Soc incident responder
1 week ago
As a bank with a brain and a soul, Citi creates economic value that is systemically responsible and in our clients’ best interests. As a financial institution that touches every region of the world and every sector that shapes your daily life, our Enterprise Operations & Technology teams are charged with a mission that rivals any large tech company. Our technology solutions are the foundations of everything we do. We keep the bank safe and provide the technical tools our workers need to be successful. We design our digital architecture and ensure our platforms provide a first-class customer experience. Our operations teams manage risk, resources, and program management. We focus on enterprise resiliency and business continuity. We develop, coordinate, and execute strategic operational plans. Essentially, Enterprise Operations & Technology re-engineers client and partner processes to deliver excellence through secure, reliable, and controlled services. Trust is part of our DNA at Citi. As such, we take safeguarding our customer data very seriously. The Chief Information Security Office (CISO) is made up of deeply dedicated and talented colleagues who work together to ensure the safety of Citi’s and our clients’ assets and information. We manage information security as an end-to-end program – one with a clear mandate and accountability. Our mission is to continually execute and enhance a global security program that is fully anchored to modern control and security frameworks, fully aligned with the technology of the firm, threat-focused and data-driven, and deeply integrated across all Citi businesses globally. Being talent-driven, we are focused on attracting, developing, and retaining diverse and inclusive talent with a high technical skill level. As a member of our team we will provide you with career development opportunities at all stages of your career. Our employees model a passion for protecting Citi and our clients and believe in treating others with dignity and respect. Our commitment to diversity includes a workforce that represents the clients we serve globally from all walks of life, backgrounds, and origins. We foster an environment where the best people want to work. We value and demand respect for others, promote individuals based on merit, and ensure opportunities for personal development are widely available to all. Ideal candidates are innovators with well-rounded backgrounds who bring their authentic selves to work and complement our culture of delivering results with pride. If you are a problem solver who seeks passion in your work, come join us. We’ll enable growth and progress together. SOC Incident Responder (AVP) Citi's Security Operations Center (SOC) Incident Response Team seeks a highly skilled and experienced incident response practitioner to support critical efforts aimed at protecting Citi infrastructure, assets, clients and stakeholders. This is a demanding role with global exposure and responsibility. You will serve both as a technical subject matter expert and as an ambassador for the incident response team. You will be assigned to Citi's SOC and will collaborate closely with a talented cadre of security specialists and incident responders to react urgently to security events. Your observations and recommendations will impact security decisions across the organization and play an important part in maturing Citi's security posture. As an individual contributor, you will be a hands-on first responder who triages and investigates cybersecurity incidents in cloud, traditional (i.e. on-premises) , and hybrid environments. This position will be technically challenging and rewarding, but will also provide ample opportunity to establish partnerships, mentor colleagues and shape team culture. One guarantee is that no two days will be the same. Responsibilities Related activities include but are not limited to: Lead and/or support in-depth triage and investigations of urgent cyber incidents in cloud, traditional, and hybrid environments. Perform incident response functions including but not limited to host-based analytical functions (e.g. digital forensics, metadata, malware analysis, etc.) through investigating Windows, Unix based, appliances, and Mac OS X systems to uncover Indicators of Compromise (IOCs) and/or Tactics, Techniques and Procedures (TTPs). Create and track metrics based on the MITRE ATT&CK Framework and other standard security-focused models. Work with application and infrastructure stakeholders to identify key components and information sources such as environments (on-premises versus cloud) , servers, workstations, middleware, applications, databases,logs, etc. Participate in incident response efforts using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place. Collaborate with global multidisciplinary groups for triaging and defining the scope of large scale incidents. Document and present investigative findings for high profile events and other incidents of interest. Participate in readiness exercises such as purple team, table tops, etc. Train junior colleagues on relevant best practices. Qualifications: A skilled and creative incident responder. Success will depend on your ability to: Stay current with the evolving landscape of threat activities and cybersecurity best practices. Quickly synthesize information from disparate sources. Scrutinize evidence thoroughly to identify relationships and develop leads. Establish defensible working theories to explain observations and findings. Perform