Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst (Listed MNC)

PEOPLE PROFILERS PTE. LTD.

Singapore

On-site

SGD 80,000 - 100,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity company in Singapore is seeking a candidate skilled in incident response and security monitoring. Responsibilities include analyzing security alerts from SIEM tools, conducting threat analysis, and mentoring junior analysts. Candidates must hold a degree in Computer Science or a related field and possess hands-on experience with SIEM tools like Splunk and QRadar. Strong analytical and communication skills are essential for success in this role. Apply now by emailing your resume to **ken.ng@peopleprofilers.com**.

Qualifications

  • Degree in Computer Science or related technical field.
  • Hands-on experience with SIEM tools required.
  • Solid understanding of network protocols and incident response processes.

Responsibilities

  • Monitor and analyze security alerts from SIEM platforms.
  • Conduct in-depth analysis of security incidents.
  • Contain and recover systems affected by cybersecurity breaches.

Skills

SIEM tools
Incident response
Threat analysis
Problem-solving
Analytical skills

Education

Degree in Computer Science or Information Security

Tools

Splunk
QRadar
Elastic
Job description
Responsibilities
  • Monitor and triage security alerts from SIEM platforms to identify potential incidents.
  • Conduct in-depth analysis of security events to determine impact, scope, and remediation steps.
  • Contain, mitigate, and recover systems affected by cybersecurity incidents.
  • Collaborate with threat intelligence teams to correlate indicators of compromise (IoCs) and emerging threats.
  • Perform threat hunting using OSINT and internal telemetry data to proactively identify risks.
  • Execute forensic analysis on compromised endpoints, networks, and applications.
  • Maintain and update incident documentation, including timelines, actions, and lessons learned.
  • Coordinate with internal stakeholders and business units during active incidents to ensure timely response.
  • Participate in 24/7 SOC rotation shifts and provide coverage for follow-the-sun operations.
  • Mentor junior analysts on incident handling procedures, threat analysis, and security best practices.
Requirements
  • Degree in Computer Science, Information Security, or related technical field.
  • Hands-on experience with SIEM tools (e.g. Splunk, QRadar, Elastic) and security monitoring.
  • Solid understanding of network protocols, operating systems, malware analysis, and incident response processes.
  • Strong analytical, problem-solving, and communication skills; ability to work calmly under pressure.

Please submit your updated resume in Word format by using theApply Now Button.
We regret that only shortlisted candidates will be notified.
Email resume token.ng@peopleprofilers.com

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.