Senior Security Analyst
5 days ago
The Senior Security Analyst (L3) is a key member of the Security Operations Center (SOC), responsible for advanced detection engineering, proactive threat hunting, incident response leadership, and mentoring of junior analysts. The incumbent will ensure the organization maintains a robust and adaptive defense posture against sophisticated cyber threats. Key Responsibilities Design, develop, and deploy high-fidelity detection rules across SIEM platforms such as Splunk, Microsoft Sentinel, IBM QRadar, and Devo. Create custom use cases to detect MITRE ATT&CKaligned TTPs based on real-world threats and red team activities. Conduct detection gap analysis, tune alert mechanisms, and reduce false positives across MSS customer environments. Perform regular tuning and optimization of detection logic and correlation rules to enhance accuracy and reduce noise. Continuously assess and refine detection efficacy based on incident feedback and threat evolution. Collaborate with red/purple teams to validate detection logic and enhance threat-informed defenses. Maintain alignment of detection logic with the latest threat intelligence and industry best practices. Proactively hunt for advanced threats across on-premises and cloud environments using telemetry from SIEM, EDR, and NDR tools. Develop hypotheses for hunting campaigns based on TTPs, intelligence feeds, and incident trends. Use frameworks such as MITRE ATT&CK and the Diamond Model to structure hunting activities. Ingest, analyze, and operationalize threat intelligence from internal, commercial, and open-source sources (OSINT). Collaborate with internal and external intelligence teams to contextualize IOCs and TTPs. Contribute to the threat intelligence lifecycle (collection, analysis, dissemination, feedback). Maintain updated threat intelligence repositories and support continuous improvement of intelligence playbooks. Lead the full incident response lifecycle, including detection, triage, containment, eradication, and recovery. Investigate and analyze incidents escalated by L1/L2 SOC analysts, determining root causes and impact. Conduct forensic investigations on endpoints, logs, and network data to identify indicators of compromise. Coordinate with internal stakeholders and external partners during critical security incidents. Prepare detailed incident and root cause analysis (RCA) reports with remediation and mitigation recommendations. Develop and maintain incident response playbooks, runbooks, and procedures. Mentor and guide L1/L2 SOC analysts in advanced investigations and tool usage. Lead customer meetings to review SOC performance, security posture, and ongoing initiatives. Present key metrics, RCA summaries, and incident reports to customers and management. Participate in tabletop exercises and red/purple team assessments. Act as the primary escalation point for major incidents and client communications. Identify process gaps and drive improvements or automation within SOC operations. Collaborate with cross-functional teams including Engineering, Development, and Compliance to ensure cohesive defense strategies. Essential Qualifications Minimum of 8–10 years of experience in SOC or Managed Security Services (MSS) environments. Bachelor’s Degree in Computer Science, Cybersecurity, Information Security, or equivalent discipline. Proven hands‐on experience with SIEM technologies (Splunk, Microsoft Sentinel, IBM QRadar, Devo). Strong knowledge and experience with EDR/EPP platforms such as CrowdStrike and Microsoft Defender. Experience with SOAR technologies and security automation workflows. Understanding of malware analysis across Windows, Linux, and macOS environments. Exposure to firewall technologies including Cisco, Palo Alto, Checkpoint, and Fortinet. Proficiency in Windows and Linux environments, including Unix-based troubleshooting. Practical experience with scripting (Python, PowerShell, or shell scripting) for task automation. Knowledge of current cyber threats, vulnerabilities, and attack vectors. Strong team collaboration and leadership abilities, with proven mentoring experience. At least one SANS certification (GCIH preferred). Familiarity with ITIL standards and structured SOC operations. Ability to develop and maintain SOC standard operating procedures and custom threat intelligence feeds (e.g., MISP). Desirable Qualifications Experience performing vulnerability assessments and reporting findings to business stakeholders. Familiarity with threat hunting techniques and proactive detection strategies. Expertise in network security technologies (IDS/IPS, VPNs). Working knowledge of cloud security platforms (AWS, Azure, Google Cloud). Understanding of compliance frameworks such as GDPR, NIST, and PCI-DSS. Experience in forensics, incident response, and penetration testing. Advanced proficiency in automation and scripting for operational efficiency. Strong analytical and troubleshooting skills, particularly during high‐severity incidents. To apply, simply click the Apply button or send your updated profile to EA Licence No.:18S9405 / EA Reg. No.:R Percept Solutions is expanding and actively seeking talented individuals. We encourage applicants to follow Percept Solutions on LinkedIn at to stay informed about new opportunities and events. #J-18808-Ljbffr
-
Cyber Intelligence Analyst
1 day ago
Singapore Internal Security Department Full timeJoin to apply for the Cyber Intelligence Analyst role at Internal Security Department Continue with Google Continue with Google Join to apply for the Cyber Intelligence Analyst role at Internal Security Department What The Role Is ISD confronts and addresses threats to Singapore's internal security and stability. For over 70 years, ISD and its predecessor...