investigations in a forensically sound manner. A goal oriented individual contributor. Success will depend on your ability to: Stay motivated and work independently with minimal oversight. Adapt to changing requirements in a fast paced environment. Multitask and meet deadlines despite competing priorities. Navigate operational impediments in order to complete time sensitive tasks. Identify and document any opportunities for process improvement. A reliable team player. Success will depend on your ability to: Practice mutual respect at all times. Establish trust and build strong partnerships. Resolve conflict in a constructive manner and use as an opportunity to develop team unity. Prioritize collective success ahead of individual ambition. A great communicator. Success will depend on your ability to: Establish clear narratives to describe investigative findings and working theories. Clearly and concisely articulate any recommendations that arise from investigative activities. Motivate colleagues and partners to cooperate and support as needed. Exert influence both verbally and in writing. A passionate leader. Success will depend on your ability to: Lead by example. Enable team success by being approachable and available. Innovate and inspire others. Embrace challenges and approach any failures as opportunities for learning and improvement. Requirements and Critical Competencies- Education, knowledge, and Experience: Bachelor's degree in a technically rigorous domain such as Computer Science, Information Security, Engineering, Digital Forensics, etc. 3+ years of professional experience in cybersecurity and/or information security, or demonstrated equivalent capability. 1+ years hands-on working in cyber incident response and investigations in medium to large organizations with cloud and forensics components. Experience in Cloud Forensics/IR: Hands-on Dev/Sec/Ops experience with cloud environments and underlying storage, compute and monitoring services. Prior experience with cloud common services. Hands-on experience with forensic investigations or large scale incident response in cloud environments. Hands-on experience with containerization methods and tools (e.g. Docker, Kubernetes) including incident response and digital forensics. Certifications (e.g. GIAC, AWS, etc) in cloud or demonstrated equivalent capability. Experience in Incident Response: Hands-on experience with analyzing and pivoting through large data sets. Current hands-on experience in digital forensics (e.g. computer, network, mobile device forensics, and forensic data analysis, etc.). Activities include but not limited to: Memory collection and analysis from various platforms. Evidence preservation, following industry best practices. Familiarity with malware analysis and Reverse Engineering of samples (e.g. static, dynamic, de-obfuscation, unpacking). In-depth File system knowledge and analysis. In-depth experience with timeline analysis. In-depth experience with Registry, event, and other log file and artifact analysis. Hands-on experience with a DFIR toolset and related scripting. Current expertise with an EDR system. One or more GIAC (e.g. GCFE, GCFA, GREM, GCIH, GASF, GNFA, etc.) or other digital forensic and/or incident response certifications. Experience in the following operating systems: Windows Operating Systems / UNIX / Mac OS X, specifically in system administration, command line use, and file system knowledge. Experience in Basic Scripting and Automation Proficient in basic scripting and automation of tasks (e.g. C/C++, Powershell, Java Script, Python, bash, etc.). Network Concepts and Understanding Working knowledge of networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection/prevention systems, encryption, load balancing, and other network protocols. Other Working knowledge of relational database systems and concepts (SQL Server, Postgre SQL, etc.). Working knowledge of virtualization products (e.g. VMware Workstation). Must have flexibility to work outside of normal business hours when necessary. Exceptional candidates from non-traditional backgrounds or who otherwise do not meet all of these criteria may be considered for the role provided they demonstrate sufficient skill and experience. ------------------------------------------------------ Job Family Group: Technology ------------------------------------------------------ Job Family: Information Security ------------------------------------------------------ Time Type: Full time ------------------------------------------------------ Citi is an equal opportunity and affirmative action employer. Qualified applicants will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Citigroup Inc. and its subsidiaries ("Citi”) invite all qualified interested applicants to apply for career opportunities. If you are a person with a disability and need a reasonable accommodation to use our search tools and/or apply for a career opportunity review Accessibility at Citi . View the "EEO is the Law " poster. View the EEO is the Law Supplement . View the EEO Policy Statement . View the Pay Transparency Posting #J-18808-Ljbffr
-
Soc incident responder
1 week ago
Singapore Citi Full timeAs a bank with a brain and a soul, Citi creates economic value that is systemically responsible and in our clients’ best interests. Our Enterprise Operations & Technology teams are charged with a mission that rivals any large tech company. Our technology solutions are the foundations of everything we do. We keep the bank safe and provide the technical...
