- Industry certifications like OSCP, CISSP, or CEH are a plus.
Experience:
- At least 5+ years of experience in data science, preferably with exposure to cybersecurity applications.
- Proven experience as a Certified Security Analyst or in a related role, with a strong understanding of industry best practices, cybersecurity frameworks, IoT Security, OT Security, and Mobile Security.
- Strong understanding of cryptography, including symmetric and asymmetric cryptographic primitives, protocols, and PQC.
- Experience with adversarial machine learning techniques and defenses.
- Familiarity with machine learning frameworks (e.g., TensorFlow, PyTorch).
- Experience with Cloud services (AWS, Azure, Google) or big data technologies.
- Clear understanding of information security principles and the cyber technology landscape.
- Ability to develop and enforce security policies, conduct security awareness training, and stay updated on emerging cyber threats and hacker methodologies.
- Experience in developing and enhancing frameworks or standard operating procedures (SOPs) for handling cybersecurity incidents in different industries.
- Ability to review and improve security controls, such as SCA, SAST, DAST, IAST, RASP, Secrets Scanning, Container Scanning, Misconfiguration Identification, Secure Code Review, CI/CD Pipeline Security, and Deployment Environment Security.
Soft Skills & Mindset:
- Passionate about cybersecurity, technically hands-on, willing to learn, and curious about the inner workings of Enterprise/OT/Telecommunications technologies and exploiting their vulnerabilities.
- Strong interest in supporting research and academic projects, with the ability to adopt and manage new security technologies.
- Willingness to pursue professional certifications in cybersecurity governance, such as CISSP, OSCP, CSSP (Industry certifications are an added advantage).
- Actively participate in cybersecurity-related projects or organizations, such as CSIRT (Computer Security Incident Response Team), ISACA, or ISC2.
Apply now
Advertised: 10 Mar 2025 Singapore Standard Time
Applications close: 09 Sep 2025 Singapore Standard Time
Information Security Analyst
Posted 1 day ago
Job Viewed
Job Description
1 year ago Be among the first 25 applicants
Get AI-powered advice on this job and more exclusive features.
Job Description
Develop and continually refine the security framework, information security policies, processes, procedures, and guidelines.
Ensure compliance with these policies and procedures through regular security reviews and audits, including log analysis and security assessments of customer ICT systems.
Conduct security risk management exercises and table-top exercises.
Perform vulnerability assessments and coordinate penetration testing activities.
Deliver information security awareness training.
Develop and manage the customer’s security incident response plan.
Lead and support the customer in resolving and responding to security incidents.
Serve as the primary point of contact and advisor for the customer on ICT security-related matters.
Manage project activities and deliverables during the implementation phase.
Job Requirements
Minimum of 5 years of experience in IT security.
Experience with networks, servers (Windows and UNIX), and databases.
Proven track record in IT security auditing and security assessments.
Proficient in analyzing logs from various sources and understanding protocols and traffic flows.
Knowledge of Active Directory, endpoint protection solutions, Early Detection and Response solutions, Database Activity Monitoring tools, and SIEM.
Adaptable, team-oriented, and proactive personality.
Ability to independently organize and plan work.
Capable of working effectively in a rapidly changing environment.
Strong multi-tasking skills and the ability to switch contexts effectively between different activities and teams.
CISSP, CISM, Security+, or other relevant IT security certifications (e.g., Imperva, Carbon Black) are advantageous.
EA Licence No.:18S9405 / EA Reg. No.:R1330864
Skills & Competencies
IT security,CISSP,CISM,Security+
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Percept Solutions by 2x
Get notified about new Information Security Analyst jobs in Singapore .
