We're seeking a future team member for the role of Senior Cyber Threat Analyst to join our Information Security Division, Security Monitoring team. This role is located in Singapore – HYBRID.
You’ll make an impact in the following ways:
- Collect, analyze, and enrich event information and perform threat or target analysis duties.
- Interpret, analyze, and report all events and anomalies in accordance with Computer Network Directives, including initiating, responding, and reporting discovered events.
- Manage and execute multi-level responses and addresses reported or detected incidents.
- Provide reporting and metrics around security monitoring by designing dashboards for asset owners and management consumption.
- Coordinate and distribute directives, vulnerability, and threat advisories to identified consumers.
- Develop focused reporting and briefings for advanced cyber threats and activity to various teams and leaders.
- Provide correlation and trending of Program's cyber incident activity.
- Create AARs and document TTPs, with the ability to do deep dive investigations on complex incidents.
- Improve the service level for security operations and monitoring. Creating and maintaining system documentation for security event processing.
- Author Standard Operating Procedures (SOPs) and training documentation.
- Act a SME and trainer to T2 and T1 personal as needed.
To be successful, we’re seeking interest in the follow areas:
- Bachelor's degree in computer science or a related discipline, or equivalent work experience required, advanced degree preferred.
- 8+ years of experience in information security or related technology experience required, experience in the securities or financial services industry is a plus.
- Must have at least two (2) certifications, from a respectable security organization (e.g. based on U.S. DOD8570 standard)
- Background in hands on computer and networking experience to include an understanding of TCP/IP, routing, and major Internet protocols.
- Understanding of network, desktop and server technologies, including experience with network intrusion methods, network containment, segregation techniques and technologies such as Intrusion Detection Systems (IDS) and Intrusion Protection Systems (IPS).
- 5+ years Intrusion monitoring, incident response and mitigation, web application security, threat research, pen testing or intelligence analysis.
- Ability to read and write scripts in various languages. (php, ksh, python, powershell, SQL, and or similar)
- 5+ years using Splunk, ArcSight and/or similar SIEM experience.
- Strong verbal and written communication skills, including the ability to provide technical thought leadership on security incident investigation calls with other technology teams, and the ability to translate complex technical concepts into plain English for consumption by non-technical audiences.
- Candidates must be willing to work 1 weekend shift as part of their normal work week