Current jobs related to Senior Security Analyst - Singapore - Logicalis Asia Pacific


  • Singapore Nanyang Technological University Singapore Full time

    Senior IT Security Analyst (Information Security Department) (NIE) About The National Institute Of Education (nie)The National Institute of Education (NIE), Singapore , is Singapore's national teacher education institute and we are proud to be an integral part of the nation's education service. We play a key role in the preparation of teachers and in the...


  • Singapore Internal Security Department Full time

    Join to apply for the Cyber Intelligence Analyst role at Internal Security Department Continue with Google Continue with Google Join to apply for the Cyber Intelligence Analyst role at Internal Security Department What The Role Is ISD confronts and addresses threats to Singapore’s internal security and stability. For over 70 years, ISD and its predecessor...


  • Singapore Internal Security Department Full time

    Join to apply for the Cyber Intelligence Analyst role at Internal Security Department Continue with Google Continue with Google Join to apply for the Cyber Intelligence Analyst role at Internal Security Department What The Role Is ISD confronts and addresses threats to Singapore’s internal security and stability. For over 70 years, ISD and its...


  • Singapore Percept Solutions Full time

    Join to apply for the Senior Cyber Security Operation Analyst role at Percept Solutions 1 year ago Be among the first 25 applicants Join to apply for the Senior Cyber Security Operation Analyst role at Percept Solutions Get AI-powered advice on this job and more exclusive features. Job DescriptionConduct technical analysis and triage of triggered alerts...


  • Singapore Percept Solutions Full time

    Join to apply for the Senior Cyber Security Operation Analyst role at Percept Solutions 1 year ago Be among the first 25 applicants Join to apply for the Senior Cyber Security Operation Analyst role at Percept Solutions Get AI-powered advice on this job and more exclusive features. Job Description Conduct technical analysis and triage of triggered...


  • Singapore Citi Full time

    The Info Security Tech Sr Analyst is an intermediate level position responsible for leading efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security...


  • Singapore Internal Security Department Full time

    Join to apply for the Intelligence Analyst role at Internal Security Department . What The Role Is ISD confronts and addresses threats to Singapore’s internal security and stability. For over 75 years, ISD and its predecessor organisations have played a central role in countering threats such as those posed by foreign subversive elements, spies, racial...

  • Intelligence Analyst

    2 weeks ago


    Singapore Internal Security Department Full time

    Join to apply for the Intelligence Analyst role at Internal Security Department . What The Role Is ISD confronts and addresses threats to Singapore's internal security and stability. For over 75 years, ISD and its predecessor organisations have played a central role in countering threats such as those posed by foreign subversive elements, spies, racial and...


  • Singapore INCOME INSURANCE LIMITED Full time

    Roles & ResponsibilitiesThe cyber security analyst is responsible for analysing cybersecurity events, improving threat detection capabilities and procedures. If an event results in a security incident, the analyst will work with the relevant stakeholders to respond and contain the incident. This analyst role will come under the IT Risk and Security...


  • Singapore Nanyang Technological University Singapore Full time

    Senior IT Security Analyst (Information Security Department) (NIE) About The National Institute Of Education (nie)The National Institute of Education (NIE), Singapore , is Singapore’s national teacher education institute and we are proud to be an integral part of the nation’s education service. We play a key role in the preparation of teachers and in...

