Job Search and Career Advice Platform

Enable job alerts via email!

Security Operations Center (SOC) Cyber Threat Senior Analyst

CITIBANK N.A.

Singapore

On-site

SGD 75,000 - 95,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A global financial institution in Singapore is seeking a Cyber Threat Analyst to join their Security Operations Center. This role involves analyzing security events and responding to cyber threats. Candidates should have 4-8 years of relevant experience and strong analytical skills. The successful applicant will stay updated with the latest cybersecurity trends and participate in continuous improvements to SOC processes. A Bachelor’s degree is required, along with the ability to work shifts that may include weekends.

Qualifications

  • 4-8 years of relevant experience in Cyber.
  • Ability to conduct analysis utilizing network traffic and logs.
  • Relevant cybersecurity certification is a bonus.

Responsibilities

  • Analyze security events to identify potential threats.
  • Drive continuous efforts to improve SOC process.
  • Stay updated with cybersecurity trends and technologies.

Skills

Cybersecurity knowledge
Analytical skills
Relationship management
Attention to detail
Team player

Education

Bachelor’s degree or equivalent experience
Job description

The Security Operations Center (SOC) Cyber Threat Analyst will be part of the Global SOC Team. This center operates 24x7, follow‑the‑sun model to monitor, analyze and respond to cyber‑attacks and information/data breaches. SOC Analysts are the critical first line of defense, in charge of monitoring Citi’s environment globally through state‑of‑the‑art security detections tools, responding to security events and escalating security incidents that have potential impact to Citi.

Responsibilities
  • Analyze security events to identify potential threats and intrusions. Events include but not limited to Intrusion Detection/Prevention tools, anomaly detection systems, Firewalls, Antivirus and EDR systems, proxy devices, cloud security solution and data leakage prevention system.
  • Assess and investigate potential security threats sourced from other channel leveraging variety of data and tools.
  • Drive a continuous effort to improve SOC process. Execute adhoc tasks or small projects as needed.
  • Undertakes root cause analysis of events, perform risk assessment on threat or vulnerability and make recommendations to improve detection capability.
  • Drive a continuous effort to review and fine tune detection rule/use case/signature to reduce unnecessary noise and increase alert fidelity.
  • Handle threat incidents call like DDOS incidents, adhoc high severity cases including collaboration and escalation to other support groups.
  • Participate in daily and adhoc conference calls, self‑assessment processes and documentation related tasks.
  • Stay updated with the latest cybersecurity trends, emerging threats and technologies.
Qualifications
  • 4-8 years of relevant experience in Cyber.
  • Proven influencing and relationship management skills.
  • Understand the life cycle of network threats, web attacks, attack vectors, and methods of exploitation.
  • Ability to conduct analysis utilizing network traffic (packet capture), web logs, endpoint logs and others to identify unusual behavior that may indicate malicious activity.
  • Proven and strong analytical skills.
  • Attentive to detail and possess a strong investigative mindset.
  • A good team player, self-driven and able to act as individual contributor.
  • Consistently demonstrates clear and concise written and verbal communication.
  • Relevant cyber security certification is a bonus.
  • Regular weekly work shift will include one of the weekends (e,g, Saturday, Sunday).
Education
  • Bachelor’s degree/University degree or equivalent experience.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.