Enable job alerts via email!

Security Operations Analyst (1 year contract)

CERTIS GROUP - GHR

Singapore

On-site

SGD 55,000 - 75,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading security firm in Singapore is seeking a cybersecurity professional to monitor and respond to security threats. The ideal candidate should possess a Bachelor's degree in Computer Science and have 2-4 years of experience in a SOC or incident response role. Proficiency with SIEM tools and knowledge of threat frameworks is essential. This role offers an opportunity to contribute to safeguarding critical infrastructure.

Qualifications

  • 2–4 years of experience in a SOC or similar role.
  • Strong understanding of networking concepts and operating systems.
  • Familiarity with threat frameworks like MITRE ATT&CK and NIST.

Responsibilities

  • Manage IT policies related to Information Security and Cybersecurity.
  • Monitor SIEM systems for suspicious activities.
  • Conduct vulnerability assessments and patch management.

Skills

Incident response
Security analysis
Communication
Forensics knowledge
Scripting (Python, PowerShell, Bash)

Education

Bachelor’s degree in Computer Science or Information Security

Tools

SIEM tools (Splunk, QRadar)
Endpoint management tools (Microsoft Intune, Trendmicro)
Job description
Summary

The ideal candidate will be responsible for monitoring, detecting, analyzing, and responding to security threats across our infrastructure. This role plays a critical part in safeguarding the confidentiality, integrity, and availability of our systems and data.

Responsibilities
  • Review and manage IT policies and procedures as it relates to Information Security and Cybersecurity operations within the organisation.
  • Monitor security information and event management (SIEM) systems for suspicious activity.
  • Investigate and respond to security alerts, incidents, and breaches.
  • Conduct root cause analysis and recommend mitigation strategies.
  • Collaborate with IT, engineering, and third parties on incident response and remediation.
  • Develop and maintain standard operating procedures (SOPs) and incident runbooks.
  • Analyze threat intelligence feeds and incorporate them into detection strategies.
  • Maintain logs, reports, and documentation in accordance with regulatory and compliance requirements.
  • Perform regular vulnerability assessments and assist in patch management initiatives.
  • Participate in red team/blue team exercises and tabletop simulations.
  • Stay up to date on the latest cyber threats, trends, and best practices.
Requirements
  • Bachelor’s degree in Computer Science, Information Security, or related field; or equivalent work experience.
  • 2–4 years of experience in a SOC, security analysis, or incident response role.
  • Strong understanding of networking concepts, operating systems, and cloud environments.
  • Proficiency with SIEM tools (e.g., Splunk, QRadar, LogRhythm), IDS/IPS.
  • Knowledge and proficiency in working with endpoint management concepts and tooling (such as Microsoft Intune and Trendmicro Worry Free).
  • Knowledge and experience in relation to forensics and investigation highly regarded.
  • Familiarity with threat frameworks such as MITRE ATT&CK, NIST, and CIS Controls.
  • Familiarity with Australian specific security standards and frameworks such as essential 8 and SOCI.
  • Experience with scripting (Python, PowerShell, or Bash) is a plus.
  • Strong communication and documentation abilities.
  • Working with partners and vendor relationships who provide the organisation with specialist services (such as monitoring and forensics).
  • Security certifications (e.g., CompTIA Security+, CEH, GCIH, GCIA, or CISSP) is an advantage.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.