COMPANY DESCRIPTION
CrimsonLogic, part of the PSA Group, is a global technology company that digitalises and simplifies global trade for businesses and governments around the world through intuitive and delightful solutions.
With over 35 years of experience advancing trade facilitation, compliance, port operations, government services and logistics, we push the boundaries of technology with insightful innovation and deep domain expertise of global trade driven by customer-centricity at our core.
Having pioneered the world's first single-window trade facilitation system, we continue to drive the digital transformation of global trade in over 40 countries with sustainable, impactful solutions for a more seamlessly connected world.
RESPONSIBILITIES
-
Role Purpose(s)
This individual will perform the role of level 2 security analyst in a 24x7 Security Operations Center responsible for monitoring the environment for potential security threats and incidents. This will include the identification, triaging, analysis, threat-hunting, lead incident investigation and support of remediation recommendations to mitigate the security threats and incidents.
Key Accountabilities
- Monitors, analyzes and responds to security events in timely manner
Job Responsibilities & Duties
- Using security tools, perform monitoring and analysis of security events of interest to detect security risks and threats.
- Create incidents and support the investigation of such incidents to not only mitigate the current threat but also prevent future occurrence.
- Document all actions taken as part of incident investigation.
- Work closely with other teams to support the incident management process.
- Provide tuning and filtering recommendations to engineering team.
- Conduct investigation upon requests for data by the customer and/or other teams.
- Assist with the identification, creation and refinement of the team's processes and procedures.
- Stay abreast of current threats and vulnerabilities, particularly those that may directly impact the customer.
- Conduct hunts (specialized searches) for evidence of compromise
- Tracking suspicious network, application, and user behavior
- Investigating breaches, gathering evidence, and analyzing data
- Support and guide Junior analysts and engineers on investigation as required.
Key Job Competencies
- Good analytical Skills
- Result oriented
- Good communication skills
- Teamwork
Education Requirements
- Bachelor's degree or equivalent experience in a related field with 3 working years experience
- GCIA, GCIH or equivalent
Working Experience Requirements
- Bachelor's degree or equivalent experience in a related field with 3 working years experience
Skills Required
- Prior experience in an operations environment as a security analyst
- Highly independent with robust analytical skills
- Incident Response Experience with Remediation
- Basic OS and SIEM administration experiences
- Programming language : KQL, Regex
- Bachelor's degree or equivalent experience in a related field with 3 working years experience