Senior Security Analyst

3 weeks ago


Singapore Logicalis Asia Pacific Full time

Join to apply for the
Senior Security Analyst
role at
Logicalis Asia Pacific
2 days ago Be among the first 25 applicants
Join to apply for the
Senior Security Analyst
role at
Logicalis Asia Pacific
Get AI-powered advice on this job and more exclusive features.
Why choose Logicalis?
As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.
Why choose Logicalis?
As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.
We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis' positioning as well as our strategic vision for growth.
Job Responsibilities:
Detection Engineering
Design, develop, and deploy high-fidelity detection rules in SIEM (Splunk, Microsoft Sentinel, Devo, QRadar, EDR, etc.).
Create custom use cases to detect MITRE TTPs aligned with real-world threats and red team activities.
Conduct detection gap analysis, tune alerting mechanisms, and eliminate false positives at the MSS customer environment
Perform regular fine-tuning and optimization of detection rules, correlation logic, and alert thresholds across SIEM, EDR, and other security platforms to enhance detection accuracy and reduce false positives.
Continuously assess detection efficacy based on incident feedback and threat landscape evolution, implementing improvements accordingly.
Collaborate with red/purple teams to validate detection logic and build threat-informed defenses.
Regularly review, update, and enhance detection logic to ensure alignment with the latest threat intelligence, adversary TTPs, and evolving attack techniques.
Maintain relevancy and effectiveness of security detections by incorporating insights from threat hunts, incident response cases, red team exercises, and industry best practices.
Threat Hunting and Threat Intel:
Proactively hunt for advanced threats across on-prem and cloud environments using telemetry from SIEM, EDR, NDR, and threat intelligence.
Develop hypotheses based on TTPs, threat intelligence feeds, and incident trends.
Use frameworks like MITRE ATT&CK and Diamond Model to structure hunting campaigns.
Document hunt procedures and outcomes to support knowledge sharing and continuous improvement.
Map threat actor TTPs to frameworks such as MITRE ATT&CK to support proactive defense strategies and inform detection engineering efforts.
Provide actionable threat intelligence to SOC, detection engineering, and IR teams to inform custom detection rule development, prioritization of hunts, and incident scoping
Contribute to the threat intelligence lifecycle, including direction, collection, processing, analysis, dissemination, and feedback.
Ingest, analyze, and operationalize threat intelligence from internal sources, commercial feeds, and open-source intelligence (OSINT) to enrich detection logic, threat hunting hypotheses, and incident investigations
Collaborate with internal and commercial threat intelligence teams to contextualize IOCs and TTPs for targeted and industry-specific threats.
Maintain up-to-date threat intelligence repositories and contribute to the continuous improvement of threat intel processes and playbooks
Incident Response:
Lead incident response lifecycle (detection, triage, containment, eradication, recovery).
Handle security incidents tickets escalated by Level II team, and draft security incident report covering the root cause, forensic evidence, and recommended mitigation plans
Conduct/support forensic analysis of endpoints, logs, and network traffic to determine root cause and impact.
Coordinate with internal stakeholders and external partners during critical incidents.
Develop and maintain playbooks, runbooks, and incident reports.
Digital Forensics and Incident Response (DFIR) experience is a strong added advantage, enabling deeper investigations and root cause analysis.
Collaboration & Mentorship :
Mentor and support L1/L2 SOC analysts in investigations, tool usage, and processes.
Participate in tabletop exercises and red/purple team assessments.
Lead and conduct regular customer meetings to review SOC activities, including security posture, key metrics, and ongoing initiatives.
Prepare and deliver detailed briefings on priority incidents, RCA, ensuring timely communication of root cause, impact analysis, mitigation steps, and next actions.
Act as a primary point of contact for Incident escalations and maintain consistent, professional engagement with client stakeholders.
Coordinate with cross-functional teams including Engineering, Development, Red Team, and Risk/Compliance.
Identify gaps in existing SOC process and work with team members or other departments to create, modify standard operating procedures, to automate any mundane daily operational activities, ensuring Ops are run efficiently.
Requirements:
Candidate should have at least 8-10 years of working experience in SOC and MSS environments,
Bachelor's degree in computer engineering, Computer Science, Cyber Security, Information Security, or other equivalents.
Excellent hands-on experience in implementations, incident analysis of Splunk, IBM QRadar, Azure Sentinel SIEM (Security Information and Event Management) & Devo technologies.
Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if CrowdStrike, Microsoft Defender.
Hands on experience on SOAR (Security Orchestration, Automation, and Response) technologies.
Experience in malware analysis for Windows and Linux/Mac.
Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with proven Unix (Solaris, Linux, BSD (Bumi Serpong Damai)) experience.
Knowledge of any shell scripting language and applying it to automate mundane operations tasks
Knowledge of current cyber threats, attack vectors, vulnerabilities, and threat intelligence feeds.
Ability to work effectively in a team environment, collaborate cross-functionally, and mentor junior analysts
Candidate should have at least one SANS certification. Preferred if that is GCIH
Good understanding of basic network concepts and advantages of exposure to cloud technologies.
Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL (Information Technology Infrastructure Library) standards
Lead team of security analysts, develop SOC standard operating procedures and develop Threat Intel feeds such as MISP.
Interested applicants please submit your application with your expected salary and notice period to be considered for the role.
We regret that only shortlisted candidates will be notified.
As part of any recruitment process, we collect and processes personal data relating to job applicants. We are committed to being transparent about how we collect and use that data and to meeting our data protection obligations. By applying to this post and sending us your resume, you agree to the collection, use and/or disclosure of your personal data in the manner as set out in our Data Protection Notice for Job Applicants which can be found
Logicalis is committed to protecting your privacy.
Click below to view the data protection notice. Seniority level
Seniority level Mid-Senior level
Employment type
Employment type Full-time
Job function
Job function Information Technology
Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Logicalis Asia Pacific by 2x
Get notified about new Senior Security Analyst jobs in
Singapore, Singapore .
Information Security Senior Analyst (Assistant Vice President)
Information Security Senior Analyst (Assistant Vice President)
Information Security Operations Senior Analyst (Assistant Vice President)
Cloud Information Security Technology Lead Analyst (Vice President)
Security Operations Vice President - Senior Threat Detection Engineer
Senior Splunk Engineer -Security Automation
Senior Engineer, Network Security (Palo Alto)
Contract Executive (1-year Contract), Information Security Business Analyst
AVP/Senior Associate, Cybersecurity Engineer - Machine Identity & Automation, Information Security Services, Group Technology
Senior Regulatory Compliance and Data Analyst - Stamford American International School
Business Analyst - Securities Settlement
Business Analyst - Securities (