233 Threat Management jobs in Singapore
Security Analyst
Posted today
Job Viewed
Job Description
ALTEN Group is a world leader in Engineering and Technology consulting services providing outsourced Engineering, R&D, and IT Services for different industries such as Transportation, Defence, Energy and Security with 55,000 engineers in nearly 35 countries. ANOTECH is the subsidiary of the Group delivering ALTEN's Engineering Services in Singapore.
As a Security Analyst, you will be analyzing large amounts of traffic to websites to find correlations and patterns. Based on the conclusions drawn from the analysis, the analyst collaborates with the customer and with internal teams to implement mitigation strategies to stop automated website attacks.
Responsibilities:
· Monitor internal queue and provide incident response in line with the respective premium SLA
· Analyze false positives for detection mechanisms to hone the product
· Spend time analyzing web traffic data to identify and isolate new advanced bot behaviors
· Work with customers to fully understand the issues automated attacks cause to their business and devise strategies to mitigate or eliminate the issues
· Have regular calls with customers to discuss findings and analysis
· Work with the organisation's internal research, data science, and product teams by delivering actionable intelligence that will inform future product enhancements
· Use data visualization tools to create consumable reports to quickly validate findings and demonstrate the efficacy of actions taken
· Be a trusted advisor, take ownership of all problems you encounter, and be a team player
Requirements:
· Minimum of 5 years relevant experience
· Bachelor's degree in IT/Mathematics/Engineering/Computer or equivalent demonstrated success
· Highly advantageous if you are fluent in Spanish or French language
· Proficient SQL skills
· Experience with data visualization tools like Tableau or Looker
· Experience in one or more languages such as Python, Bash, or Go
· HTTP network knowledge and can describe in some detail how websites are delivered to browsers
· Your customer facing skills are polished and you know not to guess when in doubt
· You have an interest in security/technology and keep up with the latest trends and news
· You love solving difficult problems and finding the needle in the haystack
· You have meticulous communication skills and are confident in your ability to have regular technical and non-technical calls
· You are a leader and can work independently as well as tightly with a team
Tell employers what skills you haveTableau
Information Security
Security Operations
Vulnerability Management
Cyber Security
French Language
Scripting
Bash
IT-Security
SQL
Python
Operating Systems
Bash/Shell/PowerShell
Web Security
Communication Skills
Spanish
Vulnerability Assessment
Network Security
CISSP
Data Visualization
CYBER THREAT SECURITY ANALYST
Posted 6 days ago
Job Viewed
Job Description
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
We are seeking a skilled and experienced Threat Hunter to join our growing Security Operations team. The ideal candidate will be a proactive and resourceful individual with a passion for identifying and neutralizing advanced threats. This role requires a deep understanding of threat hunting methodologies, a strong analytical mindset, and exceptional communication skills.
**The Main Responsibilities**
+ Conduct proactive threat hunting activities across various environments (endpoints, networks, cloud).
+ Develop and maintain threat hunting hypotheses based on current threat intelligence and organizational risk assessments.
+ Leverage various threat hunting techniques, including but not limited to, YARA rules, IOC analysis, and behavioral analysis.
+ Develop custom scripts and tools to automate threat hunting processes and improve efficiency.
+ Analyze security logs, network traffic, and endpoint data to identify malicious activity and potential threats.
+ Investigate security incidents and provide detailed reports on findings, including root cause analysis and remediation recommendations.
+ Collaborate with other security teams (incident response, vulnerability management, etc.) to share threat intelligence and coordinate security efforts.
+ Develop and manage Cyber Threat Intelligence while staying up-to-date on the latest threat landscape, attack techniques, and emerging technologies.
+ Present findings and recommendations to technical and non-technical audiences.
+ Contribute to the development and improvement of threat hunting strategies and processes.
+ Develop and maintain a strong understanding of the organization's infrastructure and applications.
