Enable job alerts via email!

Senior SOC Analyst

Good Job Creations

Singapore

On-site

SGD 90,000 - 130,000

Full time

6 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading company in cybersecurity solutions is seeking a Detection Engineer to design detection rules, hunt for threats, and lead incident response efforts. The role requires 8-10 years of experience in SOC environments, strong skills in SIEM and EDR tools, and the ability to mentor junior analysts. This is an opportunity to work in a dynamic environment focused on continuous improvement and collaboration.

Qualifications

  • 8-10+ years in SOC/MSSP environments.
  • Experience with threat detection frameworks like MITRE ATT&CK.
  • Hands-on with SOAR platforms and malware analysis.

Responsibilities

  • Design and fine-tune detection rules across various SIEMs.
  • Proactively hunt for threats across hybrid environments.
  • Lead investigations during security incidents.

Skills

SIEM expertise (Splunk, QRadar, Sentinel, Devo)
EDR expertise (CrowdStrike, Defender)
Scripting (shell, Python)
Threat detection
Communication skills

Education

SANS certification (e.g., GCIH)

Job description

[Job ID:1020861]

What You’ll Do

Detection Engineering
  • Design and fine-tune high-fidelity detection rules across SIEMs (Splunk, Sentinel, Devo, QRadar) and EDR platforms.
  • Build custom use cases based on MITRE ATT&CK and red team insights.
  • Eliminate false positives, improve alert accuracy, and continuously optimize detection logic.
  • Collaborate with red/purple teams to validate and evolve detection strategies.
Threat Hunting & Intelligence
  • Proactively hunt for threats across hybrid environments using telemetry from SIEM, EDR, and NDR tools.
  • Leverage threat intelligence and frameworks (MITRE, Diamond Model) to build and execute targeted hunting campaigns.
  • Analyze and operationalize threat intel to inform detection rules and incident response.
Incident Response
  • Lead end-to-end investigations—from triage to recovery—during security incidents.
  • Conduct forensic analysis and produce detailed reports with root cause and mitigation plans.
  • Develop playbooks, runbooks, and coordinate across teams and clients during major events.
Collaboration & Leadership
  • Mentor junior analysts and contribute to process automation and SOP development.
  • Engage with customers through regular reviews, briefings, and incident updates.
  • Drive continuous improvement through lessons learned, threat trends, and feedback loops.
Requirements
  • 8–10+ years in SOC/MSSP environments with deep SIEM (Splunk, QRadar, Sentinel, Devo) and EDR (CrowdStrike, Defender) expertise.
  • Hands-on experience with SOAR platforms, malware analysis, scripting (shell, Python), and basic Unix/Linux troubleshooting.
  • Strong grasp of threat detection, cyber TTPs, and frameworks like MITRE ATT&CK.
  • Excellent communication skills and the ability to lead cross-functional collaboration.
  • SANS certification (e.g., GCIH) strongly preferred.
Bonus Points For
  • Experience with threat hunting, vulnerability assessments, or DFIR.
  • Familiarity with cloud platforms (AWS, Azure, GCP) and network security tools.
  • Exposure to threat intel platforms like MISP.
We regret that only shortlisted candidates will be notified. However, rest assured that all applications will be updated to our resume bank for future opportunities.

Please kindly refer to the Privacy Policy of Good Job Creations for your reference: https://goodjobcreations.com.sg/en/privacy-policy/

EA Personnel Name: Ong Kang Quan Ryan
EA Personnel Registration Number: R23116952
EA License No.: 07C5771

#SCR-ryan-ong
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.