Functional area: Business Technology Services
Employment type: Full-time
Job Type: Permanent
: The Security Operation Center (SOC) is seeking a Singapore-based L1 SOC analyst. The successful candidate will have experience in incident triage, security threat monitoring, security compliance monitoring and familiar with SOC processes and environment. The analyst will work in a 24x7x365 shift environment and will respond to security incidents in a SLA driven SOC.
- The analyst will be responsible for performing daily operational real-time monitoring and analysis of security events from multiple sources including but not limited to events from Security Information Monitoring tools, network and host based intrusion detection systems, network infrastructure logs, system logs (Unix & Windows), mainframes, midrange, applications and databases.
- Perform incident initial identification, classification and prioritization
- Timely escalation and working closely with stakeholder to ensure rapid response to all reported incidents
- Provide support and assistance during the investigation of security incident
- Proactive monitoring on Cyber threat landscape by performing research and study on latest security threats and vulnerabilities
- Participate in the periodic review and establishment of stringent service level requirement
- Generate security reporting and metrics as required
- Perform daily health check on the system health status
- Stay current on the latest threats and vulnerabilities to ensure operational tools and processes are up to date
- Provide first line response to security incidents (malware infections, unauthorized access, malicious emails, Distributed Denial of Service (DDoS) attacks, etc).
- Enhance and assist in the tuning of the SIEM and NIDS rules to identify security incidents and reduce false positives.
- Review threat intelligence and investigate indicators of compromise (IOCs).
- Assisting in evaluating security events and issues, being the escalation point of contact when required.
- ITC/Diploma/Degree in Computer Science / IT Security from a recognized education institution
- Professional security related qualification (e.g. SANS GCIA, GSEC, GCIH) will be favorable although not mandatory
- 1 to 4 years of relevant experience in similar capacity but candidates without relevant experience are welcomed to apply. Training will be provided for selected candidates without relevant experience.
- Strong understanding of basic computer science: algorithms, data structures, databases, operating systems, networks, and programming
- Strong understanding of IT operations: help desk, end-point, server management, and networks
- Strong ability to communicate: write clearly and is able to communicate at all levels – technical and management
- Good understanding of Cyber security: Cyber kill chain, TTP, threat intelligence, malware triage
- Good understanding of information security concepts: defense in depth, BYOD management, data loss protection, risk assessment and security metrics
- A good knowledge in networking technology and network security (i.e. Firewall, IDS, IPS, VPN, APT and TCP/IP protocols)
- Basic malware analysis capability will be an advantage
- Working experience with ArcSight or any major SIEM will be an advantage
- Strong technical knowledge and log analysis for Operating Systems, Database, Security and Network device & application
- Good written and verbal communication skills
- Process and procedure adherence
- Strong analytical and problem solving skill
- Work in a rotational 24/7 SOC environment