As part of the team, you will develop and maintain cybersecurity standards, procedures, configurations or rulesets for the systems and services.
For validation of security procedures, you will conduct security exercises which may include table-top or simulation exercises.
Participate in security incident response that includes understanding alerts, coordination with various system or service operators, identifying potential threats and performing basic triaging prior to escalation to next level security responder.
Coordinate in Indicators-Of-Compromise (IOC) scanning, collating the reports from various system operators with consolidated update to the stakeholders.
Perform vulnerability assessment using automated and manual tools with recommendation for actionable remediation controls. Understand the published vulnerabilities with their respective security patches with context to the deployed system and perform risk assessment onto them.
Monitor and notify security patches releases for the various products. Involve in the security patch assessment rating based on standards like Common Vulnerability Scoring System (CVSS) as well as with the context of the deployed environment.
Engage with stakeholders with presentation or reporting on the vulnerability scanning results, security testing results, security incident or security posture of the systems.
Requirements
Knowledgeable in cyber security principles, operational security management techniques, architecture and designs, cybersecurity attributes (e.g. confidentiality, integrity, availability, accountability, assurance, etc.) and security measures (e.g. authentication, authorisation etc.) for applications in an enterprise environment or setup.
Possess more than 5 years’ working experience on cybersecurity in one or more of the following domains: Network security design, applications secure development, cryptography, mobile management, cloud hosting design and implementation, DevSecOps, etc.
Possess security certifications such as SANS GCIH, CISSP, CISM, AWS or any cloud service security specialty is an added advantage.
Knowledgeable on cyber security technologies (SIEM, VMS, CTEM, VA, GRC and Cloud Security toolsets.
Experience in risk assessment on system, network, application cloud security vulnerabilities, misconfigurations and security patches with technical understanding on their mitigation.
Has understanding of vulnerability assessment, penetration testing report, conduct a full impact of identified and reported vulnerabilities, recommend, and conduct remediation and mitigation.
Experience in understanding alerts, identifying potential threats and performing basic triaging prior to escalation to next level security responder.
Has good interpersonal and stakeholder management skills with presentation skills, and the ability to write clearly, concisely, and within context.
Experience in working with cross-functional, multi-disciplinary teams or contractors to formulate and institute security policies, standards, procedures and configurations.
Benefits
A wholly-owned subsidiary of GovTech.
We promote a learning culture and encourage you to grow and learn.
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.
Junior SOC Analyst at Core Specialty responsible for monitoring and triaging security alerts across IT environment. This role offers hands - on experience in cybersecurity with a fast - paced operational environment.
Security Operations Coordinator overseeing security strategies and managing operations for public safety in NSW. Collaborating with law enforcement and enhancing transport system resilience with flexible work options.
Intern role in Product Security Operations for Salesforce, leading innovative AI - driven security tools and initiatives. Collaborate with experts to enhance security governance and risk management processes.
Security Operations Manager leading colleague safety and security programs at CVS Health. Responsible for managing security risks and operational performance in retail environments.