Enable job alerts via email!

Analyst, Cybersecurity DFIR

Intercontinental Exchange Holdings, Inc.

Singapore

On-site

SGD 50,000 - 90,000

Full time

Today
Be an early applicant

Job summary

A leading financial services firm in Singapore is seeking Cybersecurity professionals for their DFIR team. Candidates will investigate security incidents, handle threat analysis, and support operations against global cyber threats. This role caters to both entry-level analysts and experienced engineers, providing opportunities for growth and collaboration with seasoned experts.

Qualifications

  • Strong understanding of security practices and tools.
  • Hands-on experience with incident response.
  • Experience in cloud and container security.

Responsibilities

  • Investigate security events and analyze data.
  • Review reported emails for phishing and malware threats.
  • Handle stakeholder requests related to cybersecurity.

Skills

Email Threat Analysis
Data Loss Prevention
Incident Detection and Response
Behavioral Analysis
Proficient in at least one scripting language

Education

Bachelor’s degree in Cybersecurity or related field

Tools

SIEM tools (e.g., Splunk, QRadar)
Forensic suites (e.g., EnCase, Autopsy)
Job description
Overview

Job Purpose The ICE Cybersecurity Digital Forensics and Incident Response (DFIR) team is responsible for defending critical financial infrastructure from Global Cyber threats. This role is suited for both entry-level analysts and experienced engineers, with responsibilities and growth opportunities tailored to each level. You will work alongside experienced professionals to investigate security events, analyze data, and contribute to protection of ICE’s digital assets.

Responsibilities
  • Email Threat Analysis: Review and triage user reported emails to identify phishing attempts, malware delivery, and other malicious content. Take appropriate containment actions and support eradication efforts to prevent recurrence.
  • Data Loss Prevention: Analyze DLP alerts to detect potential data exfiltration or policy violations.
  • Operations: Handle stakeholder requests and enquiries related to cybersecurity operations. Address security concerns by providing guidance, resolving access or policy-related issues, and coordinating with internal teams to ensure timely and secure solutions.
  • Incident Detection and Response: Detect, document, investigate, and resolve security incidents in an efficient manner.
  • Intrusion Detection & Alert Tuning: Monitor security tools and telemetry for signs of compromise. Contribute to tuning detection rules to reduce false positives and improve alert fidelity.
  • Behavioral Analysis: Develop and implement criteria to detect anomalous user behavior that may indicate insider threats or policy violations.
Desirable Knowledge and Experience
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, related technical field, or equivalent practical experience.
  • Exposure to software development environments or financial services is a plus.
  • Hands-on experience with enterprise security tools including SIEM (e.g., Splunk, QRadar), IDS/IPS, forensic suites (e.g. EnCase, Volatility, Autopsy, X-Ways, Magnet Axiom), and malware analysis platforms.
  • Proficient in at least one scripting language (e.g. Python, Bash, PowerShell, JavaScript, etc.)
  • Experience in cloud and container security, including incident response in AWS, Azure, and hybrid environments.
  • Familiarity with MITRE ATT&CK framework and threat intelligence platforms.
  • Demonstrated ability to communicate complex technical findings to both technical and non-technical audiences.
  • Relevant certifications such as GIAC GCFA, GCIA, GCIH, CISSP, or OSCP.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.