Enable job alerts via email!

Security Operations Analyst (1 year contract)

CERTIS GROUP - GHR

Singapore

On-site

SGD 50,000 - 70,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A technology services company in Singapore is looking for a Security Operations Analyst for a 1-year contract. The role involves monitoring and responding to security incidents, developing security policies, and collaborating with various teams. Candidates should have a bachelor's degree in IT, 2-4 years of experience in security operations, and familiarity with SIEM tools. This position focuses on safeguarding the organization's systems and data.

Qualifications

  • 2–4 years of experience in SOC, security analysis, or incident response.
  • Familiarity with threat frameworks like MITRE ATT&CK.
  • Security certifications like CompTIA Security+, CEH, or CISSP.

Responsibilities

  • Review and manage IT security policies and procedures.
  • Monitor SIEM systems for suspicious activity.
  • Investigate and respond to security alerts and incidents.
  • Conduct root cause analysis and recommend strategies.

Skills

Network concepts
SIEM tools
Cloud environments
Scripting (Python, PowerShell, Bash)
Communication skills

Education

Bachelor’s degree in Computer Science or related field

Tools

Splunk
QRadar
LogRhythm
Microsoft Intune
Job description
Security Operations Analyst (1 year contract)

The ideal candidate will be responsible for monitoring, detecting, analyzing, and responding to security threats across our infrastructure. This role plays a critical part in safeguarding the confidentiality, integrity, and availability of our systems and data.

Responsibilities
  • Review and manage IT policies and procedures related to Information Security and Cybersecurity operations within the organization.
  • Monitor security information and event management (SIEM) systems for suspicious activity.
  • Investigate and respond to security alerts, incidents, and breaches.
  • Conduct root cause analysis and recommend mitigation strategies.
  • Collaborate with IT, engineering, and third parties on incident response and remediation.
  • Develop and maintain standard operating procedures (SOPs) and incident runbooks.
  • Analyze threat intelligence feeds and incorporate them into detection strategies.
  • Maintain logs, reports, and documentation in accordance with regulatory and compliance requirements.
  • Perform regular vulnerability assessments and assist in patch management initiatives.
  • Participate in red team/blue team exercises and tabletop simulations.
  • Stay up to date on the latest cyber threats, trends, and best practices.
Requirements
  • Bachelor’s degree in Computer Science, Information Security, or related field; or equivalent work experience.
  • 2–4 years of experience in a SOC, security analysis, or incident response role.
  • Strong understanding of networking concepts, operating systems, and cloud environments.
  • Proficiency with SIEM tools (e.g., Splunk, QRadar, LogRhythm), IDS/IPS.
  • Knowledge and proficiency in working with endpoint management concepts and tooling (such as Microsoft Intune and Trendmicro Worry Free).
  • Knowledge and experience in relation to forensics and investigation highly regarded.
  • Familiarity with threat frameworks such as MITRE ATT&CK, NIST, and CIS Controls.
  • Familiarity with Australian specific security standards and frameworks such as essential 8 and SOCI.
  • Experience with scripting (Python, PowerShell, or Bash) is a plus.
  • Strong communication and documentation abilities.
  • Working with partners and vendor relationships who provide the organization with specialist services (such as monitoring and forensics).
  • Security certifications (e.g., CompTIA Security+, CEH, GCIH, GCIA, or CISSP) is an advantage.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.