**What We Look For in a Candidate**
+ Bachelor's degree in Computer Science, Cybersecurity, or a related field.
+ 5+ years of experience in cybersecurity, with a minimum of 3 years focused on threat hunting.
+ Strong understanding of various operating systems (Windows, Linux, macOS).
+ Experience with various security tools and technologies (SIEM, EDR, network monitoring tools).
+ Proficiency in scripting languages (Python, PowerShell).
+ Strong analytical and problem-solving skills.
+ Excellent communication and presentation skills.
+ Experience with threat intelligence platforms and feeds.
+ Relevant security certifications (e.g., SANS GIAC, GNFA, GCFA, Offensive Security, etc).
+ Experience with cloud security (AWS, Azure, GCP) is a plus
**Compensation**
**What to Expect Next**
Requisition #:
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page ( . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
CYBER THREAT SECURITY ANALYST
Posted today
Job Viewed
Job Description
Join to apply for the
CYBER THREAT SECURITY ANALYST
role at
Lumen Technologies
Join to apply for the
CYBER THREAT SECURITY ANALYST
role at
Lumen Technologies
About Lumen
Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency. People power progress.
About Lumen
Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency. People power progress.
We’re looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
The Role
The Cyber Threat Security Analyst role will focus on security event and incident monitoring, threat hunting, and deep analysis of threat information within SIEM environments, various log sources, and within security control technologies directly. The Security Analyst will work directly with customers to determine and communicate relevant risk and potential impact, as well as make recommendations for risk mitigation. This role will also provide direction for SIEM rule changes, customer escalations and inquiries, and help develop improved threat analysis process and procedures.
The Cyber Threat Security Analyst role is expected to participate in a shift schedule and on-call rotation to accommodate a global 24x7x365 Managed Threat Security Services program.
The Main Responsibilities
Perform security incident and event monitoring support, including deep dive data analysis and response
Develop and manage customer security event analysis notifications with thoughtful analysis details, evidence, conclusions, and recommendations
Respond and manage customer issues and questions regarding security events, including evidence supporting risk identification and recommended risk mitigation, via trouble ticket, email, and phone
Review threat detection rules and correlations, and make recommendations for improved fidelity
Qualifications & Skills
What We Look For in a Candidate
Required
Requires Bachelor’s degree in related field or equivalent combination of education and experience.
Possess strong customer service skills
Communicate effectively with managers, customers and vendors
Maintain solid working relationships, including collaborative technical activities with peers
Good written and verbal communication skills
Good analytical and problem-solving skills
Attention to detail with good organizational skills
Basic experience performing security monitoring, hunting, and analysis within SIEM platforms and security controls
Preferred
1 or more years in a Security Operations environment performing cyber threat hunting and incident response support
Security industry certifications (examples):
GIAC
CISSP
CRISC
CISM
Security+
CCNA
CEH
Basic knowledge and skills of at least one programming language (python preferred)
Compensation
What to Expect Next
Requisition #:
Background Screening
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page. Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
Equal Employment Opportunities
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
Disclaimer
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Seniority level
Seniority level Entry level
Employment type
Employment type Full-time
Job function
Job function Information Technology
Industries Telecommunications
Referrals increase your chances of interviewing at Lumen Technologies by 2x
Sign in to set job alerts for “Cyber Security Analyst” roles.