Information Technology - Cyber Security Analyst (Scoot) Security Specialist, Detection & Response, Global Security Organisation - TikTok, Singapore Information Security Analyst / IT Support Engineer Technology & Cyber Security Risk Analyst Information Technology - Cyber Security Specialist (Architecture and Engineering)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Analyst
Posted 1 day ago
Job Viewed
Job Description
XTX Markets is a leading algorithmic trading firm which uses state-of-the-art machine learning technology to produce price forecasts for over 50,000 financial instruments across equities, fixed income, currencies, commodities and crypto. It uses those forecasts to trade on exchanges and alternative trading venues, and to offer differentiated liquidity directly to clients worldwide. The firm trades over $250bn a day across 35 countries and has over 250 employees based in London, Singapore, New York, Paris, Bristol, Mumbai, Yerevan and Kajaani.
We leverage the talent of the people who work here, modern computational techniques and state-of-the-art research infrastructure to analyse large data sets across markets quickly and efficiently, to maximize the effectiveness of our proprietary trading algorithms. We are actively seeking new methods and ideas. The models that drive our trading strategies have evolved considerably over the last 10 years, from econometric methods that gave our company its name, to trees, to neural networks, to modern deep learning architectures.
XTX Markets has an unrivalled level of computational resources in the trading industry, with a growing research cluster currently containing over 25,000 GPUs with 650 petabytes of usable storage. Teams across the firm include world-class researchers with backgrounds in pure math, programming, physics, computer science and machine learning. The firm is also constructing a large-scale data centre in Finland to future-proof its significant computational capabilities.
At XTX Markets technology is our business and we are a diverse organization which attracts outstanding talent from across all industry backgrounds. We are focused on teamwork and our people collaborate on all aspects of the business, working openly and with respect for each other, our clients and the market. Our culture is non-hierarchical and one where everyone is valued. We strive for excellence in everything we do.
The Team
The Information Security team at XTX Markets are accountable for all aspects of the firm’s physical and IT security. From obtaining and transforming events and signals into actionable intelligence to helping design and implement authentication/authorisation systems, alongside third-party risk assessment and global regulatory compliance. This role is based in our Singapore office, and you will work closely with the Risk and Information Security teams in our London HQ.
The Role
As our first Information Security Analyst, you’ll work to ensure that XTX Markets’ data and infrastructure meet – and, where appropriate, exceed – the requirements of global regulators and auditors.
You will:
- Develop and automate compliance workflows (detection, analysis, business justifications, evidence-gathering).
- Liaise with external auditors to resolve findings and document compensating controls.
- Manage third-party/vendor risk assessments and ongoing security reviews.
You’ll also have opportunities to contribute across the security function: improving our vulnerability-management program, enhancing our detection framework, and helping triage and respond to security alerts. You will actively collaborate with a range of stakeholders within the firm.
- 3+ years in Information Security, with a focus on audit/compliance.
- Programming/scripting skills (e.g. Python, PowerShell) particularly for automating repeatable tasks.
- Strong written and verbal communication skills.
- Rapid learner with outstanding attention to detail.
- Self-starter: able to work autonomously, prioritise tasks, and admit mistakes.
- Able to write clear, succinct business justifications and technical documentation.
- Hands-on proficiency with vulnerability management/compliance platforms (e.g. Tenable Nessus).
- Familiarity with Indian information-security regulations and audit practices (SEBI, NSE, etc.)
- An academic foundation in computer science or a related subject would be beneficial.
- Seniority level Associate
- Employment type Full-time
- Job function Information Technology
- Industries Financial Services and Capital Markets
Referrals increase your chances of interviewing at XTX Markets by 2x
Get notified about new Information Security Analyst jobs in Singapore, Singapore .
Technology & Cyber Security Risk Analyst IT Compliance & Cybersecurity Analyst - Financial Service IT Compliance & Cybersecurity Analyst, Financial Service (Campus Recruitment 2025) (Senior) Cyber Security Consultant & Penetration Tester Offensive Security Engineer (Red Team) - Information Security Information Security Analyst / IT Support Engineer Information Technology - Cyber Security Lead Engineer Cyber Security Analyst - Intern #GeneralInternship Information Technology Security Engineer Security Incident Management Analyst - AVP - SINGAPOREWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr