Date: 21-Feb-2023 Location: Singapore, Singapore Company: Singtel Group Primary Purpose Perform advance triage, incident response, and follow up on customer query Responsibilities
Produce intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source reporting.
Produce actionable intelligence information for delivery to colleagues and customers in the form of technical reports, briefings, and data feeds.
Participate in regular threat focus meetings.
Perform detailed investigative works into all traffic anomalies against established, historical baselines of individual agencies.
Review and profile the events of all monitored clients.
Build rules and intelligence to detect threats and proliferate to all monitored networks.
Implement and devise detection method of threats in security operations.
Filter and fine-tune the security events flowing to databases
Prepare training programme for L1 Security Analyst.
Conduct knowledge sharing sessions for L1 Security Analyst.
Monitor real-time third party security feeds, forums, and mailing lists to gather information on vulnerabilities and exploits related to the client.
Assess each event based on factual information and wider contextual information available
Attend customers\xe2\x80\x99 review meetings as-and-when needed. Qualification and Experience
\xe2\x80\xa2Minimal 2 years of relevant working experience in SOC as security analyst with hands-on experience in monitoring, triage, analysis and incident management of real time security events \xe2\x80\xa2Familiar with SOC processes
Minimally possess a Polytechnic Diploma
Knowledge and Technical Skills
Hands-on experience in Unix/Linux and Windows administration
Strong foundation in Internet protocols (TCP/IP) and security concepts
Hands-on experience in Security Information Event Management System (SIEMS)
Strong ability to understand and analyse log and network packet data
Strong foundation in security threat and attack countermeasure
Analytical problem solving and troubleshooting skill
Effective time management and organisational skill
Effective communication skill
Operational knowledge on SIEMS, Breach Detection System, Network Forensic System Other Requirements
Perform advance triage, incident response, and follow up on customer query Responsibilities
Produce intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source reporting.
Produce actionable intelligence information for delivery to colleagues and customers in the form of technical reports, briefings, and data feeds.
Participate in regular threat focus meetings.
Perform detailed investigative works into all traffic anomalies against established, historical baselines of individual agencies.
Review and profile the events of all monitored clients.
Build rules and intelligence to detect threats and proliferate to all monitored networks.
Implement and devise detection method of threats in security operations.
Filter and fine-tune the security events flowing to databases
Prepare training programme for L1 Security Analyst.
Conduct knowledge sharing sessions for L1 Security Analyst.
Monitor real-time third party security feeds, forums, and mailing lists to gather information on vulnerabilities and exploits related to the client.
Assess each event based on factual information and wider contextual information available
Attend customers\xe2\x80\x99 review meetings as-and-when needed. Qualification and Experience
\xe2\x80\xa2Minimal 2 years of relevant working experience in SOC as security analyst with hands-on experience in monitoring, triage, analysis and incident management of real time security events \xe2\x80\xa2Familiar with SOC processes
Minimally possess a Polytechnic Diploma
Knowledge and Technical Skills
Hands-on experience in Unix/Linux and Windows administration
Strong foundation in Internet protocols (TCP/IP) and security concepts
Hands-on experience in Security Information Event Management System (SIEMS)
Strong ability to understand and analyse log and network packet data
Strong foundation in security threat and attack countermeasure
Analytical problem solving and troubleshooting skill
Effective time management and organisational skill
Effective communication skill
Operational knowledge on SIEMS, Breach Detection System, Network Forensic System Other Requirements
Beware of fraud agents! do not pay money to get a job
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.