Enable job alerts via email!

Cyber Security Engineer (L2)

INSYGHTS SECURITY PTE. LTD.

Singapore

On-site

USD 60,000 - 100,000

Full time

2 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Join a forward-thinking company as a Cyber Security Engineer, where you'll play a pivotal role in safeguarding digital assets. Your expertise will be crucial in incident investigation, response, and use case development. Collaborate with talented teams, mentor junior analysts, and enhance security protocols using cutting-edge tools. This position offers a dynamic environment where your contributions will directly impact the organization's security posture. If you're passionate about cyber security and ready to take on challenges, this is the opportunity for you!

Qualifications

  • Proficiency in using SIEM tools for incident investigation.
  • Understanding of network protocols and malware behavior.

Responsibilities

  • Perform in-depth analysis of security alerts and investigate suspicious activity.
  • Coordinate containment and recovery efforts for security incidents.

Skills

Incident Investigation
SIEM Tools (Splunk, QRadar, Sentinel)
Network Protocols Understanding
Malware Behavior Knowledge
Forensics Tools Familiarity (Wireshark)
Threat Intelligence Application

Tools

Splunk
QRadar
Sentinel
Wireshark

Job description

Key Responsibilities


As a Cyber Security Engineer, your primary role will be, but are not limited to:


1) Incident Investigation

  • Perform in-depth analysis of security alerts escalated by L1 analysts.
  • Investigate suspicious activity using SIEM, EDR, NDR, firewall and other logs.
  • Use threat intelligence to enrich investigations and identity attacker tactics (MITRE attack, IOC/IOA correlation)

2) Incident response

  • Co-ordinate containment, eradication and recovery efforts for security incidents.
  • Escalate critical incidents to L3 analysts or incident response teams.
  • Participate in incident response planning and post mortems

3) Use Case Tuning and Development

  • Help improve alert fidelity by tuning existing SIEM use cases (reduce false positives).
  • Provide feedback to engineers on detection rule effectiveness

4) Documentation and Reporting

  • Create and maintain incident reports, evidence logs, and case notes.
  • Document playbooks or runbooks for repeatable tasks and incidents

5) Mentoring and Collaboration

  • Assist in training and guiding L1 analysts.
  • Collaborate with IT, threat intelligence, and other security teams

Experience / Requirement :-

  • Proficiency in SIEM tools (Splunk, QRadar, Sentinel, etc.)
  • Understanding of network protocols, malware behavior, and attack lifecycle.
  • Familiarity with forensics tools and packet analysis (e.g., Wireshark).
  • Ability to work with threat intelligence and apply it to real-time investigations.
  • Able to standby after office hours for supporting L1 analysts as well as attending to critical incidents.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.