-
Senior Cyber Security Operation Analyst
1 day ago
Singapore Percept Solutions Full timeJoin to apply for the Senior Cyber Security Operation Analyst role at Percept Solutions 1 year ago Be among the first 25 applicants Join to apply for the Senior Cyber Security Operation Analyst role at Percept Solutions Get AI-powered advice on this job and more exclusive features. Job Description Conduct technical analysis and triage of triggered alerts...
-
Intelligence Analyst
1 day ago
Singapore Internal Security Department Full timeJoin to apply for the Intelligence Analyst role at Internal Security Department . What The Role Is ISD confronts and addresses threats to Singapore's internal security and stability. For over 75 years, ISD and its predecessor organisations have played a central role in countering threats such as those posed by foreign subversive elements, spies, racial and...
-
Senior Security Intelligence Analyst
4 days ago
Singapore Control Risks Full timeControl Risks' Embedded Consulting practice is growing in Singapore and we have a great opportunity for a Senior Intelligence Analyst to join us as part of a dedicated team, embedded within a high profile, international technology company. The Senior Security Intelligence Analyst will be a key member of the Global Security Intelligence team as they collect,...
-
Senior Security Analyst
1 week ago
Singapore Income Insurance Limited Full time**Responsibilities**: - Proven experience using analytical and data visualization tools to automate the analysis and provide insights of large dataset and correlate with SIEM and other sources of information (such as UBA, Directory services, Cloud Trail logs) and conduct investigative works into all traffic anomalies against established, historical...
-
Senior Security Analyst
1 week ago
Singapore Income Insurance Limited Full timeResponsibilities: Proven experience using analytical and data visualization toolsto automate the analysis and provide insights of large dataset and correlate with SIEM and other sources of information (such as UBA, Directory services, Cloud Trail logs) and conduct investigative works into all traffic anomalies against established, historical baselines to...
-
Security Analyst 3
1 day ago
Singapore Oracle Full timeJoin to apply for the Security Analyst 3role at Oracle Join to apply for the Security Analyst 3role at Oracle Get AI-powered advice on this job and more exclusive features. Job Description We are looking for professionals with experience protecting critical infrastructure to help us defend Oracle cloud infrastructure. Our team is skilled in threat hunting,...
-
Senior Network Security Analyst
2 days ago
Singapore IT WORLD PTE. LTD. Full time**Location: Singapore **Salary: $5,850 - $7,500 per month **Job Description: **Responsibilities: - Design and implement network security solutions to protect our organization's systems and data - Monitor and analyze network traffic for signs of malicious activity - Investigate and respond to security incidents - Conduct security assessments and penetration...
-
Senior Financial Planning Analyst
1 week ago
Singapore SECURITY & RISK SOLUTIONS PTE. LTD. Full timeFP&A Analyst / Senior FP&A Analyst (Finance Business Partner) **Department**:Finance **Reports to**:Chief Financial Officer (CFO) **Location**:Singapore **Position Overview** Security & Risk Solutions Pte Ltd is seeking a highly analytical and business-savvy FP&A Analyst / Senior FP&A Analyst to join our Finance team. This role functions as a key...
-
Security Engineer Analyst
19 hours ago
Singapore NodeFlair Full time**Job Summary**: **Job Type** **Seniority** **Years of Experience** Information not provided The Security Engineering Analyst supports the Security Engineering function, helping the development of Security design and implementation of Infrastructure, Applications, Network, Information Assets and performing Threat Hunting within Teleperformance. Also,...