14 Threat Intelligence jobs in Singapore
Manager, Threat Intelligence

Posted 2 days ago
Job Viewed
Job Description
Singapore, Singapore
**Hours:**
40
**Line of Business:**
Technology Solutions
**Pay Details:**
We're committed to providing fair and equitable compensation to all our colleagues. As a candidate, we encourage you to have an open dialogue with a member of our HR Team and ask compensation related questions, including pay details for this role.
**Job Description:**
**Summary**
This is a lead role for the Protect Threat Intelligence (PTI) team within the Fusion Centre in our Singapore office. The successful candidate will support PTI's mission to provide timely, actionable, and relevant intelligence to its stakeholders within TD's follow-the-sun operating model. The candidate will be required to maintain a holistic view of the threat landscape for both current and emerging threats. The candidate should have broad intelligence collection and production expertise across a variety of intelligence functions, to include cyber, fraud, geopolitical and insider threat domains. This role requires an experienced manager familiar with leading and managing international teams to lead and coordinate intelligence operations within the Singapore Threat Intelligence Group supporting the Regional Operations. PTI operates an on-call rotation across the team (inclusive of this position).
**Job Description**
+ Enable cyber threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats.
+ Lead regional geopolitical threat analysis to assess emerging physical, cyber and other threats.
+ Use OSINT research and tooling to investigate top priority threats, applying deep knowledge of the MITRE ATT&CK framework and threat actor tradecraft.
+ Partner with Threat Management teams to understand events and support technical threat analysis of malicious cyber security incidents.
+ Identify and assess threats to supply chain by partnering effectively with Vendor Management in managing risk to TD, support response activities for supply chain incidents and pro-actively identifying emerging threats to supply chain.
+ Effectively author and review intelligence products and communications for stakeholders, operational personnel, and leadership.
+ Support cyber fraud intelligence capabilities by identifying and mitigating methods for account compromise and fraud.
+ Provide expertise and consultation to partners and/or stakeholders on a broad range of threats and emerging threats relevant to TD, its supply chain and the financial sector.
+ Proactively review internal processes and activities and identify opportunities for improvement.
+ Influence behavior to reduce risk and foster a strong technology risk management culture throughout the enterprise.
+ Drive APAC intelligence community engagement through active participation in the FS-ISAC ATIC and enhance TD's regional presence by building and expanding a robust intelligence network across the region.
+ Develop and deliver threat briefings.
**BREADTH & DEPTH**
+ 7 years experience or more in intelligence collection and production
+ 2 years experience or move of leading and managing teams
+ 2 years experience or more supporting international (follow-the-sun) operations
+ Experience and familiarity using common intelligence processes and tools, including a threat intelligence platform.
+ Proven superior oral and written communication skills and ability to translate complicated threat actor behavior to an executive audience.
+ Demonstrated tradecraft in open-source collection.
+ Excellent time management skills, including the ability to perform to a production calendar.
+ Demonstrated ability to lead shift handovers and transitions.
+ Demonstrated ability to stay abreast of emerging threat actor TTP's.
+ Advanced ability to apply real world geopolitical indicators to predict threat actor behavior.
+ Demonstrated knowledge of the current threat landscape, banking and technology standards and regulatory requirements.
**Who We Are**
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
**Our Total Rewards Package**
Our Total Rewards package reflects the investment we make in our colleagues to help them, and their families achieve their well-being goals. Total Rewards at TD includes a base salary and several other key plans such as health and well-being benefits, including medical coverage, paid time off, career development, and reward and recognition programs.
**Additional Information:**
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
**Colleague Development**
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
**Training & Onboarding**
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
**Interview Process**
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
**Accommodation**
If you require an accommodation for the recruitment / interview process (including alternate formats of materials, or accessible meeting rooms or other accommodation), please let us know and we will work with you to meet your needs.
Federal law prohibits job discrimination based on race, color, sex, sexual orientation, gender identity, national origin, religion, age, equal pay, disability and genetic information.
Cyber Threat Intelligence Global Lead
Posted today
Job Viewed
Job Description
Our client, a leading global bank, is seeking an experienced and visionary Cyber Threat Intelligence Global Lead to design, lead, and execute the bank's global threat intelligence strategy. This is a high-impact role with a strong focus on strategic threat intelligence , ensuring the bank remains ahead of evolving threat actors and cyber risks. The position offers visibility at the C-suite level and requires close collaboration across regional and global teams.
