Senior IT Security Analyst (Ref 26070)
Jobline Resources Pte Ltd
Singapore
On-site
SGD 80,000 - 120,000
Full time
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
Job summary
An established industry player is seeking a seasoned IT Security Manager to lead their incident response team. In this pivotal role, you will oversee the entire incident response lifecycle, ensuring effective detection, analysis, and resolution of security incidents. You will collaborate with various stakeholders, develop advanced threat detection strategies, and foster a culture of continuous improvement within your team. If you have a passion for cybersecurity and a knack for leadership, this is an exciting opportunity to make a significant impact in a dynamic environment.
Qualifications
- 8+ years in IT security with 4+ years in SOC, focusing on incident response.
- Proven leadership in managing incident response and threat hunting.
- Experience with AI and automation in security operations.
Responsibilities
- Oversee incident response lifecycle from detection to resolution.
- Develop incident response playbooks and coordinate with stakeholders.
- Conduct post-incident reviews and enhance threat detection strategies.
Skills
Incident Response
Threat Hunting
Security Operations
Digital Forensics
AI and Automation
Leadership
Communication Skills
Vulnerability Management
Scripting and Automation
Education
Degree in Information Systems
Degree in Computer Science
Degree in Cybersecurity
Tools
SIEM
EDR
Data Visualization Tools
SOAR
Network Security Assessment Tools
Responsibilities
- Oversee the entire incident response lifecycle from detection to resolution.
- Lead investigations of IT security incidents, ensuring thorough root cause analysis and remediation.
- Develop and maintain incident response playbooks and procedures.
- Coordinate with internal, external stakeholders, and vendors during incidents.
- Conduct post-incident reviews and report findings to management.
- Develop and implement advanced threat detection and monitoring strategies.
- Utilize SIEM, EDR, and other security tools for timely incident detection.
- Perform threat hunting and proactive security assessments.
- Collaborate with IT teams to deploy and optimize security solutions.
- Integrate AI and automation technologies to enhance security operations.
- Develop automated workflows and scripts for incident response and routine tasks using SOAR.
- Leverage machine learning and AI-driven tools for threat detection and analysis.
- Stay updated with advancements in AI and evaluate their applicability to security operations.
- Apply system design thinking to security solutions.
- Analyze and compile statistics on threats relevant to the Institute, and prepare reports for stakeholders using data visualization tools.
- Evaluate and integrate new technologies to enhance security operations.
- Foster a culture of continuous improvement and encourage professional development within the team.
- Enhance the team's digital forensics capabilities by developing procedures, training team members, and overseeing evidence collection and analysis.
- Collaborate with legal and compliance teams to ensure regulatory alignment.
- Conduct regular drills and simulations to ensure forensic readiness.
Requirements
- Degree in Information Systems, Computer Science, Cybersecurity, or a related field.
- Professional certifications in incident handling and security analysis are preferred (e.g., GCIH).
- Minimum of 8 years of progressive experience in IT security, focusing on incident response, with at least 4 years in a SOC environment and proven leadership capabilities.
- Intermediate knowledge of security operations, incident analysis, vulnerability management, system patching, log analysis, intrusion detection, and firewall administration.
- Proven experience in managing incident response, threat hunting, and integrating AI and automation in security operations using SOAR.
- Proficiency in SIEM, EDR, traffic analysis, digital forensics, and cloud security.
- Experience with Blue/Purple teaming, firewall, IPS, WAF, virtualization, and cloud technologies.
- Knowledge of Linux/Windows/Database technologies is preferred.
- Strong understanding of industry standards and security policy frameworks.
- Hands-on scripting and automation skills to improve security operations.
- Ability to conduct gap analysis and recommend improvements.
- Experience in threat environment evaluation and acting as a subject matter expert.
- Continuous improvement of event correlation and alerting processes.
- Experience with network security assessment tools.
- Excellent leadership, team management, and communication skills, capable of interacting with stakeholders at all levels.
- Ability to drive strategic initiatives, lead change, and think critically under pressure.
- Skill in interviewing stakeholders to gather business requirements and providing guidance on response plans.
Licence no: 12C6060