Information Technology - Cyber Security Analyst (Scoot)
Information Security Analyst Level II - SIEM, Tues-Sat 7am-3pm
Graduate Hiring - Cybersecurity Engineer
Information Technology - Cyber Security Specialist (Risk and Governance)
Information Technology - Cyber Security Engineer (Threat Management and Incident Response) (Scoot)
Information Technology Security Engineer
Junior Specialist, Cyber Security Defense Operations
Information Security Analyst / IT Support Engineer
Intern - ONT, Information Security, Fall (July to Dec 2025)
Technology & Cyber Security Risk Analyst
Information Technology Security Engineer
Application Security Engineer (Pentester)
Security Operations Engineer (Shift) - 2 year contract
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Security Analyst 3
Posted 6 days ago
Job Viewed
Job Description
We are looking for professionals with experience protecting critical infrastructure to help us defend Oracle cloud infrastructure. Our team is skilled in threat hunting, analyzing indicators of compromise (IOCs), investigating adverse security events, security incident management, and digital forensics across laaS, PaaS and SaaS environments. You will be part of a corporate security operations center responsible for defending infrastructure from adversaries and insider threats. This includes using tools to analyze and respond to threats, creating tools/scripts to aid in analysis, and responding in real time to adverse security events. Our team is the last line of defense if security controls are breached. We are expanding the team and working on ambitious new initiatives. The Senior SOC Analyst will leverage advance security tooling and automation to rapidly detect and respond to real-time security alerts and events and conduct detailed root cause investigations. The analyst will work closely with other SOC personnel, forensics, incident response, and engineering partners to mitigate a wide variety of threats and malicious activity.
Career Level - IC3
Description
+ Support shifts and on call rotations
+ Detect and respond to security events and threats from alerting, escalations, and other sources
+ Lead complex investigations and conduct deep analysis of security events focused on rapid containment, remediation, and mitigation
+ Work closely with security engineering teams to improve monitoring, detection, and tooling
+ Understand the threat landscape, emerging trends, and incorporate this understanding into day-to-day security monitoring
+ Operate SOC technologies, including but not limited to a Security Information Event Management (SIEM) platform,Intrusion Detection Systems (IDS), SOAR, Firewalls, Anti-Malware solutions, and insider threat tooling
+ Assist with security incident response activities
+ Prepare assigned reports for the SOC manager
+ Provide high quality written and verbal reports as required
+ Actively monitor and respond the SIEM alert queue and triage alerts
+ Investigate alerts using standard operating procedures
+ Monitor several screens, systems, and alerts simultaneously
+ This role is open to Singaporeans only
+ Must meet eligibility requirements for obtaining and maintaining a Singapore government security clearance.
+ This role will involve the successful applicant working on government projects which may require security clearance being obtained and maintained as a condition of employment. Candidates applying for this role must be willing to provide necessary personal details for the application and maintenance of necessary security clearance.
**Responsibilities**
Preferred Qualifications
+ 8+ years of Incident Response, Security Operations Center, and/or Forensic Analyst experience
+ Comfortable working in an ambiguous, fast-paced, unpredictable environment
+ Experience working in a highly collaborative, team centric, event driven operations team
+ Experience with querying across large data sets to understand complicated and difficult to solve problems
+ Strong attention to detail
+ Experience in one or more of the following fields of work: National security, military, intelligence, law enforcement, criminology, and/or foreign areas and language
+ Experience with variety of operating systems and threats that target them including Windows, UNIX/LINUX, and MacOS
+ Experience performing open source research on a variety of topics
+ Excellent verbal/non-verbal communication skills with proficient ability to deliver technical information to non-technical staff
Career Level - IC3
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing or by calling in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Security Analyst 3
Posted 6 days ago
Job Viewed
Job Description
We are looking for professionals with experience protecting critical infrastructure to help us defend Oracle cloud infrastructure. Our team is skilled in threat hunting, analyzing indicators of compromise (IOCs), investigating adverse security events, security incident management, and digital forensics across laaS, PaaS and SaaS environments. You will be part of a corporate security operations center responsible for defending infrastructure from adversaries and insider threats. This includes using tools to analyze and respond to threats, creating tools/scripts to aid in analysis, and responding in real time to adverse security events. Our team is the last line of defense if security controls are breached. We are expanding the team and working on ambitious new initiatives. The Senior SOC Analyst will leverage advance security tooling and automation to rapidly detect and respond to real-time security alerts and events and conduct detailed root cause investigations. The analyst will work closely with other SOC personnel, forensics, incident response, and engineering partners to mitigate a wide variety of threats and malicious activity.