Key Responsibilities
- Lead the bank's global Cyber Threat Intelligence (CTI) function, defining strategy and framework across all regions.
- Drive the development of a strategic threat intelligence programme that provides forward-looking insights into adversary intent, capabilities, and global cyber risk trends.
- Translate intelligence into actionable risk insights and deliver high-quality briefings to senior stakeholders, including the CISO, Board, and regulators.
- Guide the integration of intelligence into security decision-making, risk management, and cyber defence strategies.
- Build, lead, and mentor a global CTI team, fostering analytical rigour and strategic insights.
- Partner with SOC, Incident Response, and Red Team functions to support intelligence-driven response and attack simulations.
- Establish strong external partnerships with industry groups, law enforcement, and global threat intelligence communities.
- Ensure compliance with evolving regulatory requirements for cyber security and intelligence functions.
Requirements
- 10+ years of experience in cyber security with significant expertise in strategic threat intelligence.
- Strong understanding of advanced persistent threats, adversary tactics, techniques, and procedures (TTPs), and the MITRE ATT&CK framework.
- Proven experience engaging with regulators and presenting intelligence at Board/Executive level.
- Deep knowledge of intelligence analysis frameworks and methodologies, with a focus on strategic reporting and threat landscape assessments.
- Exceptional leadership skills with a track record of building and guiding globally distributed teams.
- In-depth knowledge of the financial services threat landscape.
- Excellent communication skills, able to translate complex intelligence into business-relevant decision points.
Why Join
This is a rare global leadership opportunity to shape the strategic cyber intelligence capabilities of a leading international bank. You will drive the direction of the bank's intelligence programme, deliver critical insights to senior leadership, and directly influence how the organisation prepares for the evolving global cyber threat landscape.
EA Licence: 16S8091
EA Reg No.: R
Manager, Senior Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Work Location :
Singapore, Singapore
Hours:
40
Line of Business:
Technology Solutions
Pay Details:
We're committed to providing fair and equitable compensation to all our colleagues. As a candidate, we encourage you to have an open dialogue with a member of our HR Team and ask compensation related questions, including pay details for this role.
Job Description:
Summary
This role is for a Manager, Senior Threat Intelligence Analyst for the Protect Threat Intelligence (PTI) team. The successful candidate will support PTI's mission to provide timely, actionable, and relevant intelligence to its stakeholders within TD's follow-the-sun operating model. The candidate will be required to maintain a holistic view of the threat landscape for both current and emerging threats. The candidate should have broad intelligence collection and production expertise across a variety of intelligence functions, to include cyber, fraud, geopolitical and insider threat domains. This role requires an experienced manager familiar with leading and managing international teams to lead and coordinate intelligence operations within the Singapore Threat Intelligence Group supporting the Regional Operations. PTI operates an on-call rotation across the team (inclusive of this position).
Job Description
- Enable cyber threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats.
- Lead regional geopolitical threat analysis to assess emerging physical, cyber and other threats.
- Use OSINT research and tooling to investigate top priority threats, applying deep knowledge of the MITRE ATT&CK framework and threat actor tradecraft.
- Partner with Threat Management teams to understand events and support technical threat analysis of malicious cyber security incidents.
- Identify and assess threats to supply chain by partnering effectively with Vendor Management in managing risk to TD, support response activities for supply chain incidents and pro-actively identifying emerging threats to supply chain.
- Effectively author and review intelligence products and communications for stakeholders, operational personnel, and leadership.
- Support cyber fraud intelligence capabilities by identifying and mitigating methods for account compromise and fraud.
- Provide expertise and consultation to partners and/or stakeholders on a broad range of threats and emerging threats relevant to TD, its supply chain and the financial sector.
- Proactively review internal processes and activities and identify opportunities for improvement.
- Influence behavior to reduce risk and foster a strong technology risk management culture throughout the enterprise.
- Drive APAC intelligence community engagement through active participation in the FS-ISAC ATIC and enhance TD's regional presence by building and expanding a robust intelligence network across the region.
- Develop and deliver threat briefings.
BREADTH & DEPTH
- 7 years experience or more in intelligence collection and production
- 2 years experience or move of leading and managing teams
- 2 years experience or more supporting international (follow-the-sun) operations
- Experience and familiarity using common intelligence processes and tools, including a threat intelligence platform.
- Proven superior oral and written communication skills and ability to translate complicated threat actor behavior to an executive audience.
- Demonstrated tradecraft in open-source collection.
