Overview

Security Incident Response Analyst Jobs in Singapore, Singapore at Secur Solutions Group Pte Ltd

Title: Security Incident Response Analyst

Company: Secur Solutions Group Pte Ltd

Location: Singapore, Singapore

Type: Full Time

Category: IT/Tech, Security

As a Senior Security Incident Response Analyst, you will be responsible and tasked to perform Security Operations Center (SOC) duties. You will leverage SIEM and other security technologies to monitor, support and automate highly

dynamic

,

diverse

and complex business environments across the organization in APAC region, interfacing with different teams and business stakeholders including information security, information technology and application teams.

You will also be required to participate in the creation of standard operating procedures, documentation and other assigned project tasks as necessary.

What you will be doing

· Perform security monitoring and incident response activities across the Sony Group’s APAC networks, leveraging a variety of tools and techniques

· Detect incidents through proactive “hunting” across security-relevant data sets

· Thoroughly document incident response analysis activities

· Develop new, repeatable methods for finding malicious activity across the Sony Group’s APAC networks

· Provide recommendations to enhance detection and protection capabilities

· Regularly present technical topics to technical and non-technical audiences

· Write high-quality incident reports for executives

· Develop and follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in the remediation of information security incidents

· Prioritize multiple high-priority tasks and formulate responses/recommendations to customers and team members in a

fast-paced environment

· Provide assistance to other security teams

· Continually develop new technical skills and push overall team capabilities forward

· Engage with and mentor other team members

· Perform other duties, as assigned

What you should have

· Degree or Diploma in Information Technology, Engineering, Cybersecurity or related field

· Minimum 10 years of experience in Information Technology and 7 years in Information Security

·

Hands-on experience

in a Security Operations Center environment conducting network, host, or threat analysis

· Experience analyzing raw log files, particularly logs from network or host based security tools

· Experience analyzing packet captures

· Deep understanding of network defense principles, common attack vectors, and attacker techniques

· Advanced technical skills and the ability to develop a mastery of network and host security technologies

· Comfort with using the Linux and Windows command lines

· Experience with at least 2 programming or scripting languages

· Experience with the following technologies or concepts:o SIEM or other security/log management platform so Basic host-based forensics analysiso Basic static and

dynamic

malware analysiso Email analysiso Regular expression so IDS/IPSo Firewall so Virtualizationo Common TCP and UDP protocols

· Experience in self-learning of technical subjects

What will help you succeed

· Possessing strong soft skills in written/verbal

communication

,

problem solving

, decision making, and task prioritization

· Having

strong work ethic

and commitment to accomplish assigned tasks with a sense of urgency

· Being highly motivated and self-driven with strong aptitude for

continuous learning

and growth

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.