-
Cybersecurity Specialist
1 day ago
Singapore ITCAN PTE. LIMITED Full timeJob Title: Cybersecurity Specialist - Incident ResponderAbout the Role:We are seeking an experienced Cybersecurity Specialist to join our team as an Incident Responder. As a key member of our Security Operations Center (SOC), you will be responsible for monitoring security sensors, reviewing logs, and identifying network anomalies or intrusions.Duties and...
-
SOC Analyst
1 month ago
Singapore TEKsystems (Allegis Group Singapore Pte Ltd) Full timeThe L2/L3 SOC Analyst is responsible for responding to security events, collaborating with teams to implement corrective actions, handling incident requests per SIRT protocols, and meeting service level objectives. The role requires occasional shift work and proficiency in Mandarin and English. Responsibilities: Primary or secondary handling of security...
-
SOC Incident Responder
2 weeks ago
Singapore Citi Full timeAs a bank with a brain and a soul, Citi creates economic value that is systemically responsible and in our clients' best interests. As a financial institution that touches every region of the world and every sector that shapes your daily life, our Enterprise Operations & Technology teams are charged with a mission that rivals any large tech company. Our...
-
SOC Operator
2 weeks ago
Singapore SECURITY & RISK SOLUTIONS PTE. LTD. Full timeRoles & ResponsibilitiesJob DescriptionThe SOC Operator is responsible for using best practices to identify, analyse, and support all incidents that are either impactful or potentially impactful to business, resources, the Company brand and or its employees. This position is responsible for communicating information surrounding those incidents to leadership...
-
SOC Manager
1 month ago
Singapore Eames Consulting Full timeAre you an experienced Cyber Security professional with extensive security operations experience across L1 to L3? If so, you could be the SOC Manager our client is looking for to join their team. As SOC Manager, you will be responsible for: Leading cyber security incident response from end-to-end and keeping senior management updated in a timely manner...
-
SOC Analyst
2 months ago
Singapore INFINITY CYBERSEC PTE. LTD. Full timeRoles & ResponsibilitiesJob responsibilities:· Manage and improve SOC systems and infrastructure.· Configure and troubleshoot security infrastructure devices.· Prepare and document standard operating procedures and protocols.· Identify and define system security requirements.· Advise external and internal parties on problems regarding security...
-
Cyber Incident Responder
2 weeks ago
Singapore RESOURCE CONSULTING PTE. LTD. Full timeRoles & ResponsibilitiesOur client, a company specialising in providing high-end security consulting and incident response support to organizations worldwide, is looking for a Cyber Incident Responder to join their team in Singapore.Main Responsibilities: Participate in forensic and incident response investigations, including large scale sophisticated...
-
SOC Analyst
2 days ago
Singapore CAREERALLY PTE. LTD. Full timeRoles & ResponsibilitiesThe SOC Analyst will be responsible for monitoring, detecting, and responding to security threats and incidents in a 24/7 Security Operations Center.Responsibilities: Continuously monitor and analyze system activities and security alerts from SIEM and EDR tools to identify malicious activity. Analyze security events to identify and...
-
Singapore ITCAN PTE. LIMITED Full timeRoles & Responsibilities· Act as Incident first responder for a 24/7 staffed SOC.· Monitor security sensors and review logs to identify network anomalies or intrusions.· Perform initial analysis of security alerts.· Escalate security incidents using established policies and procedures in a timely manner.· Work with customers to analysis potential...
