Overall Function:
You will focus on security threat intelligence, anomaly hunting, digital forensics, and incident response. Leverage your security knowledge and experience with a broad array of tools and techniques to detect and respond to malicious activities. Familiarity with the Cyber Security Act 2018, Cybersecurity Code of Practice (CCoP), MAS Cyber Hygiene, and Technology Risk Management Guidelines is essential. You will work in a highly collaborative environment with cross-functional teams.
Key Responsibilities:
- Conduct research, collect and analyze data, evaluate intelligence; identify patterns and trends; develop appropriate strategies.
- Provide actionable intelligence to detection operations to proactively monitor systems for potential threats.
- Investigate security incidents and conduct data analysis based on findings.
- Proactively hunt for threats, implement identification, containment, and eradication measures, and support recovery efforts.
- Develop, maintain, and enhance threat intelligence processes, procedures, frameworks, libraries, and services.
- Inform internal stakeholders of potential cyber threats by analyzing internal and external intelligence feeds.
- Conduct threat modeling and threat hunting activities.
- Research the latest methods, tools, and trends in digital forensics analysis.
- Handle Tier 2/3 incident escalations from detection operations and assist with real-time, continuous security event monitoring, response, and reporting.
- Conduct forensic investigations internally and externally; collect, preserve, and analyze data and digital evidence.
- Perform forensic examinations on electronic devices, including laptops, desktops, servers, and mobile devices; preserve and analyze data obtained from examinations.
- Write and present routine reports.
Requirements:
- Degree in Computer Science, Computer Engineering, or Information Security-related fields.
- Minimum of 5 years' experience, including at least 2 years in threat intelligence and threat hunting roles, with the remaining in incident response, digital forensics, security operations, or security engineering roles.
- Familiarity with MAS Technology Risk Management Guidelines, MAS Cyber Hygiene Notice, and Cybersecurity Code of Practice.
- In-depth knowledge of current operating environments (Microsoft, UNIX & Linux).
- Strong understanding of networking concepts, including TCP/IP, DNS, HTTP, SMTP.
- Knowledge of cyber threat intelligence processes and tradecraft.
- Understanding of Advanced Persistent Threat (APT) actors and their Tactics, Techniques, and Procedures (TTPs).
- Familiarity with frameworks like Lockheed Martin Cyber Kill Chain, STRIDE, and MITRE ATT&CK.
- Experience with research tools such as Autopsy, Belkasoft RAM Capturer/DumpIt/Comae Memory Toolkit, EnCase, FTK, Volatility, Wireshark.
- Proficiency in programming languages like Python and PowerShell.
- Cloud computing knowledge/experience is highly advantageous.
- Positive attitude and growth mindset.
- Excellent written, verbal communication, and presentation skills; comfortable with public speaking and presenting to senior leadership.
- Certifications such as OSCP, GCTI, GPEN, GCIA, GCIH, GCFA, GCFE, GCNFA, or GREM are highly desirable.