Career Level - IC3
Description
+ Support shifts and on call rotations
+ Detect and respond to security events and threats from alerting, escalations, and other sources
+ Lead complex investigations and conduct deep analysis of security events focused on rapid containment, remediation, and mitigation
+ Work closely with security engineering teams to improve monitoring, detection, and tooling
+ Understand the threat landscape, emerging trends, and incorporate this understanding into day-to-day security monitoring
+ Operate SOC technologies, including but not limited to a Security Information Event Management (SIEM) platform,Intrusion Detection Systems (IDS), SOAR, Firewalls, Anti-Malware solutions, and insider threat tooling
+ Assist with security incident response activities
+ Prepare assigned reports for the SOC manager
+ Provide high quality written and verbal reports as required
+ Actively monitor and respond the SIEM alert queue and triage alerts
+ Investigate alerts using standard operating procedures
+ Monitor several screens, systems, and alerts simultaneously
+ This role is open to Singaporeans only
+ Must meet eligibility requirements for obtaining and maintaining a Singapore government security clearance.
+ This role will involve the successful applicant working on government projects which may require security clearance being obtained and maintained as a condition of employment. Candidates applying for this role must be willing to provide necessary personal details for the application and maintenance of necessary security clearance.
**Responsibilities**
Preferred Qualifications
+ 4+ years of Incident Response, Security Operations Center, and/or Forensic Analyst experience
+ Comfortable working in an ambiguous, fast-paced, unpredictable environment
+ Experience working in a highly collaborative, team centric, event driven operations team
+ Experience with querying across large data sets to understand complicated and difficult to solve problems
+ Strong attention to detail
+ Experience in one or more of the following fields of work: National security, military, intelligence, law enforcement, criminology, and/or foreign areas and language
+ Experience with variety of operating systems and threats that target them including Windows, UNIX/LINUX, and MacOS
+ Experience performing open source research on a variety of topics
+ Excellent verbal/non-verbal communication skills with proficient ability to deliver technical information to non-technical staff
Career Level - IC3
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing or by calling in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Security Analyst 3
Posted 6 days ago
Job Viewed
Job Description
We are looking for professionals with experience protecting critical infrastructure to help us defend Oracle cloud infrastructure. Our team is skilled in threat hunting, analyzing indicators of compromise (IOCs), investigating adverse security events, security incident management, and digital forensics across laaS, PaaS and SaaS environments. You will be part of a corporate security operations center responsible for defending infrastructure from adversaries and insider threats. This includes using tools to analyze and respond to threats, creating tools/scripts to aid in analysis, and responding in real time to adverse security events. Our team is the last line of defense if security controls are breached. We are expanding the team and working on ambitious new initiatives. The Senior SOC Analyst will leverage advance security tooling and automation to rapidly detect and respond to real-time security alerts and events and conduct detailed root cause investigations. The analyst will work closely with other SOC personnel, forensics, incident response, and engineering partners to mitigate a wide variety of threats and malicious activity.
Career Level - IC3
Description
+ Support shifts and on call rotations
+ Detect and respond to security events and threats from alerting, escalations, and other sources
+ Lead complex investigations and conduct deep analysis of security events focused on rapid containment, remediation, and mitigation
+ Work closely with security engineering teams to improve monitoring, detection, and tooling
+ Understand the threat landscape, emerging trends, and incorporate this understanding into day-to-day security monitoring
+ Operate SOC technologies, including but not limited to a Security Information Event Management (SIEM) platform,Intrusion Detection Systems (IDS), SOAR, Firewalls, Anti-Malware solutions, and insider threat tooling
+ Assist with security incident response activities
+ Prepare assigned reports for the SOC manager
+ Provide high quality written and verbal reports as required
+ Actively monitor and respond the SIEM alert queue and triage alerts
+ Investigate alerts using standard operating procedures
+ Monitor several screens, systems, and alerts simultaneously
+ This role is open to Singaporeans only
+ Must meet eligibility requirements for obtaining and maintaining a Singapore government security clearance.