-
Employment opportunities
2 days ago
Singapore ITCAN PTE. LIMITED Full timeRoles & Responsibilities· Act as Incident first responder for a 24/7 staffed SOC.· Monitor security sensors and review logs to identify network anomalies or intrusions.· Perform initial analysis of security alerts.· Escalate security incidents using established policies and procedures in a timely manner.· Work with customers to analysis potential...
-
Security Operations Center
2 months ago
Singapore RECRUIT EXPRESS PTE LTD Full timeRoles & ResponsibilitiesKey Responsibilities: SOC Operations:Oversee daily SOC functions, ensuring prompt monitoring, detection, and response to security events.Manage incident response, including triage, investigation, and recovery.Improve SOC procedures and workflows for efficiency. Team Leadership:Guide and mentor security analysts, providing training...
-
Senior SOC Analyst
2 weeks ago
Singapore SYNAPXE PTE. LTD. Full timeRoles & Responsibilities Conduct 24/7 continuous monitoring of security events and alerts using various security tools, such as SIEM and endpoint protection. Perform initial triage of security alerts to determine their validity and severity, identifying false positives or true positives. Conduct basic investigations of security events, including malware...
-
Soc manager
1 week ago
Singapore Randstad Full timeSoc Manager (Splunk) in Singapore Job Details Location: Singapore Specialism: Information Technology Job Type: Permanent Working Hours: Full-Time Salary: S$ 12,000 - S$ 16,000 per month Reference Number: 91 M0153772_1617018387 Contact: Josh Lim, Randstad Job Description About the Company: My client is a market leader in its industry. They are well...
-
Security Operations Center Analyst
1 month ago
Singapore TEKsystems (Allegis Group Singapore Pte Ltd) Full timeJob Title: SOC AnalystThe L2/L3 SOC Analyst is a critical role that requires a unique blend of technical expertise and soft skills. As a key member of our Security Operations team, you will be responsible for responding to security events, collaborating with teams to implement corrective actions, handling incident requests per SIRT protocols, and meeting...
-
Security Operations Center Analyst
4 weeks ago
Singapore TEKsystems (Allegis Group Singapore Pte Ltd) Full timeJob Title: SOC AnalystThe L2/L3 SOC Analyst is a critical role that requires a unique blend of technical expertise and soft skills. As a key member of our security operations team, you will be responsible for responding to security events, collaborating with teams to implement corrective actions, handling incident requests per SIRT protocols, and meeting...
-
Senior SOC Cyber Threat Analyst
1 month ago
Singapore Citi Full timeWe are seeking a highly skilled and experienced Senior SOC Analyst to join our Cyber Threat team in the Security Operations Center (SOC). The Global SOC operates in a 24x7, follow the sun model and is the firm's first line of defense against evolving cyber threats, ensuring the safety and integrity of our digital assets. This role requires an individual with...
-
SOC analyst level 1
2 days ago
Singapore ITCAN PTE. LIMITED Full timeRoles & ResponsibilitiesSOC Level 1 Monitor security sensors and review logs to identify network anomalies or intrusionsPerform initial analysis of security alertsEscalate security incidents using established policies and procedures in a timely...
-
Security System Administrator
2 weeks ago
Singapore BLUOCEAN SECURITY PTE. LTD. Full timeRoles & ResponsibilitiesGeneral Overview:As a Security System Administrator, you are responsible for the smooth security system operations for an MNC client's Security operation center (24*7 SOC center). Responsibilities may include security system monitoring, troubleshooting, analysis reporting, preventive health checking, coordinating with other parties,...
-
Cybersecurity Analyst/Engineer Position
2 weeks ago
Singapore Snaphunt Full timeThe OpportunityJoin Snaphunt's team as a Cybersecurity Analyst/Engineer, where you will be responsible for monitoring and responding to security incidents within our SOC or CSIRT environment.The RoleYou will analyze security events using frameworks like MITRE ATT&CK and OWASP to identify threats and vulnerabilities, conduct malware and exploit analysis, and...