Enable job alerts via email!

Incident Response Specialist (12-months Contract)

Argyll Scott Singapore

Singapore

On-site

SGD 60,000 - 90,000

Full time

Today
Be an early applicant

Job summary

A leading financial services organization in Singapore is seeking a mid-level cybersecurity professional. This role involves identifying and mitigating malware threats in a dynamic environment. Candidates should have 3-5 years of experience in malware analysis and incident response. The position requires strong investigative skills and collaboration with incident response teams. Interested applicants should send their application to AviralBhargava@argyllscott.sg.

Qualifications

  • 3-5 years of relevant experience in threat prevention disciplines.
  • Strong investigative mindset and ability to implement control enhancements.
  • Experience with phishing detection and email security.

Responsibilities

  • Respond and adapt to real-time malware threats.
  • Perform static and dynamic analysis of malware.
  • Collaborate with response teams to mitigate emerging threats.

Skills

Malware analysis
Incident response
Triage and threat prioritization
Investigation skills

Tools

Process Monitor
Wireshark
Fiddler
Job description
Role Overview

We are seeking a mid-level cybersecurity professional to join a leading financial services organization’s advanced threat defense team. The role focuses on identifying, analyzing, and mitigating malware threats across multiple platforms, helping to protect the organization and its clients. The ideal candidate will work in a dynamic, high-stakes environment where investigative skills, technical expertise, and collaboration with incident response teams are essential to maintain robust cybersecurity defenses.

Key Responsibilities
  • Respond, triage, and adapt to real-time threats targeting the organization through the lens of malware delivery and execution.
  • Perform static, dynamic, and behavioral analysis of malicious software and potential indicators of compromise.
  • Maintain detailed documentation regarding analysis findings and producing comprehensive reports encompassing observations, actions taken, and recommendations.
  • Identify cyber risks and help develop improvements to controls and detection mechanisms.
  • Collaborate with response teams to defend against emerging threats and contribute to Incident Response efforts.
Key Requirements
  • Mid-level candidates with malware analysis and incident response experience.
  • Specific experience with triaging detections, prioritizing threats, performing static and dynamic analysis, identifying security gaps, and implementing preventative measures.
  • Candidates should have a very strong investigative mindset with an ability to drive process changes and implement control enhancements.
  • Candidates typically should have 3-5 years of relevant experience in one or more threat prevention disciplines focusing on Email, Web, or Endpoint.
Preferred Skillset
  • Understanding of browser exploitation techniques
  • Familiarity of web based technologies such as Javascript or HTML and how they are commonly abused by various threat actors or techniques.
  • Experience with reviewing and analyzing Email Headers.
  • Experience with detecting phishing and other common email threats.
  • SIEM experience with event correlation and searching.
  • Experience with dynamic analysis tools such as Process Monitor, FakeDNS, Regshot, or Wireshark.
  • Familiarity with use and interpretation of malware analysis results from sandbox technologies.
  • Technical experience and ability to operate and maintain a virtualized sandbox environment.
  • Familiarity with URL categorization and analysis tools like Fiddler, commercial sandbox, or web proxy technologies.
  • Ability to assess files or URLs and extract Indicators of Compromise (IoCs) such as malicious domains, IPs, and file hashes.
  • Experience with documentation and ability to clearly articulate thoughts to a wide variety of intended audiences (teammates, technical, non-technical, leadership, etc.).
  • Knowledge of Endpoint Detection and Response (EDR) tools
  • Knowledge of forensic artifacts such as Browser, Registry, or Event Log artifacts.
Nice to have
  • 3+ years of experience conducting end to end Malware analysis specifically around either Email, Web, or Endpoint.
Desired Certifications
  • GCIH, GREM, GCFA, GCFE, CFCE, or CISSP

If this role aligns with your experience and career goals, please send your application to AviralBhargava@argyllscott.sg.

Argyll Scott Asia is acting as an Employment Business in relation to this vacancy.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.