+ This role will involve the successful applicant working on government projects which may require security clearance being obtained and maintained as a condition of employment. Candidates applying for this role must be willing to provide necessary personal details for the application and maintenance of necessary security clearance.
**Responsibilities**
Preferred Qualifications
+ 4+ years of Incident Response, Security Operations Center, and/or Forensic Analyst experience
+ Comfortable working in an ambiguous, fast-paced, unpredictable environment
+ Experience working in a highly collaborative, team centric, event driven operations team
+ Experience with querying across large data sets to understand complicated and difficult to solve problems
+ Strong attention to detail
+ Experience in one or more of the following fields of work: National security, military, intelligence, law enforcement, criminology, and/or foreign areas and language
+ Experience with variety of operating systems and threats that target them including Windows, UNIX/LINUX, and MacOS
+ Experience performing open source research on a variety of topics
+ Excellent verbal/non-verbal communication skills with proficient ability to deliver technical information to non-technical staff
Career Level - IC3
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing or by calling in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
IT Security Analyst
Posted today
Job Viewed
Job Description
We're looking for a motivated IT Security Analyst to join our Enterprise Security Transformation team.
In this role, you will support the delivery and maintenance of cloud and endpoint security services, helping protect our SaaS applications, data, and infrastructure. You'll work closely with senior team members on security operations, vulnerability management, and architecture assessments.
- Working Hours: Mon-Fri
- Working Location: Central
- Salary Package: Up to $5,000 (basic) + AWS + VB
Key Responsibilities
- Monitor systems and assist in identifying potential security threats.
- Support the implementation and maintenance of security controls.
- Participate in security audits, compliance checks, and vulnerability assessments.
- Assist in reviewing penetration test reports and follow-up actions.
- Help with security documentation, root cause analysis, and incident reporting.
- Collaborate with the team to improve cloud and endpoint security posture.
- Provide occasional after-hours or weekend support on a rotational basis.
Requirements
- Bachelor's degree in Cybersecurity, Information Security, or a related field.
- Basic understanding of cloud platforms (AWS, Azure, or GCP).
- Eagerness to learn and grow in cloud and cybersecurity.
- Security certifications (e.g., AWS Security Specialty, CompTIA Security+) are a plus.
By submitting your resume, you consent to the collection, use, and disclosure of your personal information per ScienTec's Privacy Policy (scientecconsulting.com/privacy-policy).
This authorizes us to:
- Contact you about potential opportunities.
- Delete personal data as it is not required at this application stage.
All applications will be processed with strict confidence. Only shortlisted candidates will be contacted.
Elane Yap Theng Yu- R
ScienTec Consulting Pte Ltd - 11C5781
Tell employers what skills you haveInformation Security
Security Audits
Security Operations
Azure
Vulnerability Management
Cyber Security
Root Cause Analysis
Penetration Testing
Compliance
Operating Systems
SaaS
Consulting
Ansible
Network Security
CISSP
Be The First To Know
About the latest Threat management Jobs in Singapore !
Cyber Security Analyst
Posted today
Job Viewed
Job Description
The primary role of the Cyber Security Analyst is to safeguard the organisation's IT and network infrastructure against cyber risks, ensure compliance with regulatory requirements, and strengthen ICT resilience. This includes conducting cyber risk assessments, implementing security controls, monitoring threats, and supporting technology initiatives to ensure a secure and compliant IT environment.
Key Responsibilities:
- Conduct cyber risk assessments for IT and infrastructure projects, identifying potential vulnerabilities and recommending appropriate controls.
- Monitor, track, and manage risk mitigations, exceptions, and ensure adequate monitoring capability is embedded into IT solutions.
- Implement, configure, and maintain security technologies including firewalls, intrusion prevention, VPN, microsegmentation, endpoint protection, and security monitoring tools.
