Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Defense SOC Lead Remote

GOOGLE ASIA PACIFIC PTE. LTD.

Remote

SGD 90,000 - 120,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology firm in Singapore is seeking a Cyber Defense SOC Lead to manage incident response activities within a Cyber Defense Center. The successful candidate will collaborate with various teams and utilize advanced security technologies to improve detection capabilities. Ideal applicants should possess a bachelor's degree in Computer Science or Cybersecurity, relevant certifications, and at least five years of experience in security operations. This position offers a chance to work in a dynamic environment focused on protecting customer data and corporate assets.

Qualifications

  • 5 years of experience in SOC analyst or related roles, working with EDR and SIEM technologies.
  • Certification in cybersecurity fields (e.g., CISSP, CEH).
  • Experience in leading incident response activities.

Responsibilities

  • Identify challenges in customer cyber defense centers and implement strategies for improvement.
  • Conduct real-time analysis using SIEM and endpoint technologies.
  • Advise on CDC, CSIRT, and SOC management activities.
  • Research cybersecurity intelligence sources and remediation processes.
  • Develop client relationships to achieve strategic objectives.

Skills

Incident response management
Threat intelligence analysis
Security Operations Center (SOC)
Communication skills

Education

Bachelor's degree in Computer Science or related field

Tools

SIEM
EDR technologies
Job description
Product area

Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation‑state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today’s advanced threats than anyone.

Additional job description

As a Cyber Defense SOC Lead, you will be responsible for enabling efficient and accurate incident response activities and daily tasks within a Cyber Defense Center (CDC). You will collaborate with multiple cross‑functional teams like Security Architects, Security Engineers, Security Analysts, Client Information Technology (IT) resources, and other business resource owners, to define requirements and deliver recommendations focused on incident response activities to support the client's CDC. In addition, you may be responsible for the analysis, response, containment, remediation, and long‑term improvement of a client's Security Operation Center (SOC) in order to maintain and transform incident detection and response capabilities.

In this role, you will work as a member of a highly technical team in a rapidly changing environment, administer a variety of information security technologies, learn new emerging technologies, and be passionate about protecting customer data and corporate assets from the various threats facing multiple industries and regions.

Qualifications
Job responsibilities
  • Identify challenges in customer cyber defense centers and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion.
  • Conduct real‑time analysis using SIEM, endpoint, and network based technologies with a focus on identifying security events and false positives.
  • Advise on CDC, CSIRT, and SOC management activities.
  • Research and leverage cybersecurity intelligence sources, attacker techniques, containment methodologies, and remediation processes to improve Security Operation Center (SOC) incident detection and response capabilities.
  • Develop client relationships with executive stakeholders to achieve project and long term strategic objectives. Engage and collaborate with client stakeholders within the customer environment to drive resolution for security issues.
Minimum qualifications
  • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
  • Certification in one or more of the following: CompTIA Security+; CompTIA Network+; ISC2 (CISSP); SANS‑GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT); CISCO (CCNA); EC‑Council (CEH, LPT).
  • 5 years of experience in SOC analyst, malware research, threat hunting, or similar roles, working with EDR and SIEM technologies.
  • Experience in leading incident response activities and communicating investigation status to the stakeholders.
Preferred qualifications
  • Understanding of operating systems, including Windows and Linux.
  • Understanding of security controls for common platforms and devices, including Windows, Linux and network equipment.
  • Knowledge of scripting languages (i.e., PowerShell and Python).
  • Ability to engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.
  • Excellent written and verbal communication skills.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.