Search by job, company or skills

E

Cyber Security Analyst

3-5 Years
SGD 5,500 - 7,000 per month
Save
new job description bg glownew job description bg glownew job description bg svg
  • Posted 8 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Job Description

. We are seeking a skilled and proactive Cyber Security Analyst to join our Security Operations Center (SOC). The ideal candidate will be responsible for real-time security monitoring, incident investigation, and response across enterprise environments.

. This role requires strong expertise in threat detection, incident handling, and continuous improvement of SOC capabilities.

Key Responsibilities

. Security Monitoring & Incident Response Monitor, investigate, and respond to medium to high-severity security incidents across network, endpoint, cloud, and application environments

. Perform in-depth analysis of alerts, logs, and security telemetry to identify root cause, impact, and remediation actions

. Coordinate incident response activities with internal teams and external stakeholders when required

. Escalate critical incidents to management as per defined protocols

. Ensure all incidents are handled in accordance with SLAs, playbooks, and compliance requirements

. Threat Detection & Use Case Management Tune and optimize SIEM detection rules to improve detection accuracy and reduce false positives

. Analyze emerging threats and enhance detection use cases accordingly

. Continuous Improvement & SOC Maturity Contribute to the development and enhancement of SOC processes, runbooks, and playbooks

. Identify opportunities for automation using SOAR and AI-driven solutions

. Support initiatives to improve SOC efficiency and maturity

. Leadership & Mentorship Provide guidance and mentoring to junior SOC analysts Act as an escalation point for complex investigations

. Promote knowledge sharing, training, and continuous learning within the team

Required Skills & Experience

. Hands-on experience with SIEM platforms such as Splunk, Elasticsearch, Microsoft Sentinel, or Google SecOps Strong understanding of network, endpoint, identity, and cloud security concepts

. Experience analyzing logs from firewalls, EDR, IDS/IPS, cloud platforms, and operating systems

. Knowledge of incident response methodologies and digital forensics fundamentals

. Experience 3-5 years of experience in Cyber Security Operations, SOC, or Incident

. Response roles Proven ability to independently handle medium to high-severity incidents

. Experience working in regulated environments (financial services, healthcare, government) is an advantage

. Soft Skills Strong analytical and problem-solving abilities

. Ability to remain calm and structured under pressure High level of ownership, accountability, and attention to detail

Preferred / Nice-to-Have

. Experience with SOAR platforms and security automation

. Cloud security expertise (AWS, Azure, GCP) Scripting/query skills (SPL, KQL, SQL, Python)

. Experience in SOC transformation or SIEM migration projects

. Certifications (Preferred) GCIA, GCIH, GCED SIEM-related certifications (Elastic, Google SecOps, Microsoft Sentinel, or equivalent)vv

More Info

Job Type:
Industry:
Employment Type:

Job ID: 145728429

Similar Jobs