Job Search and Career Advice Platform

Enable job alerts via email!

Cybersecurity Engineer

LINKTRIX CONSULTANTS PTE. LTD.

Singapore

On-site

SGD 50,000 - 70,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity consultant firm in Singapore is seeking a Security Operations and Implementation professional to monitor security alerts, respond to incidents, and manage security tools. The ideal candidate holds a Bachelor's degree in Cybersecurity or a similar field and has 1-3 years of relevant experience. This dynamic role supports effective incident management and enhances cybersecurity measures across the organization.

Qualifications

  • Bachelor's degree or equivalent practical experience in a relevant field.
  • 1-3 years of experience in cybersecurity engineering or security operations.
  • Hands-on experience with SIEM and other cybersecurity tools.

Responsibilities

  • Monitor security alerts and assess potential threats.
  • Investigate and analyze security incidents.
  • Collaborate with the incident response team.
  • Document incident reports and maintain compliance.
  • Conduct vulnerability assessments and penetration testing.

Skills

Security monitoring
Incident response
Threat analysis
Log management
Cybersecurity tools

Education

Bachelor's degree in Cybersecurity, Computer Science, or Information Technology

Tools

SIEM (e.g., Splunk, Sentinel)
2FA solutions (e.g., Duo, Okta)
DLP solutions (e.g., Microsoft Purview, Symantec, Forcepoint)
Job description
Security Operations and Implementation
  • Continuously monitor security alerts and events generated by security tools (SIEM, IDS/IPS, firewalls, etc.) to identify and assess potential threats.
  • Investigate and analyze security incidents to determine severity, scope, and potential impact on systems and networks.
  • Escalate suspicious activities or confirmed security incidents to senior analysts or the incident response team for further investigation and containment.
  • Respond to security incidents in alignment with established procedures, ensuring timely containment, mitigation, and recovery.
  • Collaborate with the incident response team to thoroughly investigate, analyze, and resolve security breaches and data loss incidents.
  • Document and maintain incident reports, ensuring accuracy and compliance with internal policies and regulatory standards.
  • Utilize threat intelligence feeds to stay informed about emerging threats, attack vectors, and adversary tactics, techniques, and procedures (TTPs).
  • Correlate and analyze data from multiple security sources to identify vulnerabilities, misconfigurations, or unauthorized access attempts.
  • Conduct in-depth analysis of logs, network traffic, and system behavior to detect anomalies, policy violations, or malicious activity.
  • Manage and maintain log data in accordance with internal security policies and regulatory requirements.
  • Operate and fine-tune a range of security tools, including SIEM platforms, IDS/IPS, firewalls, antivirus software,and endpoint detection and response (EDR) systems.
  • Ensure the security operations center (SOC) infrastructure remains effective and up to date by keeping pace with evolving security technologies and best practices.
  • Work closely with infrastructure teams (network, system, and cloud) to implement security controls and recommend remediation strategies.
  • Contribute to security implementation efforts, including onboarding of new technologies, tool integrations, and automation workflows.
  • Support F2A (File to Alert) use case development and tuning to enhance detection capabilities and reduce false positives.
  • Participate in vulnerability assessments and periodic penetration testing activities to proactively identify and mitigate risks.
Qualifications & Requirements
Education:
  • Bachelor's degree in Cybersecurity,Computer Science, Information Technology, or a related field, or equivalent practical experience.
Experience:
  • 1-3 years of experience in cybersecurity engineering or security operations roles.
  • Hands‑on experience implementing and managing SIEM (e.g., Splunk, Sentinel), 2FA (e.g., Duo, Okta), and DLP/EDM solutions (e.g., Microsoft Purview, Symantec, Forcepoint).
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.