Enable job alerts via email!

Security Engineer

ITCAN PTE. LIMITED

Singapore

On-site

SGD 60,000 - 80,000

Full time

Yesterday
Be an early applicant

Job summary

A leading cybersecurity firm in Singapore is looking for a Systems Specialist to support various cybersecurity functions. Responsibilities include threat hunting, researching vulnerabilities, and collaborating with cybersecurity teams. Candidates should have knowledge of application and network security, problem-solving skills, and proficiency in Microsoft Office. Relevant certifications are a plus. This role may require availability beyond standard business hours.

Qualifications

  • Knowledge of application security and HTTP response code interpretation.
  • Willingness to learn and adapt.

Responsibilities

  • Support various cybersecurity functions and stay updated on threats.
  • Conduct research on emerging threats and vulnerabilities.
  • Perform proactive threat hunting exercises.
  • Document findings and generate reports.
  • Develop and tune security monitoring rules.
  • Collaborate with cybersecurity teams to share findings.
  • Monitor and collect information from various sources.
  • Analyze threat intelligence data for patterns and trends.

Skills

Application security knowledge
Network security best practices
Understanding of cyber threats
Problem-solving skills
Proficiency in Microsoft Office

Education

Relevant cybersecurity certifications (CCNA, CCNP, CISSP)

Tools

SIEM tools
Network traffic analysis tools
EDR systems
Vulnerability management systems
Threat intelligence platforms

Job description

Roles & Responsibilities

As a Systems Specialist, you will be supporting various cybersecurity functions, including:

  1. Staying updated with the latest vulnerabilities, security trends, and techniques in cyber threats and hacking methodologies.
  2. Conducting research on emerging threats and vulnerabilities, and providing recommendations to enhance the organization's security posture.
  3. Performing proactive threat hunting exercises to identify and investigate potential security incidents and suspicious activities within the network.
  4. Documenting all findings, analysis, recommendations, and investigation results clearly, and generating reports for management and stakeholders.
  5. Developing and tuning security monitoring rules, correlation logic, and detection signatures.
  6. Utilizing various security technologies, including SIEM tools, network traffic analysis tools, EDR systems, vulnerability management systems, and threat intelligence platforms.
  7. Collaborating with other cybersecurity teams, such as incident response, security operations, and threat intelligence, to share findings and coordinate investigations.
  8. Developing and implementing a cyber intelligence framework to systematically collect, process, and leverage intelligence for cybersecurity decision-making.
  9. Integrating the cyber intelligence framework with the SOC and incident response teams to effectively detect, prevent, and respond to threats.
  10. Monitoring and collecting information from sources like threat feeds, security vendors, dark web forums, and social media to identify emerging threats.
  11. Analyzing threat intelligence data to identify patterns, trends, and risks.
  12. Prioritizing and triaging threats based on relevance and potential impact.
  13. Conducting in-depth analysis of threat actors, their tactics, and motivations, and providing insights on potential risks.
  14. Producing reports, briefings, and alerts on threats, trends, and risks for stakeholders, including technical details for cybersecurity teams and executive summaries for management.
  15. Providing intelligence support during security incidents to help incident response teams understand threats and guide containment and remediation efforts.
  16. Supporting vulnerability management by analyzing threat data to identify vulnerabilities and exploit trends, aiding in patching and mitigation.
  17. Collaborating with threat hunters and cybersecurity teams to refine threat hunting strategies based on intelligence insights.

Qualifications

  1. Fundamental knowledge of application security, including interpretation of HTTP response codes and WAF violations.
  2. Understanding of network security best practices.
  3. Knowledge of cyber threats and hacking methodologies.
  4. Strong problem-solving skills and ability to work under pressure; willingness to learn.
  5. Proficiency with Microsoft Office products like Word and Excel.
  6. Additional certifications such as CCNA, CCNP, CISSP are a plus.
  7. Ability to work beyond business hours, including weekends, when necessary.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.