Job Search and Career Advice Platform
  • Jobs
  • Headhunters
  • Free resume review
  • About Us
EN
10,000+

Communication jobs in Singapore

Senior Security Analyst

Logicalis

Singapore
On-site
SGD 80,000 - 120,000
4 days ago
Be an early applicant
I want to receive the latest job alerts for “Communication” jobs

Brand & Corporate Communications Lead, Group Marketing

NTUC Club

Singapore
On-site
SGD 60,000 - 80,000
4 days ago
Be an early applicant

Construction HR Lead: Training, Compliance & Grants

LIAN DA BUILDER PTE. LTD.

Singapore
On-site
SGD 80,000 - 100,000
4 days ago
Be an early applicant

Risk Manager

AllianzGI Singapore Ltd.

Singapore
On-site
SGD 70,000 - 100,000
4 days ago
Be an early applicant

Mandarin-Speaking Accounts Executive

LIAN DA BUILDER PTE. LTD.

Singapore
On-site
SGD 50,000 - 70,000
4 days ago
Be an early applicant
discover more jobs illustrationDiscover more opportunities than anywhere else. Find more jobs now

Security Operations Specialist

Fireblocks

Singapore
On-site
SGD 102,000 - 129,000
4 days ago
Be an early applicant

Conflicts & Compliance Analyst

Clyde & Co Australia

Singapore
On-site
SGD 60,000 - 90,000
4 days ago
Be an early applicant

Strategic Mutual Fund Product Lead

TAIPEI FUBON COMMERCIAL BANK CO., LTD. Singapore Branch

Singapore
On-site
SGD 70,000 - 90,000
4 days ago
Be an early applicant
HeadhuntersConnect with headhunters to apply for similar jobs

Business Analyst

ISOFTSTONE PTE. LTD.

Singapore
On-site
SGD 60,000 - 80,000
4 days ago
Be an early applicant

HR Business Partner / Generalist

CREDIT AGRICOLE CORPORATE AND INVESTMENT BANK

Singapore
On-site
SGD 60,000 - 80,000
4 days ago
Be an early applicant

Assistant Relationship Manager (Private Bank)

Ethos BeathChapman

Singapore
On-site
SGD 60,000 - 80,000
4 days ago
Be an early applicant

Executive Director

Special Olympics, Singapore

Singapore
On-site
SGD 80,000 - 120,000
4 days ago
Be an early applicant

Senior Electrical Engineer

XP Power

Singapore
On-site
SGD 80,000 - 100,000
4 days ago
Be an early applicant

HR Executive

STANDARD ENGINEERING PTE. LTD.

Singapore
On-site
SGD 80,000 - 100,000
4 days ago
Be an early applicant

Product Manager

FLEXXON PTE. LTD.

Singapore
On-site
SGD 90,000 - 120,000
4 days ago
Be an early applicant

MEP Project Manager

Currie & Brown

Singapore
On-site
SGD 80,000 - 120,000
4 days ago
Be an early applicant

Asia Fixed Income IPM – Institutional Portfolio Lead

MFS Investment Management

Singapore
Hybrid
SGD 60,000 - 80,000
4 days ago
Be an early applicant

Engineering Manager

CLEARLAB SG PTE. LTD.

Singapore
On-site
SGD 80,000 - 110,000
4 days ago
Be an early applicant

Operations Specialist

FENIX ONE PTE. LTD.

Singapore
On-site
SGD 35,000 - 55,000
4 days ago
Be an early applicant

Procurement Executive

WISMA TECHNOLOGY PTE. LTD.

Singapore
On-site
SGD 45,000 - 65,000
4 days ago
Be an early applicant

APAC Wellbeing Strategy Consultant

AON SINGAPORE PTE. LTD.

Singapore
On-site
SGD 80,000 - 100,000
4 days ago
Be an early applicant

Senior Platform SRE & AI Infra Lead

Sleek

Singapore
Hybrid
SGD 120,000 - 150,000
4 days ago
Be an early applicant

SALES SUPERVISOR

PRIME MANPOWER SOLUTIONS PTE. LTD.

