Job Search and Career Advice Platform

Enable job alerts via email!

MDR Analyst

ACRONIS ASIA RESEARCH AND DEVELOPMENT PTE. LTD.

Singapore

Hybrid

SGD 45,000 - 65,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Singapore is seeking a Junior/Mid MDR Analyst to investigate EDR/XDR incidents and collaborate with senior team members. This role offers opportunities for growth into proactive threat hunting and advanced incident response. Candidates should have 1-3 years experience in security operations, a solid understanding of EDR/XDR, and excellent communication skills. The position is flexible with 5-day/8-hour shifts.

Qualifications

  • 1-3 years of experience in SOC, MDR, or IT security operations.
  • Strong understanding of EDR/XDR operations and security incident workflows.
  • Experience with security tools and interest in automation.

Responsibilities

  • Investigate incoming EDR/XDR incidents with accurate triage.
  • Execute remediation actions following established playbooks.
  • Collaborate with AI engineering to enhance automation.

Skills

Experience in SOC, MDR, or IT security operations
Understanding of EDR/XDR operations
Knowledge of MITRE ATT&CK framework
Log analysis skills
Communication skills

Tools

EDR
SIEM
SOAR
Kibana
Job description

Acronis is revolutionizing cyber protection—providing natively integrated, all-in-one solutions that monitor, control, and protect the data that businesses and lives depend on. We are looking for a Junior/Mid MDR Analyst to join our mission to create a #CyberFit future and protect all data, applications and systems across any environment.

The Junior/Mid MDR Analyst is responsible for investigating and triaging EDR/XDR incidents within the Acronis MDR service. This role focuses on accurate detection analysis, execution of predefined remediation steps, and clear customer communication, while contributing to continuous service improvement.

The analyst will work closely with senior team members and the AI engineering team to enhance automation and integrate Agentic AI capabilities into the MDR workflow. This is a growth-oriented role, with opportunities to advance into proactive threat hunting and advanced incident response.

WHAT YOU’LL DO
  • Investigate incoming EDR/XDR incidents, focusing on accurate triage and severity assessment
  • Execute remediation actions such as workload isolation, following established playbooks
  • Document investigation steps and maintain complete case records
  • Collaborate with AI engineering to test and refine automated triage and response processes
  • Escalate complex incidents to senior analysts, providing relevant context and evidence
  • Support development and refinement of playbooks, automation rules, and incident correlation logic
  • Communicate clearly with customers via email and phone about incident status and recommendations
  • Stay informed about current security threats and attacker techniques
  • Work 5-day/8-hour schedule, with flexibility for morning or afternoon shifts and weekend coverage
WHAT YOU BRING
  • 1–3 years of experience in SOC, MDR, or IT security operations (internships or equivalent experience in SaaS support acceptable for junior level)
  • Strong understanding of EDR/XDR operations and security incident workflows
  • Strong understanding of common attacker's TTPs and MITRE ATT&CK framework in general
  • Fast at logs analysis in Kibana or manual reviews
  • Experience working with security tools (EDR, SIEM, SOAR) and interest in automation technologies
  • Ability to follow structured processes and accurately document findings
  • Strong communication skills and attention to details
  • Good English communication skills for effective customer interactions via email and phone
  • Strong communication skills and attention to details
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.