- Excellent time management skills, including the ability to perform to a production calendar.
- Demonstrated ability to lead shift handovers and transitions.
- Demonstrated ability to stay abreast of emerging threat actor TTP's.
- Advanced ability to apply real world geopolitical indicators to predict threat actor behavior.
- Demonstrated knowledge of the current threat landscape, banking and technology standards and regulatory requirements.
Who We Are
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing – and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investment we make in our colleagues to help them, and their families achieve their well-being goals. Total Rewards at TD includes a base salary and several other key plans such as health and well-being benefits, including medical coverage, paid time off, career development, and reward and recognition programs.
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD – and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
If you require an accommodation for the recruitment / interview process (including alternate formats of materials, or accessible meeting rooms or other accommodation), please let us know and we will work with you to meet your needs.
SECONDMENT - Assistant Director, Cybercrime Threat Intelligence
Posted today
Job Viewed
Job Description
Publication Starting Date: Aug 13, 2025
Location: Singapore, Singapore
Company: Interpol
VACANCY NOTICE 1377
This vacancy announcement pertains to law enforcement and/or governmental officials within INTERPOL's member countries only.
Please read the Conditions of Secondment in force at INTERPOL (shared via the NCB) including the maximum duration of secondment.
Please be aware that your home Administration/Agency/Service/Government will be responsible for all of your salary/remuneration, social insurance, pension contributions, welfare benefits, family allowances, benefits during your assignment at INTERPOL as well as travel, removal expenses related to your arrival at and departure from INTERPOL, and any other related costs depending on your circumstances. It is requested that you obtain in writing, confirmation from your home Administration/Agency/Service/Government that it agrees with these CONDITIONS OF SECONDMENT. This confirmation letter should be forwarded to us THROUGH THE NCB.
INTERPOL is the world's largest international police organization, with 196 member states. Created in 1923, it facilitates cross-border police co-operation, and supports and assists all organizations, authorities, and services whose mission is to prevent or combat international crime. INTERPOL is now looking for a qualified candidate as a SECONDMENT - Assistant Director, Cybercrime Threat Intelligence within the Cybercrime which is part of the Exec. Dir. Police Services.
Job title: SECONDMENT - Assistant Director, Cybercrime Threat Intelligence
Reporting to: Director, Cybercrime
Location: Singapore
Duration (in months): 36.00
Grade: 2
Number of post: 1
Security Clearance Level: Enhanced
Deadline for application: 15 December 2025
INTERPOL strives to achieve a diverse and inclusive workforce and welcomes applications from individuals with diverse backgrounds, experiences, and perspectives. To achieve our Diversity goals, we encourage applications from women and nationals of under/unrepresented member countries who are passionate about our mission. INTERPOL's recruitment process is merit-based hence all hiring decisions are made considering the applicant's qualifications and the needs of the Organization.
SUMMARY OF THE ASSIGNED DUTIES, INCLUDING GOALS AND OBJECTIVES OF THE POST
The Cybercrime Directorate (CD) mandate is to help member countries combat global cybercrime more effectively. In this context, under the supervision of the Cybercrime Director, the post holder will manage the CD Cybercrime Threat Intelligence Sub- Directorate covering a specialized range of activities. Through direct supervision of specialized staff, the postholder will ensure that the policies of the Organization and the strategic and operational objectives are known, explained to staff members in the Sub-Directorate, understood, and fully implemented by the Sub-Directorate. The incumbent will also ensure that the Sub-Directorate functions efficiently and generates an effective performance monitored and measured outputs against the Organisational and CD objectives and priorities.
The objectives of INTERPOL's Cybercrime Threat Intelligence is in collaboration with member countries, private public partners and other relevant partners:
- Identify cyber threats, evaluate the risks, assess the impact and harm that they cause and probability of harm being caused.
- Coordinate with member countries and other key stakeholders a preventative, diversionary or disruption strategy that mitigates cyber threats.
Through the collection, collation and sharing of relevant information, timely analysis will be undertaken to produce actionable intelligence products to achieve this objective. This includes the identification of malicious cybercrime groups/actors, cyber-enabled criminality, criminal methodology and the identification of corrupted /compromised infrastructure and networks, that will aid in establishing trends and risks throughout the cyber ecosystem.
Our target outcome is to help the global law enforcement community arrest cybercriminals, disrupt malicious infrastructure and seize stolen funds to return to victims.
