Search by job, company or skills

tangspac consulting pte ltd

Cyber Threat Analyst (L2)

6-8 Years
SGD 8,000 - 8,500 per month
Save
new job description bg glownew job description bg glownew job description bg svg
  • Posted 16 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

  • Investigate alerts escalated from L1 and determine the scope, impact, and severity of potential security incidents.
  • Lead incident response activities, including containment, eradication, and recovery, following established playbooks and procedures
  • Correlate logs and data from SIEM, EDR, network security tools, and cloud platforms to identify malicious activity and confirm incident root causes.
  • Assess threats, vulnerabilities, and exploits affecting the environment, and recommend timely mitigation steps.
  • Develop scripts or use automation tools to streamline investigation, enrichment, and reporting tasks.
  • Prepare clear and complete incident documentation, including timelines, supporting evidence, and post-incident findings.
  • Use threat intelligence to enrich investigations, map activity to MITRE ATT&CK, and identify potential threat actor tactics and techniques.
  • Perform targeted IOC based hunting in support of ongoing investigations or emerging threats.
  • Work closely with L1 and CSOC teams to provide guidance, escalate complex incidents, and continuously improve SOC processes.

Requirements:

  • Degree or Diploma in Computer Science, Computer Engineering, Information Security, or related fields.
  • Minimum of 6 years of experience in a Security Operations Centre (SOC), Computer Emergency Response Team (CERT/CIRT), or similar incident response function.
  • Solid understanding of security incident investigation, including log analysis, event correlation, and root cause identification.
  • Good ability to assess the scope impact, and severity of incidents, and recommend appropriate containment and mitigation measures.
  • Hands-on experience responding to incidents such as phishing, malware infections, credential compromise, system misconfigurations, or suspicious network activity.
  • Good working knowledge of network protocols, system logs, Windows and Linux operating environments, and common attack techniques.
  • Basic scripting capability in languages such as Python, Bash or PowerShell are preferred.
  • Familiarity with industry frameworks and standards such as MITRE ATT&CK, Cyber Kill Chain, CVSS, and OWASP Top 10.
  • Experience working with SIEM, EDR, and SOAR platforms, and able to tune rules or write basic scripts to improve investigation workflows.
  • Ability to document investigations clearly and support evidence collection when required.
  • Able to work independently and collaboratively, especially in high-pressure situations.
  • Able to work 12-hour shift with shift patterns subject to changes due to operational and business requirements.

Interested candidates kindly submit your updated CV in a Word Format to: [Confidential Information]. Only shortlisted candidates will be notify. Thank you.

More Info

Job Type:
Industry:
Employment Type:

Job ID: 146468441

Similar Jobs