- Perform ongoing cyber threat monitoring, analysis, and incident response activities.
- Support ICT resilience by ensuring business continuity, disaster recovery, and compliance with security frameworks and regulatory standards.
- Collaborate with infrastructure and operations teams to design and maintain secure enterprise network architecture (LAN, WAN, VPN, Wireless, SDN, ACI).
- Maintain up-to-date documentation including risk registers, security architecture diagrams, and audit reports.
- Work with internal stakeholders and external vendors to ensure timely resolution of cyber security and compliance issues.
- Participate in governance activities including risk reviews, compliance reporting, and awareness training.
- Contribute to cyber security strategy, policy development, and security technology refresh programs.
Required Skills and Knowledge:
- Proven hands-on experience in information/cyber security, ICT resilience, or network security operations.
- Strong knowledge of security standards, governance frameworks (ISO27001, NIST, CIS, ITIL).
- Deep understanding of networking and security protocols (e.g., IPSEC, SSL/TLS, VPN, BGP, OSPF, 802.11, QoS).
- Experience in cyber risk assessment, security design, and compliance monitoring.
- Hands-on experience with tools and technologies such as SIEM, firewalls (Fortinet, Cisco), load balancers (F5), Cisco ACI, Aruba Wireless/Clearpass, and vulnerability scanning platforms.
- Knowledge of ITIL and project management practices.
- Programming skills with Python for automation and security analytics (advantageous).
To apply, simply click the "Apply" button or send your updated profile to
EA Licence No.:18S9405 / EA Reg. No.:R
Percept Solutions is expanding and actively seeking talented individuals. We encourage applicants to follow Percept Solutions on LinkedIn at to stay informed about new opportunities and events.
Tell employers what skills you haveSecurity Architecture
OSPF
Security Operations
Vulnerability Scanning
Risk Assessment
Business Continuity
Cyber Security
Security Strategy
Network Architecture
Networking
Prevention
Disaster Recovery
Network Security
VPN
BGP
IT Security Analyst
Posted today
Job Viewed
Job Description
Our client, one of Asia-Pacific's leading organizations is looking for:
IT Security Analyst
Responsibilities:
- Incident Response: Oversee the entire incident response lifecycle from detection to resolution; Lead investigations of IT security incidents and ensure thorough root cause analysis and remediation
- Develop and maintain incident response playbooks and procedures; Coordinate with internal, external stakeholders, and vendors during incidents; Conduct post-incident reviews and report findings to management
- Monitoring and Detection: Develop and implement advanced threat detection and monitoring strategies: Utilize SIEM, EDR, and other security tools for timely incident detection
- Perform threat hunting and proactive security assessments; Collaborate with IT teams to deploy and optimize security solutions
- Threat Statistics and Reporting: Prepare and present detailed reports on threat statistics to stakeholders; Use data visualization tools to communicate threat trends and insights
Requirements:
- Degree in Computer Science, Information Technology, Engineering, or related with 8 years of progressive experience in IT security, with a focus on Incident response
- Minimum 4 years of experience in a security operations center, with proven leadership capabilities
- Good knowledge of security operations, incident analysis, incident handling, and vulnerability management or testing, system patching, log analysis, intrusion detection, or firewall administration
- Professional Certification(s) in incident handling and security analysis preferred
- Proficiency in Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), traffic and packet analysis, and cloud security
- Experience in firewall, Intrusion Prevention Systems (IPS), Web Application Firewalls (WAF) administration, virtualization, and cloud technologies
---
Interested applicants can also email CV at (for faster processing, please state the exact job / position title applied "IT Security Analyst"
Only shortlisted candidates will be notified.