PRINCIPAL DUTIES AND ACTIVITIES
DUTY 1/Mission 1
Strengthen Public-Private Partnership to enhance cyber intelligence capability. Expand and enhance INTERPOL partnerships in an effort to continuously undertake and improve the collection, processing, analysis, evaluation and dissemination of cybercrime data/information in order to support member countries response to cybercrime threats.
DUTY 2/Mission 2
Lead a team of intelligence officers who respond to member country requests for assistance in combatting cybercrime and develop timely and accurate intelligence reports that aide in their investigations.
DUTY 3/Mission 3
As part of the senior management team, define, plan, and implement strategy in order to support activities, projects and policies of the managed Sub-Directorate. Maintain KPI's set against the CD objectives and priorities
DUTY 4/Mission 4
Assist the Director in the continuous development of the Directorate and the INTERPOL Organization.
DUTY 5/Mission 5
Develop and maintain effective contacts with other Sub-Directorates and Directorates of the General Secretariat, including leading or participating (as an expert in a field) in expert Working Groups, Regional Bureaus (RB), National Central Bureaus (NCB) and other national and international institutions outside the Organization, as directed, and represent the Directorate and General Secretariat in meetings and other fora when required.
DUTY 6/Mission 6
Act on behalf of the Director, in his absence, and when required, at organizational as well as international conferences and meetings.
DUTY 7/Mission 7
Seek self-developed and independent solutions, resulting from in-depth analysis on Sub-Directorate issues, and provide them as recommendations for projects, activities and missions for the Sub-Directorate to be undertaken, and prepare accurate and timely reports on action taken.
DUTY 8/Mission 8
Perform any other duties as required by the hierarchy.
QUALIFICATIONS, COMPETENCIES AND SKILLS
EDUCATION AND QUALIFICATION REQUIRED:
- At least five years' University education or equivalent is required.
- Law enforcement and management training at senior level.
EXPERIENCE REQUIRED:
- Minimum of 10 years' experience in law enforcement including regional and national expertise/operational police investigation/s, coordination support.
- Proven experience in cybercrime and/or cybercrime intelligence/or equivalent experience in a police intelligence.
- Experience as a Senior Manager of a national law enforcement agency or an equivalent position in an international law enforcement organization.
- Experience in strategic planning and managing complex tasks, with only minimum supervision.
- Experience in development of strategic partnerships, outreach and programme development.
LANGUAGES:
- Professional fluency in English is required. Proficiency in a second official working language (Arabic, French or Spanish) would be an additional asset.
ABILITIES REQUIRED:
- Strong leadership qualities and solid presentation and communication skills are required.
- Being proactive in developing strategies to accomplish objectives;
- Clearly communicating links between the Organization's strategy and the work unit's goals;
- Delegating responsibilities, clarifying expectations, and giving staff autonomy in important areas of their work;
- Building trust;
- Regularly discussing performance and providing feedback and coaching to staff;
- Gathering relevant information before making a decision.
Manager, Cyber Threat Intelligence & Fusion Centre
Posted today
Job Viewed
Job Description
Summary of the role
The Cyber Threat Intelligence & Fusion Centre Manager is responsible to oversee Marina Bay Sand’s (MBS) Cyber Threat Intelligence and Cyber Fusion Centre program. This vertical is part of Marina Bay Sands’ Cyber Security Operations Centre (CSOC). The mission of MBS CSOC is to protect and defend MBS against cyber-attacks targeting the gaming, retail and hospitality sector.
The candidate builds, leads and supervises daily cyber threat horizon scanning operation for MBS. For every applicable cyber threat, the candidate is expected to lead the operation to assess and coordinate dissemination, track follow up and defensive / mitigative measures, and to provide reporting as per MITRE Cyber Threat Informed Defence framework.
When required, the candidate is also required to provide focused effort and analysis of potential cyber incidents. This position has a local supervisory role and works closely with the global CSOC team in other centers around the world.
All duties are to be performed in accordance with the department and Marina Bay Sands’ policies, practices and procedures.
Job Responsibilities
- Consistent and regular attendance is an essential function of this job.
- Ensure relevant external cyber threat information is detected, responded and / or escalated in a timely fashion.
- Ensure external cyber threat information tools / subscriptions are maintained, reviewed and effective in detecting external cyber threat information.
- Ensure process runbooks are reviewed and updated timely.
- Ensure metrics and trending are collected, reviewed and analyzed timely.
- Coordinate with other stakeholders to track and resolve findings, where required.
