Job Search and Career Advice Platform

Enable job alerts via email!

Security Operations Center (SOC) Cyber Threat Senior Analyst

CITIBANK N.A.

Singapore

On-site

SGD 70,000 - 100,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A global financial institution in Singapore is looking for a Cyber Threat Analyst to join its Security Operations Center. The role involves monitoring and analyzing cyber threats, assessing potential security incidents, and driving improvements in the SOC processes. Candidates should have 4-8 years of relevant experience in cybersecurity, along with strong analytical and relationship management skills. A degree and relevant cybersecurity certification are preferred. Shift work, including weekends, is required.

Qualifications

  • 4-8 years of relevant experience in Cyber.
  • Strong analytical skills and attention to detail.
  • Proven and strong relationship management skills.

Responsibilities

  • Analyze security events to identify potential threats.
  • Assess and investigate potential security threats from various channels.
  • Undertake root cause analysis of events and perform risk assessments.

Skills

Cybersecurity
Analytical skills
Relationship management
Attention to detail

Education

Bachelor’s degree or equivalent experience
Job description
Overview

The Security Operations Center (SOC) Cyber Threat Analyst will be part of the Global SOC Team. This center operates 24x7, follow‑the‑sun model to monitor, analyze and respond to cyber‑attacks and information/data breaches. SOC Analysts are the critical first line of defense, in charge of monitoring Citi’s environment globally through state‑of‑the‑art security detections tools, responding to security events and escalating security incidents that have potential impact to Citi.

Responsibilities
  • Analyze security events to identify potential threats and intrusions. Events include but not limited to Intrusion Detection/Prevention tools, anomaly detection systems, Firewalls, Antivirus and EDR systems, proxy devices, cloud security solution and data leakage prevention system.
  • Assess and investigate potential security threats sourced from other channel leveraging variety of data and tools.
  • Drive a continuous effort to improve SOC process. Execute adhoc tasks or small projects as needed.
  • Undertakes root cause analysis of events, perform risk assessment on threat or vulnerability and make recommendations to improve detection capability.
  • Drive a continuous effort to review and fine tune detection rule/use case/signature to reduce unnecessary noise and increase alert fidelity.
  • Handle threat incidents call like DDOS incidents, adhoc high severity cases including collaboration and escalation to other support groups.
  • Participate in daily and adhoc conference calls, self‑assessment processes and documentation related tasks.
  • Stay updated with the latest cybersecurity trends, emerging threats and technologies.
Qualifications
  • 4-8 years of relevant experience in Cyber.
  • Proven influencing and relationship management skills.
  • Understand the life cycle of network threats, web attacks, attack vectors, and methods of exploitation.
  • Ability to conduct analysis utilizing network traffic (packet capture), web logs, endpoint logs and others to identify unusual behavior that may indicate malicious activity.
  • Proven and strong analytical skills.
  • Attentive to detail and possess a strong investigative mindset.
  • A good team player, self-driven and able to act as individual contributor.
  • Consistently demonstrates clear and concise written and verbal communication.
  • Relevant cyber security certification is a bonus.
  • Regular weekly work shift will include one of the weekends (e,g, Saturday, Sunday).
Education
  • Bachelor’s degree/University degree or equivalent experience.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.