Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Analyst

Alphaeus Pte. Ltd.

Singapore

On-site

SGD 70,000 - 90,000

Full time

12 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm in Singapore is seeking a skilled Threat Hunter to join their Security Operations team. The role involves proactive threat hunting and analysis, utilizing advanced methodologies and tools to detect and neutralize threats. The ideal candidate will have at least 3 years of experience in cybersecurity, strong analytical skills, and proficiency in scripting. Familiarity with security tools and technologies is essential for this role.

Qualifications

  • 3+ years of experience in cybersecurity, with 1-2 years in threat hunting.
  • Strong understanding of operating systems (Windows, Linux, macOS).
  • Experience with threat intelligence platforms and feeds.

Responsibilities

  • Conduct proactive threat hunting across various environments.
  • Analyze security logs and network traffic to identify threats.
  • Develop scripts to automate threat hunting processes.

Skills

Threat Hunting
Analytical Skills
Communication Skills
Scripting (Python, PowerShell)

Education

Bachelor's degree in Computer Science, Cybersecurity, or related field

Tools

SIEM
EDR/XDR Solutions
Network Monitoring Tools
Job description

We are seeking a skilled and experienced Threat Hunter to work in the Security Operations team. The ideal candidate should be a proactive and resourceful individual with a passion for identifying and neutralizing advanced threats to strengthen the company's defenses. This role requires a deep understanding of threat hunting methodologies, a strong analytical mindset, and exceptional communication skills. The role is expected to potentially work overtime in the event of responding to Security Incident to accommodate and manage Group’s Threat Intelligence services/program.

Key Responsibilities
Threat Hunting and Analysis

Conduct proactive threat hunting activities across various environments (endpoints, networks, cloud).

Develop and maintain threat hunting hypotheses based on current threat intelligence and organizational risk assessments.

Apply structured threat hunting methodologies leveraging frameworks such as MITRE ATT&CK, PEAK, TAHITI, THMM and Diamond Model to guide hypothesis creation, evidence collection and iterative improvements.

Deep technical knowledge of adversary tactics, malware analysis, intrusion detection and cloud security.

Tooling and Automation

Familiar with EDR/XDR solutions, SIEM platform, data pipeline and threat hunting tooling to detect and disrupt adversary tactics.

Develop custom scripts and tools to automate threat hunting processes and improve efficiency.

Leverage various threat hunting techniques, including but not limited to, YARA rules, IOC analysis, and behavioral based analysis.

Analyze security logs, network traffic, and endpoint data to identify malicious activity and potential threats.

Investigate security incidents and provide detailed reports on findings, including root cause analysis and remediation recommendations.

Collaborate with other security teams (incident response, vulnerability management, etc.) to share threat intelligence and coordinate security efforts.

Develop and manage Cyber Threat Intelligence while staying up to date on the latest threat landscape, attack techniques, and emerging technologies.

Map advisory behaviors to ATT&CK techniques and translate findings into actionable intelligence.

Share actionable intelligence with internal teams and external stakeholders.

Present findings and recommendations to technical and executive audiences.

Contributes to the development and improvement of threat hunting strategies, processes and playbooks aligning with PEAK and TAHITI cycles for structural threat hunting.

Develop and maintain a strong understanding of the organization's infrastructure and applications to strengthen awareness of evolving threats and adversary behavior.

Drive maturing of the overall security operations service.

Qualifications & Skill
Required
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field.
  • At least 3+ years of experience in cybersecurity, with a minimum of 1-2 years focused on threat hunting.
  • Strong understanding of various operating systems (Windows, Linux, macOS).
  • Experience with various security tools and technologies (SIEM, EDR, network monitoring tools).
  • Proficiency in scripting (Python, PowerShell).
  • Strong analytical and problem-solving skills.
  • Excellent communication and presentation skills to translate technical findings into business impact.
Preferred
  • Experience with threat intelligence platforms, feeds and CTI frameworks.
  • Relevant security certifications (e.g., SANS GIAC, GNFA, GCFA, Offensive Security, etc)
  • Experience with cloud platforms (AWS, Azure, GCP) and container security is a plus.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.