Job Search and Career Advice Platform

Enable job alerts via email!

Senior SOC Analyst

Good Job Creations (Singapore) Pte Ltd

Singapore

On-site

SGD 90,000 - 130,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity company in Singapore is seeking an experienced candidate to specialize in detection engineering. The role requires strong expertise in designing detection rules, threat hunting across hybrid environments, and leading incident responses. Ideal candidates will have 8–10 years in SOC/MSSP settings and deep knowledge of various SIEM and EDR platforms. Suitable candidates will excel in communication and possess a SANS certification. This opportunity promises a dynamic work environment and the chance to engage with clients.

Qualifications

  • 8–10+ years in SOC/MSSP environments with deep expertise in SIEM and EDR.
  • Hands‑on experience with SOAR platforms and scripting (shell, Python).
  • Strong grasp of threat detection and cyber TTPs.

Responsibilities

  • Design and fine-tune detection rules across various platforms.
  • Proactively hunt for threats across hybrid environments.
  • Lead investigations during security incidents.

Skills

Detection rule design
Threat hunting
Incident response leadership
Communication skills

Education

SANS certification (e.g., GCIH)

Tools

Splunk
QRadar
Sentinel
Devo
CrowdStrike
Defender
Job description

[Job ID:1020861]

What You’ll Do
Detection Engineering
  • Design and fine-tune high-fidelity detection rules across SIEMs (Splunk, Sentinel, Devo, QRadar) and EDR platforms.
  • Build custom use cases based on MITRE ATT&CK and red team insights.
  • Eliminate false positives, improve alert accuracy, and continuously optimize detection logic.
  • Collaborate with red/purple teams to validate and evolve detection strategies.
Threat Hunting & Intelligence
  • Proactively hunt for threats across hybrid environments using telemetry from SIEM, EDR, and NDR tools.
  • Leverage threat intelligence and frameworks (MITRE, Diamond Model) to build and execute targeted hunting campaigns.
  • Analyze and operationalize threat intel to inform detection rules and incident response.
Incident Response
  • Lead end-to-end investigations—from triage to recovery—during security incidents.
  • Conduct forensic analysis and produce detailed reports with root cause and mitigation plans.
  • Develop playbooks, runbooks, and coordinate across teams and clients during major events.
Collaboration & Leadership
  • Mentor junior analysts and contribute to process automation and SOP development.
  • Engage with customers through regular reviews, briefings, and incident updates.
  • Drive continuous improvement through lessons learned, threat trends, and feedback loops.
Requirements
  • 8–10+ years in SOC/MSSP environments with deep SIEM (Splunk, QRadar, Sentinel, Devo) and EDR (CrowdStrike, Defender) expertise.
  • Hands‑on experience with SOAR platforms, malware analysis, scripting (shell, Python), and basic Unix/Linux troubleshooting.
  • Strong grasp of threat detection, cyber TTPs, and frameworks like MITRE ATT&CK.
  • Excellent communication skills and the ability to lead cross‑functional collaboration.
  • SANS certification (e.g., GCIH) strongly preferred.
Bonus Points For
  • Experience with threat hunting, vulnerability assessments, or DFIR.
  • Familiarity with cloud platforms (AWS, Azure, GCP) and network security tools.
  • Exposure to threat intel platforms like MISP.

We regret that only shortlisted candidates will be notified. However, rest assured that all applications will be updated to our resume bank for future opportunities.

Please kindly refer to the Privacy Policy of Good Job Creations for your reference: https://goodjobcreations.com.sg/en/privacy-policy/

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.