- Performs other related duties as assigned
Job Requirements
Education & Certification
- Degree or Diploma in Cybersecurity
- Professional cyber related membership and certification is required
Experience
- 5-10 years of work experience in technical cyber threat intelligence operations, incident response investigation and / or malware analysis.
Other Prerequisites
- Proven effective verbal and written communication skills
Abilities
- Facilitate continuously updated intelligence, surveillance, and visualization input to common operational picture managers
- Identify intelligence gaps and shortfalls
- Monitor open source websites for hostile content directed towards organizational or partner interests
- Identify cyber threat tactics and methodologies
- Identify and characterize intrusion activities against a victim or target
- Determine effectiveness of intelligence collection operations
- Recommend adjustments to intelligence collection strategies
- Develop cyber operations indicators
- Coordinate all-source collection activities
- Validate all-source collection requirements and plans
- Prepare threat and target briefings
- Identify intelligence requirements
- Modify collection requirements
- Determine effectiveness of collection requirements
- Monitor changes to designated cyber operations warning problem sets
- Report on adversarial activities that fulfill priority information requirements
- Prepare cyber operations intelligence reports
- Prepare indications and warnings intelligence reports
- Assess effectiveness of intelligence production
- Assess effectiveness of intelligence reporting
- Provide intelligence analysis and support
- Notify appropriate personnel of imminent hostile intentions or activities
- Determine if intelligence requirements and collection plans are accurate and up-to-date
Knowledge
- Intelligence collection capabilities and applications
- Intelligence requirements tasking systems and software
- Intelligence information repositories
- Threat intelligence principles and practices
- Operations security (OPSEC) principles and practices
- Target development principles and practices
- Target research tools and techniques
- Priority intelligence requirements
- Intelligence fusion
- Adversarial tactics principles and practices
- Adversarial tactics tools and techniques
- Threat vector characteristics
- Cyber attack stages
- Cyber intrusion activity phases
- Malware analysis tools and techniques
- Malware analysis principles and practices
- Cyber-attack tools and techniques
- Denial and deception tools and techniques
Skillset
- Conducting non-attributable research
- Creating target intelligence products
- Conducting deep web research
- Performing target analysis
- Identifying intelligence gaps
- Conducting open-source searches
- Converting intelligence requirements into intelligence production tasks
- Developing collection strategies
Work Environment
- Thrive in a fast-paced, dynamic and global working environment.
- Adapt and adjust to priorities quickly as circumstances dictate while completing tasks within established time frames
- Establish and maintain cooperative working relationships with fellow Team Members, management, outside contacts, guests and the public.
- Meet the basic physical requirements of an office environment including moving freely and frequently about an office, accessing computers and related technologies using peripheral equipment and operating other office equipment.
- Maintain composure under pressure and consistently meet deadlines with internal and external stakeholders.
Vice President, Threat Intelligence Centre (ID:685104)
Posted today
Job Viewed
Job Description
Reponsibilities:
- Lead and oversee the Threat intelligence Centre.
- Strategize and influence Cybersecurity roadmap and architecture blueprint.
- Provide and present cybersecurity executive summary to the stake holders.
- Review and advise the team on Threat Intelligence matters.
- Ensure the timeliness of service offering.
- Lead collection of information for different level of cyber threat intelligence, ranging from strategic, tactical to operational.
- Review the analysis of information collected to produce actionable intelligence.
- Utilise internal and OSINT tools to research threat, vulnerabilities, and intelligence on various threat actors relevant to the bank.
- Lead and review the process of managing and finetuning threat intelligence sources to fit the bank's operating environment.
- Lead and review the development and maintenance threat actor and TTP knowledge base.
- Create comprehensive reports about current threat landscape and trends of interest to the bank.
- Develop, maintain, and enhance threat intelligence processes, procedure, and services.
- Support the incident response function with relevant intelligence during incident response.
- Support and participate in threat hunting activities.
- Strengthen security measures by proactively identifying security weaknesses and implementing adjustments.
- Provide insights and influence the cybersecurity roadmap
- Guide, advise the team on threat intelligence procedures.
- Continuously keep up to date with emerging threat trends within the cybersecurity landscape.
- Engage and collaborate with the Global Intelligence team to standardize and uplift Threat intelligence standards for the bank.
People:
- Act as a role model to team members and adhere to all company policies / guidelines.
- Responsible for assisting team lead to manage (objective setting & performance management) for direct reporting.
Job Requirements:
- Minimum 8 years of proven experience in cyber threat intelligence analysis, including the ability to identify, assess, and respond to various cyber threats.
