Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Engineer

RHB Banking Group

Selangor

On-site

MYR 100,000 - 140,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading banking institution in Malaysia is seeking a Cyber Threat Subject Matter Expert to analyze and respond to advanced threats within the IT infrastructure. Candidates should have extensive experience in information security, strong analytical and technical skills, and familiarity with SIEM solutions such as Splunk. The role involves maintaining security measures, performing threat hunting, and continuous improvement of security operations. This position demands proven expertise in cybersecurity principles and the ability to convey complex information effectively.

Qualifications

  • 4 - 5 years of information security experience.
  • 1 - 2 years supporting incident response and/or investigations.
  • Knowledge in threat actor attack methods and developments.

Responsibilities

  • Maintain SIEM solutions and ensure proper log management.
  • Perform threat hunting using accepted methodologies.
  • Continuously develop and onboard SIEM use cases.

Skills

Information security experience
Incident response
Analytical tradecraft
Technical writing skills
Scripting and programming languages
Cybersecurity principles
Research methodologies
Communication skills

Tools

SIEM solutions (Splunk, Imperva)
Job description

To be part of Cyber Threat team, tier 3 SME and mentor to the SOC team. This role required continuous detection, analysis, investigation, response, and mitigation of advanced threats before they affected the bank’s IT infrastructure via a proven and documented cyberthreat model, e.g., Mitre Attack Framework.

Preferred Level Of Experience (by Years/function/industry)
  • 4 - 5 years of information security experience
  • 1 - 2 years supporting incident response and/or investigations
  • Experience reviewing and assessing logs for anomalous activity indicating the presence of a threat
  • Knowledge and ability to identify threat actor attack methods and track their developments
  • Experience using Threat Model e.g. Cyber Kill Chain & Mitre ATT&CK
  • Extensive experience conveying complex information in simple, succinct explanations
  • Exceptional attention to detail
Other Skills Required (if Applicable)
  • Strong technical writing skills
  • Extensive experience with analytical tradecraft
  • Thorough understanding of cybersecurity principles
  • Ability to work independently and build relationships
  • Efficient research methodologies
  • Ability to relate & convert technical threats with business risks
  • Strong proficiency with scripting and programming languages (e.g. Python, PowerShell, Java, NodeJS, Perl, etc).
  • Strong communication & writing skills for reporting and analysis on cumulative findings
KEY RESPONSIBLITIES
Solution
  • Maintaining of SIEM solution including Splunk, Imperva and etc. (Task including compliance to patch and obsolescence framework requirement)
  • Ensure events / logs from all relevant devices are sending to SIEM solution in a complete and accurate manner
  • To produce monthly SIEM system health report (completeness and accurate)
Hunting
  • Perform threat hunting through industry accepted methodologies including Hypothesis Driven investigation, IOC driven Investigation or Machin Leaning Investigation
  • Analyze host, network traffic, IDS/IPS/DLP events, packet capture, firewall logs and other relevant solutions
  • Provide forensic analysis of network packet captures, DNS, proxy, Netflow, malware, host-based security and application logs, as well as logs from various types of security sensors
  • Identify gaps in IT infrastructure by mimicking an attacker s behaviors and responses
  • Perform offensive validation on identified TTP’s
Detection & Response
  • Continuously develop SIEM use cases based on Mitre Attack framework based on threat landscape
  • To onboard all use cases to Security Operation Center for 24 x 7 monitoring and timely response
  • Continuously onboard new IOC to threat prevention solution to ensure known threat are prevented at all time
  • Continuously improve processes for use across multiple detection sets for more efficient Security Operations
  • Develop dashboards and reports to identify potential threats, suspicious/anomalous activity, malware, etc.
  • Assist in the design, evaluation, and implementation of new security technologies
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.