Job Search and Career Advice Platform

Enable job alerts via email!

Security/ SOC Analyst (MNC)

PEOPLE PROFILERS PTE. LTD.

Singapore

On-site

SGD 80,000 - 100,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Singapore seeks a skilled incident response analyst. This role involves monitoring and analyzing security alerts, conducting forensic analysis, and mentoring junior staff. The ideal candidate holds a degree in a relevant field and has hands-on experience with SIEM tools, network protocols, and incident response processes. Strong analytical and communication skills are essential. Apply now to join our dedicated team in protecting critical infrastructure.

Qualifications

  • Hands-on experience with SIEM tools and security monitoring.
  • Solid understanding of network protocols and operating systems.
  • Experience in malware analysis and incident response processes.

Responsibilities

  • Monitor and triage security alerts from SIEM to identify incidents.
  • Conduct analysis of security events for impact and remediation.
  • Mentor junior analysts on incident handling and best practices.

Skills

Analytical skills
Problem-solving skills
Communication skills

Education

Degree in Computer Science, Information Security, or related field

Tools

Splunk
QRadar
Elastic
Job description
Responsibilities
  • Monitor and triage security alerts from SIEM platforms to identify potential incidents.
  • Conduct in-depth analysis of security events to determine impact, scope, and remediation steps.
  • Contain, mitigate, and recover systems affected by cybersecurity incidents.
  • Collaborate with threat intelligence teams to correlate indicators of compromise (IoCs) and emerging threats.
  • Perform threat hunting using OSINT and internal telemetry data to proactively identify risks.
  • Execute forensic analysis on compromised endpoints, networks, and applications.
  • Maintain and update incident documentation, including timelines, actions, and lessons learned.
  • Coordinate with internal stakeholders and business units during active incidents to ensure timely response.
  • Participate in 24/7 SOC rotation shifts and provide coverage for follow-the-sun operations.
  • Mentor junior analysts on incident handling procedures, threat analysis, and security best practices.
Requirements
  • Degree in Computer Science, Information Security, or related technical field.
  • Hands-on experience with SIEM tools (e.g. Splunk, QRadar, Elastic) and security monitoring.
  • Solid understanding of network protocols, operating systems, malware analysis, and incident response processes.
  • Strong analytical, problem-solving, and communication skills; ability to work calmly under pressure.

Please submit your updated resume in Word format by using theApply Now Button.
We regret that only shortlisted candidates will be notified.
Email resume token.ng@peopleprofilers.com

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.