Search by job, company or skills

Ensign InfoSecurity

Cyber Security Analyst (Resident Engineer)

3-7 Years
new job description bg glownew job description bg glownew job description bg svg
  • Posted a day ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Responsibilities

  • Monitor client environments using SIEM platforms to detect, triage, and respond to cybersecurity threats in accordance with agreed SOPs and industry best practices
  • Analyse and investigate security alerts escalated from client teams, MSSPs, and internal systems; lead or support incident response through to closure
  • Triage alerts from the SIEM to identify notable alerts for escalation, based on established operating procedures or industry best practices
  • Advise clients on possible follow-up actions and remediation measures for escalated alerts
  • Respond to incidents and critical alerts outside of office hours when required
  • Perform indicator of compromise (IOC) searches and triage incoming threat intelligence to assess relevance to client assets
  • Gather and report on threat intelligence using the client's Threat Intelligence Platform
  • Coordinate with client stakeholders including IT, infrastructure, application, and business teams during active incidents and programme activities
  • Collaborate with MSSPs and Ensign delivery teams on detection tuning to reduce noise and improve fidelity
  • Manage detection use cases, dashboards, and reports on SIEM: perform monthly and ad hoc reviews, validate and maintain existing rules, and develop and implement new use cases
  • Manage playbooks, automation scripts, and integrations on SOAR: review, validate, maintain, and develop new playbooks; optimise existing ones for accuracy and efficiency
  • Any other tasks as assigned

Requirements

  • Degree in Computer Science, Information Security, or a related discipline
  • 3 to 7 years of experience in cybersecurity operations or a Security Operations Centre (SOC) environment
  • Hands-on experience with SIEM platforms and solid understanding of network, Windows, and Linux infrastructure
  • Experience in security, network, and cyber threat analysis
  • Demonstrated ability to triage, investigate, and respond to security incidents independently
  • Comfortable operating in a client-facing, on-site environment with direct accountability to client stakeholders
  • Clear written and verbal communication; able to produce structured incident reports and brief senior stakeholders
  • GIAC Certified Incident Handler (GCIH) or equivalent certification required

Preferred Skills / Qualities

  • Working knowledge of SOAR platforms; experience with playbook development or automation scripting
  • Knowledge of cloud infrastructure security (AWS, Azure, or GCP)
  • Familiarity with Threat Intelligence Platforms and IOC management workflows
  • Exposure to Singapore regulatory frameworks: CSA advisories, IMDA guidelines, MAS TRM
  • Additional certifications such as GCFE, GCFA, OSCP, or vendor product certifications

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 144252261