Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Operations Senior Associate

JPMorgan Chase & Co.

Singapore

On-site

SGD 80,000 - 100,000

Full time

7 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A global financial services firm in Singapore is seeking a Security Operations Senior Associate in Cybersecurity. In this role, you will enhance cybersecurity measures and respond to threats. Your responsibilities include monitoring security infrastructure, conducting investigations into incidents, and collaborating on security strategies. The ideal candidate will have a diploma in a related field and will possess over 3 years of relevant experience. This position requires a willingness to work flexible shifts and offers opportunities to improve the firm's cybersecurity posture.

Qualifications

  • 3+ years of experience in cybersecurity operations.
  • Advanced knowledge of security protocols and architecture design principles.
  • Proficient in scripting to automate tasks.

Responsibilities

  • Monitor and analyze security infrastructure.
  • Conduct in-depth security investigations.
  • Develop and maintain threat detection and response playbooks.
  • Collaborate with cross-functional teams on security strategies.

Skills

Threat detection
Incident response
Network traffic analysis
Log analysis
Scripting

Education

Diploma in Computer Science, Cybersecurity or related field
Job description

Seize the opportunity to enhance cybersecurity, utilizing your skills in threat analysis and incident response to protect vital data and systems.

As a Security Operations Senior Associate in Cybersecurity & Tech Controls. Cybersecurity Operations, you will play an important role in safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Drawing on your knowledge of security principles, practices, and theories, you will collaborate with cross‑functional teams to develop a coordinated approach to security and educate employees on best practices, policies, and procedures. Your work will have a direct impact on departmental outcomes, as you plan and ensure progress, identify gaps in information, and conduct analyses to solve complex cybersecurity problems. By utilizing your advanced analytical, technical, and problem‑solving skills, you will contribute to the continuous improvement of our cybersecurity posture and help maintain the integrity, confidentiality, and availability of sensitive data and systems.

Job responsibilities
  • Monitor and analyze security infrastructure, contributing to detection and response to threats, vulnerabilities, and incidents to ensure the integrity, confidentiality, and availability of sensitive data and systems
  • Conduct in‑depth security investigations, analyzing logs, network traffic, and other data sources to identify root causes, assess impact, and gather evidence for response and mitigation actions
  • Develop and maintain threat detection and response playbooks, incorporating industry best practices, regulatory requirements, and lessons learned from previous incidents
  • Collaborate with cross‑functional teams to develop and implement coordinated security strategies, policies, and procedures, while educating employees on best practices
Required qualifications, capabilities, and skills
  • Diploma in Computer Science, Cybersecurity or related field
  • 3+ years of experience in cybersecurity operations, including threat detection, incident response, vulnerability management
  • Demonstrated experience in network traffic analysis, log analysis, vulnerability analysis, exploitation, and security investigation techniques to identify and respond to security incidents
  • Proficient in scripting to automate tasks, implement controls, and manipulate data
  • Advanced knowledge of security protocols, cryptography, authentication, authorization, and security architecture design principles
  • Willing to work a scheduled shift pattern that includes one day of the weekend every two weeks or as required. The shift pattern will also require analysts to work up to ten hours a day for four days a week or eight hours a day for five days a week
Preferred qualifications, capabilities, and skills
  • Good knowledge and/or experience with analyzing various logs, e.g. endpoint logs, network logs
  • Good knowledge and/or experience with Cloud architecture and platforms
  • Good understanding of how cyber attacks work
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.