- Possessed security certifications such as SANS, GCTI, CISSP.
- Experience in CTI framework like Mitre ATT&CK, Cyber kill chain and Diamond model.
- Bachelor's degree in computer science, Cybersecurity, or related field.
- Up-to-date knowledge on cyber security technologies (TIPS, SIEM, SOAR, EDR and etc)
- Strong analytical skills and the ability to envision solutions to complex security problems.
Strong knowledge of threat hunting, forensics, and incident response processes is an added advantage.
EA License No.: 01C4394 (PERSOLKELLY Singapore PTE LTD)
By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at . You acknowledge that you have read, understood, and agree with the Privacy Policy
Vice President, Threat Intelligence Centre (ID:685104)
Posted 2 days ago
Job Viewed
Job Description
Reponsibilities:
- Lead and oversee the Threat intelligence Centre.
- Strategize and influence Cybersecurity roadmap and architecture blueprint.
- Provide and present cybersecurity executive summary to the stake holders.
- Review and advise the team on Threat Intelligence matters.
- Ensure the timeliness of service offering.
- Lead collection of information for different level of cyber threat intelligence, ranging from strategic, tactical to operational.
- Review the analysis of information collected to produce actionable intelligence.
- Utilise internal and OSINT tools to research threat, vulnerabilities, and intelligence on various threat actors relevant to the bank.
- Lead and review the process of managing and finetuning threat intelligence sources to fit the bank’s operating environment.
- Lead and review the development and maintenance threat actor and TTP knowledge base.
- Create comprehensive reports about current threat landscape and trends of interest to the bank.
- Develop, maintain, and enhance threat intelligence processes, procedure, and services.
- Support the incident response function with relevant intelligence during incident response.
- Support and participate in threat hunting activities.
- Strengthen security measures by proactively identifying security weaknesses and implementing adjustments.
- Provide insights and influence the cybersecurity roadmap
- Guide, advise the team on threat intelligence procedures.
- Continuously keep up to date with emerging threat trends within the cybersecurity landscape.
- Engage and collaborate with the Global Intelligence team to standardize and uplift Threat intelligence standards for the bank.
People:
- Act as a role model to team members and adhere to all company policies / guidelines.
- Responsible for assisting team lead to manage (objective setting & performance management) for direct reporting.
Job Requirements:
- Minimum 8 years of proven experience in cyber threat intelligence analysis, including the ability to identify, assess, and respond to various cyber threats.
- Possessed security certifications such as SANS, GCTI, CISSP.
- Experience in CTI framework like Mitre ATT&CK, Cyber kill chain and Diamond model.
- Bachelor’s degree in computer science, Cybersecurity, or related field.
- Up-to-date knowledge on cyber security technologies (TIPS, SIEM, SOAR, EDR and etc)
- Strong analytical skills and the ability to envision solutions to complex security problems.
- Strong knowledge of threat hunting, forensics, and incident response processes is an added advantage.
Interested candidates who wish to apply for the advertised position, please click on “Apply ”. We regret that only shortlisted candidates will be notified.
EA License No.: 01C4394 (PERSOLKELLY Singapore PTE LTD)
By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at . You acknowledge that you have read, understood, and agree with the Privacy Policy
Be The First To Know
About the latest Threat intelligence Jobs in Singapore !
Principal Consultant, Incident Response

Posted 2 days ago
Job Viewed
Job Description
At Palo Alto Networks® everything starts and ends with our mission:
Being the cybersecurity partner of choice, protecting our digital way of life.
Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
**Who We Are**
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
At Palo Alto Networks, we believe in the power of collaboration and value in-person interactions. This is why our employees generally work full time from our office with flexibility offered where needed. This setup fosters casual conversations, problem-solving, and trusted relationships. Our goal is to create an environment where we all win with precision.
**Your Career**
As a Principal Consultant in Unit 42 the individual will be responsible for managing incident response engagements with our largest clients and in our most complex engagements. They will become the go-to expert for clients during high-priority incident response, remediation, and recovery phases, providing both strategic guidance and technical oversight, while also focusing on product integration. The role requires in-depth cybersecurity expertise to enable serving as an incident commander throughout the incident response lifecycle.
While actively involved in incident response service delivery, this person also works with peers and the executive team to enhance Unit 42's incident response practice, including developing and improving the technical and operating methodologies employed during incident response engagements.
