Job Search and Career Advice Platform

Enable job alerts via email!

Cybersecurity Incident Responder - (EL-FNP250819 008/01)

Xcellink Pte Ltd

Singapore

On-site

SGD 80,000 - 120,000

Full time

30+ days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm in Singapore seeks a candidate to lead responses to cybersecurity incidents, including malware and data breaches. Responsibilities include conducting threat analysis, developing incident response plans, and working with various security tools. The ideal candidate has strong expertise in incident response and threat hunting, along with proficiency in SIEM tools like Elastic and Splunk.

Qualifications

  • Strong expertise in incident response, threat hunting, and forensic analysis.
  • Experience with SIEM tools like Elastic and Splunk.
  • Proficiency in network security, malware analysis, and log analysis.

Responsibilities

  • Lead the response to cybersecurity incidents like malware infections and data breaches.
  • Perform real-time and retrospective analysis of security events.
  • Develop and document incident response plans and playbooks.

Skills

Incident response
Threat hunting
Forensic analysis
SIEM tools
Network security
Malware analysis
Log analysis
Cloud security
Scripting (Python, PowerShell, Bash)
Communication skills

Tools

Elastic
Splunk
AWS Guard Duty
Azure Sentinel
Google Chronicle
Job description
  • Lead the response to cybersecurity incidents, including malware infections, data breaches, and insider threats.
  • Perform real-time and retrospective analysis of security events to identify threats Coordinate with MSSP Security Operations Centre (SOC) teams for monitoring and alerting.
  • Develop and document incident response plans and playbooks.
  • Should be expertise on handling the incidents end to end.
  • Conduct proactive threat hunting to identify unknown threats.
  • Perform digital forensic analysis on compromised systems to determine root causes.
  • Use forensic tools to collect and analyse logs, memory dumps, and disk images.
  • Work with SIEM (Security Information and Event Management) tools to detect anomalous behaviour.
  • Analyse logs from firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, and cloud security tools.
  • Improve detection capabilities by tuning security alerts and developing new rules.
  • Recommend and implement security controls to reduce exposure.
  • Provide technical leadership to junior incident responders and security analysts
  • Strong expertise in incident response, threat hunting, and forensic analysis.
  • Experience with SIEM tools (e.g., Elastic, Splunk).
  • Proficiency in network security, malware analysis, and log analysis.
  • Familiarity with cloud security (AWS, Azure, GCP) and container security.
  • Experience with cloud security tools and AI-powered security analytics (AWS Guard Duty, Azure Sentinel, Google Chronicle).
  • Familiarity with AI/ML-driven anomaly detection and behavioural analysis techniques.
  • Knowledge of security solutions ( EDR,XDR,NDR,WAF,Proxy,Firewall,Email Security).
  • Scripting and automation skills (Python, PowerShell, Bash).
  • Deep understanding of MITRE ATT&CK framework, cyber kill chain, and machine learning models for cybersecurity applications.
  • Excellent communication and report-writing skills and ability to work under pressure scenarios
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.