Enable job alerts via email!

Cyber Defence Center Analyst

StarHub

Singapore

On-site

SGD 60,000 - 80,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A major telecommunications provider in Singapore seeks a CDC Analyst to monitor security alerts and manage security incidents. The ideal candidate has a degree in Computer Science or a related field, along with 3-4 years of experience in a SOC. The role requires knowledge of SIEM tools, advanced problem-solving skills, and the ability to work in a fast-paced environment. This position offers exposure to both security threats and incident response strategies.

Qualifications

  • 3-4 years of experience in a SOC or similar security role.
  • Advanced knowledge of network protocols and security technologies.
  • Familiarity with compliance standards and regulations.

Responsibilities

  • Monitor security alerts and events using SIEM and SOAR tools.
  • Perform initial triage of security incidents.
  • Develop and implement incident response strategies.

Skills

Problem-solving skills
Critical thinking
Analytical ability
Communication skills
Interpersonal skills

Education

Bachelor/Diploma in Computer Science or related field

Tools

SIEM
SOAR
EDR
Firewalls
Threat intelligence platforms
Job description
Location

Starhub (Kuala Lumpur)

Reports To

CDC Manager

Job Summary

The CDC Analyst is responsible for monitoring and triaging security alerts, performing initial investigations and in-depth analysis of security incidents. He is to ensure the timely response and resolution of the security incidents to ensure the confidentiality, integrity, and availability of the organization's information systems and data.

Key Responsibilities
  • Perform 12 hours shift, day or night shift in 24 X 7 to Monitor security alerts and events using SIEM, SOAR tools and other monitoring systems.
  • Perform initial triage of security incidents to determine their severity and potential impact.
  • Utilize advanced tools and techniques to identify, analyze, and mitigate threats.
  • Develop and implement incident response strategies and coordinate with relevant teams.
  • Create and maintain documentation for incident responses, including post-incident reports.
  • Participate in regular threat intelligence and security briefings to stay informed of emerging threats.
  • Assist in updating and refining incident response playbooks and SOPs.
Requirements
  • Bachelor/Diploma in Computer Science, Information Security, or a related field (or equivalent experience).
  • 3-4 years of experience in a SOC or similar security role.
  • Advanced knowledge of network protocols, operating systems, and security technologies.
  • Familiarity with network and system compliance to recognised standards and regulations.
  • Proficiency with SIEM, SOAR, EDR, firewall and threat intelligence platforms.
  • Candidates with relevant certifications (CEH, CISA, GCIH) will be considered favourably.
  • Candidates will telecom and cloud knowledge will be considered favourably.
Interpersonal
  • Must be independent, resourceful, pro-active, Strong problem-solving skills, critical thinking, excellent analytical ability, strong judgment and the ability to deliver high performance and high levels of customer satisfaction.
  • Have good communication and interpersonal skills.
  • Willing to travel between Singapore and Malaysia occasionally
  • Results-oriented with strong customer focus. Positive mind to face challenges.
  • Demonstrate adaptability with desire to learn new technologies and systems.

To APPLY NOW, click on Skye!

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.