We are seeking an individual who is dedicated to delivering highly technical consulting services to an exceptional standard, thrives in a fast paced team environment, and advocates for innovative approaches to deliver the best outcomes for our cross-sector clients.
**Your Impact**
+ Lead the team delivering high-profile, high-stakes enterprise level incident response engagements
+ Provide hands-on, expert-level incident response services to clients and deliver findings to CxO and/or Board of Directors
+ Partner with the Unit 42 Directors, executive team and service line leaders to develop and execute strategy for the Unit 42 Digital Forensics & Incident Response (DFIR) practice, as well as continuously advance the maturity of our services
+ Drive innovation in Unit 42's reactive offerings, by leading the consulting team and collaborating with cross-functional teams to bring new capabilities and services to market that leverage Palo Alto Networks products
+ Ensure the consistency and quality of our services and highest level of customer service
+ Integrate threat intelligence into our services by deepening the feedback loop with Unit 42 Threat Intelligence team and telemetry
+ Recruit and onboard world class Incident Response talent to support our growth goals
+ Support the professional growth and development of our consultants through training and technical enablement
+ Foster and maintain a culture that attracts and retains smart, kind team members dedicated to executing with excellence
+ Identify and execute strategies for service development, enablement, and process that result in the pull through of Palo Alto Networks products
+ Cultivate and maintain relationships with key clientele to increase awareness of Unit 42's' capabilities and provide on-demand expertise for client needs
+ Amplify Unit 42s' presence and credibility in the marketplace through thought leadership, including via speaking engagements, articles, whitepapers, and media exposure
**Your Experience**
+ 6 years of hands-on professional experience in incident response, with 3 years experience in client-facing consulting roles.
+ Demonstrated prior experience and success in leading multi-site, large scale incident response engagements, including scoping work, managing incident response engagements end-to-end and providing guidance on tactical and longer term remediation recommendations
+ Experience in managing, leading and motivating consultants at all levels
+ Experience as a team leader including overseeing other senior, and mid-level analyst/consultant teams
+ Ability to travel as needed to meet business demands
+ Able to split your time across commercial support, client delivery, team coaching, and technical expertise and skills maintenance activities.
+ Strong presentation, communication, and presentation skills with verifiable industry experience communicating at CxO and/or Board of Directors level
+ Expert level of knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance
+ Deep technical experience and operational understanding of major operating systems (Microsoft Windows, Linux, or Mac) and/or proficiency in host based forensics, network forensics and cloud incident response.
+ Endpoint Detection and Response (EDR), threat hunting, log analysis,and triage forensics
+ Collection and analysis of host and cloud based forensic data at scale.
+ Client services mindset and top-notch client management skills
+ Experienced-based understanding of clients' needs and desired outcomes in incident response investigations
+ Demonstrated writing ability, including technical reports, business communication, and thought leadership pieces
+ Operates with a hands-on approach to service delivery with a bias towards collaboration and teamwork
+ Track record of championing innovation and improvement initiatives for your area of expertise, identifying emerging trends and technologies and developing leading solutions to address client needs.
+ Be a valuable contributor to the practice and, specifically develop an external presence via public speaking, conferences, and/or publications
+ Have credibility, executive presence, and gravitas
+ Able to have a meaningful and rapid delivery contribution
+ Have the potential and capacity to understand all aspects of the business and an excellent understanding of PANW products
+ Be collaborative and able to build relationships internally, externally, and across all PANW functions, including the sales team
+ Bachelor's Degree in Information Security, Computer Science, Digital Forensics, Cyber Security, or equivalent years of professional experience or equivalent relevant experience or equivalent military experience required to meet job requirements and expectations.
+ Professional industry certifications such as: GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), GIAC Incident Handler (GCIH)
**The Team**
Unit 42 Consulting is Palo Alto Network's security advisory team. Our vision is to create a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services to clients of all sizes. Our team is composed of recognized experts and incident responders with deep technical expertise and experience in investigations, data breach response, digital forensics, and information security. With a highly successful track record of delivering mission-critical cybersecurity solutions, we are experienced in working quickly to provide an effective incident response, attack readiness, and remediation plans with a focus on providing long-term support to improve our clients' security posture.
**Our Commitment**
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at .
