BACKGROUND
The Financial Services Information Sharing and Analysis Center (FS-ISAC) is a non-profit entity that advances cybersecurity and resilience in the global financial system, protecting financial institutions and the people they serve. FS-ISAC is headquartered in the United States with regional offices in the United Kingdom, Netherlands, Australia, and Singapore. For more information, visit our website www.fsisac.com.
POSITION SUMMARY
The Financial Services Information Sharing and Analysis Center (FS-ISAC) is a non-profit entity with thousands of members worldwide focused on building resiliency in the industry through the concept of mutual defense. FS-ISAC shares threat and vulnerability information, conducts coordinated exercises, manages rapid response communications for cyber, fraud and physical events, conducts education and training programs, and fosters collaboration with other key industries and the public sector. This position is hybrid from Singapore and reports to FS-ISAC Asia Pacific office and will serve as the Cyber Security Analyst for the geographic region covering APAC, and will report to the Intelligence Officer - APAC.
ESSENTIAL FUNCTIONS
• Triage and distribute operational and tactical data on information provided by FS-ISAC Members in accordance with FS-ISAC classification and handling protocols.
• Provide formal analysis on the validity of reports, intelligence intake, and Indicators of Compromise (IOCS).
• Create and/or recommend security mitigations, such as YARA and Snort rules, for members at large.
• Create trending reports on data provided by FS-ISAC members on cyber threats and vulnerabilities within regional financial sectors.
• Provide operational support during a cyber incident pertaining to FS-ISAC members.
• Assist FS-ISAC’s Intelligence Officers and Intelligence Analysts with intelligence collection, validation, and distribution efforts.
• Support security discussions and presentations to FS-ISAC members.
• Work on technical projects as assigned by the Intelligence Officer.
POSITION QUALIFICATIONS
• Analytical Skills – Has Tier 1 and Tier 2 SOC experience to respond to events, conduct verification and data enrichment activities, and identify potential linkages to other events. The ability to examine NetFlow traffic, packet analysis and basic cyber intelligence skills for investigations are desirable skills.
• Communication Skills – Has effective written communications skills to compose technical advisories in a timely manner for different audiences and purposes. Can conduct concise verbal briefings on analytical findings. Can work effectively with the intelligence analysts for escalations, incidents, and collaborative work.
• Technical Skills – Demonstrates experience in Python scripting to automate threat intelligence workflow, including data collection from open sources, parsing of indicators of compromise (IOCs), and integration with internal tools and threat platforms.
• Critical Thinking Skills – Is able to approach information and data in an objective and rational manner, understand bias and possible relationships of importance, and apply methods of examination to construct a clear and informed judgement.
• Organizational Skills – Possesses strong time management skills to work multiple processes at the same time and to a high degree of quality. Should be able to prioritize the required work and self-discipline on when to continue to a different task.
• Familiarity with Intelligence Cycle – be able to work with the intelligence analysts to escalate events or incidents that match against FS-ISAC Priority Intelligence Requirements, identify where investigative findings can lead to proactive hunting or monitoring and deeper analysis, and work in harmony with the intelligence analysis function.
EDUCATION AND EXPERIENCE
• Bachelor’s degree in Cybersecurity, Information Security, Computer Science or a related discipline. Equivalent practical experience may be considered.
• At least 2-3 years of professional experience in security operations or threat intelligence role.
• Exposure to threat intelligence platforms (TIPs), such as Cyware or MISP is an advantage.
• Experience in collecting and analyzing open-source intelligence (OSINT) or monitoring threat actor activities on forums or messaging platforms.
• Experience with preparing threat summaries or intelligence reports for technical stakeholders.
WORK ENVIRONMENT
This position is hybrid from Singapore and reports to FS-ISAC Asia Pacific office. Relocation and/or visas will not be sponsored by FS-ISAC. All applicants must be authorized to work in Singapore. Regardless of work location, this position requires a professional work environment. All candidates must be able to meet the physical demands associated with the professional environment. Reasonable accommodation may be provided to enable individuals with disabilities to perform essential functions.
FS-ISAC has reviewed this description to ensure that essential functions and basic duties have been included. It is not intended to be construed as an exhaustive list of all functions, responsibilities, skills, and abilities. Additional functions and requirements may be assigned by supervisors as deemed appropriate.
* The salary benchmark is based on the target salaries of market leaders in their relevant sectors. It is intended to serve as a guide to help Premium Members assess open positions and to help in salary negotiations. The salary benchmark is not provided directly by the company, which could be significantly higher or lower.