---
EA License Number: 10C3636
EA Personnel Name: Arora, Hardeep
EA Personnel Registration Number: R
By applying for this role, you have read and acknowledge the Data Privacy statement -
Tell employers what skills you haveInformation Security
SIEM
Security Operations
Cloud Security
Vulnerability Management
Cyber Security
Intrusion Detection
IT Security Operations
Endpoint Security
Virtualization
CISSP
Firewalls
Cyber Security Analyst
Posted today
Job Viewed
Job Description
Job Description:
As an IT Security Analyst, you will play a critical role in safeguarding our organization's digital assets and infrastructure. You will be responsible for monitoring and analyzing security events, identifying potential threats, and responding to security incidents. Your expertise will be essential in conducting vulnerability assessments, implementing security controls, and ensuring compliance with industry standards and regulations. You will collaborate with cross-functional teams to develop and maintain security policies, procedures, and awareness programs, while staying abreast of the latest security trends and technologies. Your proactive approach to threat detection and incident response will be vital in maintaining the confidentiality, integrity, and availability of our systems and data.
Core Responsibilities & Duties:
- Security Monitoring and Analysis:
Monitor security logs, network traffic, and system events for suspicious activity.
Analyze security alerts and events to identify potential threats and vulnerabilities.
Utilize security information and event management (SIEM) tools to detect and correlate security incidents. - Incident Response:
Participate in incident response activities, including containment, eradication, and recovery.
Conduct forensic analysis to investigate security breaches and determine the root cause.
Document security incidents and response actions. - Vulnerability Management:
Conduct vulnerability assessments and penetration testing to identify security weaknesses.
Prioritize and track vulnerabilities and recommend remediation actions.
Manage and maintain vulnerability scanning tools. - Security Control Implementation:
Implement and maintain security controls, such as firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus software.
Configure and manage security systems and applications.
Ensure security controls are properly implemented and maintained. - Compliance and Auditing:
Assist in security audits and compliance assessments (e.g., GDPR, HIPAA, PCI DSS).
Develop and maintain security policies, procedures, and standards.
Ensure compliance with relevant security regulations and industry best practices. - Security Awareness and Training:
Develop and deliver security awareness training programs for2 employees.
Educate users on security best practices and potential threats.
Promote a security-conscious culture within the organization. - Threat Intelligence:
Stay up to date on the latest security threats and vulnerabilities.
Research and analyze threat intelligence to identify potential risks.
Provide threat intelligence reports and recommendations. - Collaboration and Communication:
Collaborate with cross-functional teams to address security concerns.
Communicate security risks and recommendations to stakeholders.
Provide clear and concise security reports and documentation. - Documentation and Reporting:
Maintain accurate and up-to-date security documentation.
Generate regular security reports and metrics.
document security procedures.
Qualifications:
- A degree in the field of Computer Science or related field, or equivalent experience is required
- 5 + years of experience in IT information security
- Strong technical and consulting skills, project management capability
- Experience with security and risk frameworks, standards, and best practices
- Able to present effectively to executive level in both business and IT terms
Skills:
- The ideal candidate will possess a "can do" attitude with a "will do" work ethic
- Quick thinker, experienced in unconventional problem solving
- Excellent understanding of business complexity and project interdependencies
- Excellent communication, written, verbal, analytical and problem-solving skills
- Suitable time management skills and ability to meet deadlines
- Strong understanding of the organization's goals and objectives
- Exceptional interpersonal skills, with a focus on listening and questioning skills
- Strong documentation skills
- Ability to conduct research into a wide range of computing issues as required
- Ability to absorb and retain information quickly
- Ability to present ideas in user-friendly language to non-technical staff and end users
- A keen attention to detail
- Ability to effectively prioritize and execute tasks in a high-pressure environment
- Exceptional customer service orientation
- Experience working in a team-oriented, collaborative environment
Information Security
Security Audits
Remediation
Vulnerability Scanning
Vulnerability Management
Forensic Analysis
Exceptional Customer Service
Documentation Skills
Auditing
Event Management
PCI DSS
Penetration Testing
Threat Intelligence
HIPAA
Security Awareness