Singapore
On-site
SGD 60,000 - 80,000
4 days ago
Be an early applicant

KYC & AML Analyst — Due Diligence & Risk Review

MANPOWER STAFFING SERVICES (SINGAPORE) PTE LTD

Singapore
On-site
SGD 60,000 - 80,000
4 days ago
Be an early applicant

Hybrid Sales Account Manager — High Commission + Benefits

SUPERSTAR TEACHER PTE. LTD.

Singapore
Hybrid
SGD 60,000 - 80,000
4 days ago
Be an early applicant

Top job titles:

Video jobsPsychologist jobsTeacher jobsSoftware Developer jobsBarista jobsEducation jobsGeneral Manager jobsChief Executive Officer jobsPreschool jobsBroadcast jobs

Top companies:

Jobs at DhlJobs at IkeaJobs at MaybankJobs at ChanelJobs at HuaweiJobs at OracleJobs at SanofiJobs at AllianzJobs at UberJobs at Adecco

Similar jobs:

Corporate Communication jobs
Senior Security Analyst
Logicalis
Singapore
On-site
SGD 80,000 - 120,000
Full time
4 days ago
Be an early applicant

Job summary

A leading IT consultancy in Singapore seeks a SOC Specialist with 8-10 years’ experience to oversee detection engineering, threat hunting, and incident response. This role requires hands-on experience with security information management systems like Splunk and IBM QRadar. The ideal candidate will have a Bachelor's degree in a relevant field and be capable of mentoring junior analysts. Competitive salary and dynamic work environment offered.

Qualifications

  • 8-10 years of experience in SOC and MSS environments.
  • Hands-on experience with Splunk, QRadar, and Azure Sentinel.
  • Familiarity with endpoint protection technologies.
  • Knowledge of malware analysis and firewall technologies.

Responsibilities

  • Design and deploy detection rules in SIEM.
  • Conduct detection gap analysis and optimize alert thresholds.
  • Lead incident response lifecycle and handle escalated tickets.
  • Mentor junior SOC analysts and support investigations.

Skills

Incident analysis
Mentorship
Threat intelligence
Team collaboration

Education

Bachelor's degree in computer engineering or related field

Tools

Splunk
IBM QRadar
Azure Sentinel
CrowdStrike
Security Orchestration technologies
Job description

Job Description

Why choose Logicalis?

As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.

We strengthen our purpose : to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.

Job Responsibilities:

Detection Engineering
  • Design, develop, and deploy high-fidelity detection rules in SIEM (Splunk, Microsoft Sentinel, Devo, QRadar, EDR, etc.).
  • Create custom use cases to detect MITRE TTPs aligned with real-world threats and red team activities.
  • Conduct detection gap analysis, tune alerting mechanisms, and eliminate false positives at the MSS customer environment.
  • Perform regular fine‑tuning and optimization of detection rules, correlation logic, and alert thresholds across SIEM, EDR, and other security platforms to enhance detection accuracy and reduce false positives.
  • Continuously assess detection efficacy based on incident feedback and threat landscape evolution, implementing improvements accordingly.
  • Collaborate with red / purple teams to validate detection logic and build threat‑informed defenses.
  • Regularly review, update, and enhance detection logic to ensure alignment with the latest threat intelligence, adversary TTPs, and evolving attack techniques.
  • Maintain relevancy and effectiveness of security detections by incorporating insights from threat hunts, incident response cases, red team exercises, and industry best practices.
Threat Hunting and Threat Intel
  • Proactively hunt for advanced threats across on‑prem and cloud environments using telemetry from SIEM, EDR, NDR, and threat intelligence.
  • Develop hypotheses based on TTPs, threat intelligence feeds, and incident trends.
  • Use frameworks like MITRE ATT&CK and Diamond Model to structure hunting campaigns.
  • Document hunt procedures and outcomes to support knowledge sharing and continuous improvement.
  • Map threat actor TTPs to frameworks such as MITRE ATT&CK to support proactive defense strategies and inform detection engineering efforts.
  • Provide actionable threat intelligence to SOC, detection engineering, and IR teams to inform custom detection rule development, prioritization of hunts, and incident scoping.
  • Contribute to the threat intelligence lifecycle, including direction, collection, processing, analysis, dissemination, and feedback.
  • Ingest, analyze, and operationalize threat intelligence from internal sources, commercial feeds, and open‑source intelligence (OSINT) to enrich detection logic, threat hunting hypotheses, and incident investigations.
  • Collaborate with internal and commercial threat intelligence teams to contextualize IOCs and TTPs for targeted and industry‑specific threats.
  • Maintain up‑to‑date threat intelligence repositories and contribute to the continuous improvement of threat intel processes and playbooks.
Incident Response
  • Lead incident response lifecycle (detection, triage, containment, eradication, recovery).
  • Handle security incidents tickets escalated by Level II team, and draft security incident report covering the root cause, forensic evidence, and recommended mitigation plans.
  • Conduct / support forensic analysis of endpoints, logs, and network traffic to determine root cause and impact.
  • Coordinate with internal stakeholders and external partners during critical incidents.
  • Develop and maintain playbooks, runbooks, and incident reports.
  • DFIR experience is a strong added advantage, enabling deeper investigations and root cause analysis.
Collaboration & Mentorship
  • Mentor and support L1 / L2 SOC analysts in investigations, tool usage, and processes.
  • Participate in tabletop exercises and red / purple team assessments.
  • Lead and conduct regular customer meetings to review SOC activities, including security posture, key metrics, and ongoing initiatives.
  • Prepare and deliver detailed briefings on priority incidents, RCA, ensuring timely communication of root cause, impact analysis, mitigation steps, and next actions.
  • Act as a primary point of contact for Incident escalations and maintain consistent, professional engagement with client stakeholders.
  • Coordinate with cross‑functional teams including Engineering, Development, Red Team, and Risk / Compliance.
  • Identify gaps in existing SOC process and work with team members or other departments to create, modify standard operating procedures, to automate any mundane daily operational activities, ensuring Ops are run efficiently.
Requirements
  • Candidate should have at least 8–10 years of working experience in SOC and MSS environments.
  • Bachelor's degree in computer engineering, Computer Science, Cyber Security, Information Security, or other equivalents.
  • Excellent hands‑on experience in implementations, incident analysis of Splunk, IBM QRadar, Azure Sentinel SIEM (Security Information and Event Management) & Devo technologies.
  • Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if CrowdStrike, Microsoft Defender.
  • Hands on experience on SOAR (Security Orchestration, Automation, and Response) technologies.
  • Experience in malware analysis for Windows and Linux / Mac.
  • Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
  • Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with proven Unix (Solaris, Linux, BSD) experience.
  • Knowledge of any shell scripting language and applying it to automate mundane operations tasks.
  • Knowledge of current cyber threats, attack vectors, vulnerabilities, and threat intelligence feeds.
  • Ability to work effectively in a team environment, collaborate cross‑functionally, and mentor junior analysts.
  • Candidate should have at least one SANS certification. Preferred if that is GCIH.
  • Good understanding of basic network concepts and advantages of exposure to cloud technologies.
  • Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL (Information Technology Infrastructure Library) standards.
  • Lead team of security analysts, develop SOC standard operating procedures and develop Threat Intel feeds such as MISP.
  • Interested applicants please submit your application with your expected salary and notice period to be considered for the role.

We regret that only shortlisted candidates will be notified.

As part of any recruitment process, we collect and processes personal data relating to job applicants. We are committed to being transparent about how we collect and use that data and to meeting our data protection obligations. By applying to this post and sending us your resume, you agree to the collection, use and / or disclosure of your personal data in the manner as set out in our Data Protection Notice for Job Applicants which can be found

Logicalis is committed to protecting your privacy.

Click below to view the data protection notice.

  • 1
  • ...
  • 242
  • 243
  • 244
  • ...
  • 400

* The salary benchmark is based on the target salaries of market leaders in their relevant sectors. It is intended to serve as a guide to help Premium Members assess open positions and to help in salary negotiations. The salary benchmark is not provided directly by the company, which could be significantly higher or lower.

Job Search and Career Advice Platform

Empoweringjob seekers

Tools
  • Jobs
  • Resume review
  • Headhunters
  • Browse jobs
Company
  • About us
  • Careers at JobLeads
  • Site notice
  • Press
  • Reviews
Support
  • Help
  • Partner integration
  • ATS Partners
Social
  • JobLeads Blog
  • YouTube
  • LinkedIn
  • Instagram
  • Facebook
  • Privacy Policy
  • Terms of Use

© JobLeads 2007 - 2026 | All rights reserved