Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Defensive Analyst

SAGL CONSULTING PTE. LTD.

Singapore

On-site

SGD 70,000 - 100,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading consulting firm in Singapore is seeking a Cyber Security Defensive Analyst. The role requires expertise in Threat Hunting and Threat Intelligence, focused on detecting and responding to advanced threats. Responsibilities include conducting threat hunting, developing SIEM use cases, and mentoring junior analysts. Candidates should possess strong analytical and communication skills, with proficiency in SIEM and EDR tools. Basic Mandarin understanding is advantageous. Join a dynamic team in a 24/7 global cyber defense function.

Qualifications

  • Strong hands-on experience in Threat Hunting and Threat Intelligence (endpoint + network).
  • Strong understanding of attack lifecycle, common attack vectors, tools, and techniques.
  • Ability to analyze large data sets to detect anomalies, IOAs, and TTPs.
  • Basic understanding of Mandarin is preferred but not mandatory.

Responsibilities

  • Conduct threat hunting across endpoint and network data to identify anomalies, IOAs, and TTPs.
  • Develop and maintain detection/prevention use cases in SIEM and EDR.
  • Perform triage and technical analysis of alerts, determining scope and remediation actions.
  • Leverage threat intelligence feeds to enrich investigations.
  • Provide clear reports and updates to stakeholders during incidents.
  • Mentor junior analysts in threat hunting and incident response practices.

Skills

Threat Hunting
Threat Intelligence
SIEM (Splunk ES)
EDR (CrowdStrike)
Report Writing
Communication Skills

Tools

Splunk ES
CrowdStrike
Job description

We are looking for a Cyber Security Defensive Analyst with strong expertise in Threat Hunting and Threat Intelligence. You will be responsible for detecting, analyzing, and responding to advanced threats using SIEM and EDR tools, while supporting incident response and proactive defense operations. This role is part of a 24/7 global cyber defense function and requires strong technical, analytical, and communication skills.

Key Responsibilities
  • Conduct threat hunting across endpoint and network data to identify anomalies, IOAs, and TTPs.
  • Develop and maintain detection/prevention use cases in SIEM (Splunk ES) and EDR (CrowdStrike).
  • Perform triage and technical analysis of alerts, determining scope and remediation actions.
  • Leverage threat intelligence feeds (OSINT and premium sources) to enrich investigations.
  • Provide clear reports and updates to stakeholders during incidents.
  • Mentor junior analysts in threat hunting and incident response practices.
Requirements (Must-Have)
  • Strong hands-on experience in Threat Hunting and Threat Intelligence (endpoint + network).
  • Proficient with SIEM (Splunk ES) and EDR (CrowdStrike).
  • Strong understanding of attack lifecycle, common attack vectors, tools, and techniques.
  • Ability to analyze large data sets to detect anomalies, IOAs, and TTPs.
  • Excellent report writing and communication skills (English).
  • Basic understanding of Mandarin is preferred but not mandatory (to support stakeholders in the region).
Good to Have
  • Experience with AI/ML in threat hunting.
  • Exposure to OT/ICS and Cloud security environments.
  • Experience with threat intelligence platforms and premium intel feeds.
  • Relevant certifications (CISSP, GCIH, or similar).
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.