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Business Incident Response Specialist
Posted today
Job Viewed
Job Description
The Business Incident Response (BIR) team is a specialized group that provides rapid and holistic resolution of critical escalations that threaten businesses' and partners' brands, relationships, and revenue streams. The team offers dedicated support to advertisers globally who experience friction on our platforms. By leveraging cross-functional partnerships, the BIR team delivers an immediate and personalized experience for constituents and stakeholders during times of crisis. The team operates off-process and overrides barriers to ensure swift issue resolution, prioritizing resources dynamically to assume ownership over mission-critical incidents.The escalations handled by the BIR team are complex and require experience in areas such as operations, policy, process, and project management. The team comprises best-in-class specialists who leverage their skills to deliver outsized impact.To succeed on the BIR team, candidates should be passionate about social media, real-time crisis management, and working collaboratively in a fast-paced environment. Candidates should have a high level of interest in customer support and working cross-functionally with multiple domains, including policy and process. Candidates will have to navigate ambiguity and have the capacity to make quality decisions while remaining unbiased and open to feedback. Candidates will be communicating relevant content and context to inform and enable internal and external partners, including executive level communication.The role will be based in Singapore.
Business Incident Response Specialist Responsibilities:- Review, investigate and coordinate the end-to-end resolution of executive-level incidents in adherence with the respective process and policy frameworks
- Communicate effectively with multiple stakeholders, including external clients, internal partners and the leadership group
- Serve as the primary communication channel on critical escalations
- Cooperate with a wide group of cross-functional partners across the business, including those outside of your domain expertise, to coordinate the work and develop long-lasting relationships
- Successfully execute assigned tasks and/or project work, ensuring that goals are met within scope and timelines
- Join and/or organize group meetings to effectively discuss, and occasionally present, on many business matters including core work, projects, and strategy
- Perform root-cause analysis and/or draft post-mortem reports to identify areas of opportunity and issue recommendations to the appropriate audience
- Drive innovation by contributing towards resolving problem statements and proposing improvements to existing processes
- Attend mandatory training and seek knowledge in areas of interest to the business
- Be an expert on interpreting and enforcing Meta's policies and use sound judgment, specific knowledge, signals and insights to drive scalable solutions to support Meta and our users
- Adopt best practices in order to achieve individual and collective goals
- 3+ years of experience working in large-scale operations, domains such as online operations, escalations, informational systems, compliance, risk management, policy, legal operations, management consulting or related fields
- Demonstrated understanding of how the broader social media landscape operates in the industry
- Demonstrated experience thinking strategically about complex issues leading to thoughtful recommendations, and making quality decisions when dealing with ambiguous situations
- Demonstrated experience navigating ambiguous situations
- Experienced working within fast-paced environments, handling multiple workstreams and maintaining effective communication with all stakeholders, both internal and external
- Experience with analytical tools (i.e. Excel, SQL, Tableau) and influencing others leveraging data and analysis
- Familiarity with Meta's suite of products
- Proficiency in another language spoken in Asia Pacific (business fluent)
- Experience working directly with global, cross-functional teams to solve issues and develop solutions
- Understanding of the power of social media for businesses and the issues that are inherent to it
- Degree in Science, Technology, Engineering, and Mathematics (S.T.E.M)
Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. People who choose to build their careers by building with us at Meta help shape a future that will take us beyond what digital connection makes possible today—beyond the constraints of screens, the limits of distance, and even the rules of physics.
Individual compensation is determined by skills, qualifications, experience, and location. Compensation details listed in this posting reflect the base hourly rate, monthly rate, or annual salary only, and do not include bonus, equity or sales incentives, if applicable. In addition to base compensation, Meta offers benefits. Learn more about benefits at Meta.
Lead, Cybersecurity Incident Response
Posted today
Job Viewed
Job Description
Technical Skills
- Strong expertise in incident response, threat hunting, and forensic analysis.
- Experience with SIEM tools (e.g., Elastic, Splunk).
- Proficiency in network security, malware analysis, and log analysis.
- Familiarity with cloud security (AWS, Azure, GCP) and container security.
- Experience with cloud security tools and AI-powered security analytics (AWS Guard Duty, Azure Sentinel, Google Chronicle).
- Familiarity with AI/ML-driven anomaly detection and behavioral analysis techniques.
- Knowledge of security solutions (EDR, XDR, NDR, WAF, Proxy, Firewall, Email Security).
- Scripting and automation skills (Python, PowerShell, Bash).
- Deep understanding of the MITRE ATT&CK framework, cyber kill chain, and machine learning models for cybersecurity applications.
- Excellent communication and report-writing skills and the ability to work under pressure scenarios.
Job Types: Full-time, Permanent
Benefits:
- Health insurance