Threat Prevention Engineer

1 week ago


Singapore SMART INFORMATION MANAGEMENT SYSTEMS PRIVATE LIMITED Full time

**Executive Summary**

Smart IMS Inc provides Digital technology & Cloud transformation services, Application & Infrastructure Management Services, Unified Communications, and Insurance implementation services to customers across the Americas, Europe, Middle East, and Asia-Pacific regions. As the trusted technology and business partner of leading MNCs, including Global Investment Banks, Smart IMS is also a Microsoft Gold Certified Partner, Oracle Platinum Partner and AWS MSP Partner.

We are looking to hire a **Threat Prevention Engineer**to support our client in Singapore which is a top **global investment bank**. This role will provide technical expertise and guidance within the Perimeter Security and Threat Prevention (network web proxy and malware detection technologies) domains through the delivery of consulting services for internal clients and projects. As part of the consulting function, the consulting engineer will ensure compliance with security standards, design principles and best practices.

**Position Summary**:
Must be a strong engineering minded individual with polished collaboration, written, and communication skills and a proven track record interacting with various levels of management, clients, and technical team members in delivering Perimeter and Threat technical solutions

**Key Responsibilities**:
Lastly, this engineer will also be a Level 3 point of escalation, technical support for complex change implementations and major incidents related to Threat Prevention domains.

**Required Skills**:

- At least 7+ years of hands-on experience with large scale, complex network/DMZ environments preferably in the banking and finance industry
- Strong technical knowledge and hands-on experience on network web proxy or Content Filtering including McAfee WebGateway
- Experience of proxy PAC file engineering, network firewall policy /NAT engineering, DLP and malware scanning, local & site load balancing technology is an advantage
- Strong expertise in networking and network security protocols including HTTP, HTTPS, SSH, FTP, Socks, PAC files, DNS, NTP, ANYCAST services, and others
- Experience reporting, searching and or dashboarding data in Splunk
- Advanced networking troubleshooting skills and incident triaging including taking and analyzing traffic packet captures, policy research, traffic logs and system log reviews
- Strong analytical, troubleshooting and problem-solving skills and ability to collaborate with other technical areas to define complex configuration designs
- Experienced in Incident support, including managing high severity/urgent incidents, incident triaging with other network teams and vendors
- Excellent customer facing communication skills for customer support and knowledge of ITIL best practices
- Must be able to communicate at different organizational levels including senior management to provide status updates, deliver requirements and report details at the correct level
- Willing to work some irregular hours based on the needs of project deployment window and the location of clients

**Desired Skills**:

- B.S. degree in Computer Science, Engineering, Business, or equivalent preferred with at least 7+ years of proven experience in Network Security or CyberSecurity environments
- Experience in Web Content filtering and Threat Prevention technologies such as Bluecoat Proxies, McAfee WebGateway proxies, F5 LTM, F5 SSLO, FireEye, Vontu, McAfee DLP, VMWare NSX defender or similar solutions is highly desired
- Knowledge of web connectivity and proxying technologies, WCCP/ITD, explicit or transparent proxy, reverse proxy
- Knowledge of authentication protocols such as LDAP, Kerberos, IWA, IWA-direct, SSO, Active Directory
- Ability to manage and manipulate large data sets, databases, and reports with high attention to details and data accuracy
- Experience with ITIL processes such as change management, request management and incident management is preferred
- At least one professional level certification in Web Content filtering technologies, Network Security or Networks such as CCNA Security, CCNP, BCCPA, BCCPP, CISSP, CISA, CCSP, CEH



  • Singapore SMART INFORMATION MANAGEMENT SYSTEMS PRIVATE LIMITED Full time

    **Key Responsibilities**: - Provide technical consulting for Threat Prevention (Web Proxy) solutions, traffic analysis, and the design of proxy policies and firewall/load balancing policies. - Participate in the build, migration, and global rollout of Threat Prevention infrastructure. - Collaborate with project teams, managing multiple engagements and...

  • Threat Hunter

    1 week ago


    Singapore ENSIGN INFOSECURITY (CYBERSECURITY) PTE. LTD. Full time

    **Duties and Responsibilities** - Performs threat hunting within the clients’ technology environments to uncover indicators of threat activities. - Performs digital forensic preservation, legal documentation and electronic discovery for incidents and investigations. - Supports the development of tactics, techniques, and procedures in providing proactive...

  • Endpoint Engineer

    1 week ago


    Singapore ASTEK SINGAPORE INNOVATION TECHNOLOGY PTE. LTD. Full time

    Role: Endpoint Engineer Overview The Endpoint Engineer will be responsible for designing, implementing, and maintaining security policies and controls across the organization's IT infrastructure. This role requires strong technical expertise in endpoint and network defense, hands-on policy management, and the ability to analyze, mitigate, and prevent...

  • Endpoint Engineer

    1 week ago


    Singapore Refine Group Full time

    Role: Endpoint Engineer The Endpoint Engineer will be responsible for designing, implementing, and maintaining security policies and controls across the organization's IT infrastructure. This role requires strong technical expertise in endpoint and network defense, hands‐on policy management, and the ability to analyze, mitigate, and prevent security...


  • Singapore IMDA Full time

    Threat Intelligence Analyst Apply locations IMD - Mapletree Business City, MBC BLK 10 time type Full time posted on Posted 12 Days Ago job requisition id JR- . Responsibilities Work with a team of Threat Intelligence analysts to maintain situational awareness for Infocomm and Media sectors. Keep abreast with related threat groups' tactics and techniques and...


  • Singapore Quess Corp Limited Full time

    **Job Information**: Industry **Insurance** *** Salary **7000-7500** *** Work Experience **2-4 Years** *** City **singapore** *** State/Province **singapore** *** Country **Singapore** *** Zip/Postal Code **189557** *** - Conduct investigations by analyzing and verifying information through various investigative techniques, internal resources,...


  • Singapore INCOME INSURANCE LIMITED Full time

    The insider threat analyst is responsible for researching, triaging, and investigating anomalous events of concern using Behavior Analytical tools, Splunk, and other tools to determine potential malicious or risky insider activity. This analyst role will come under the IT Risk and Security department reporting to the Security Operations Manager. **Key...


  • Singapore Experis Full time

    Looking Senior Threat Detection Engineer to join the Global Security Incident Response Team (GSIRT) Security Operations Center (SOC), responsible for threat detection content development, threat hunting, and innovation in the areas of intrusion analysis, detection, and related activities. **What you will be doing** - Investigate and review computer...


  • Singapore INNOVATIVE CONSULTING PTE. LTD. Full time

    Description: The insider threat analyst is responsible for researching, triaging, and investigating anomalous events of concern using Behavior Analytical tools, Splunk SIEM, and other tools to determine potential malicious or risky insider activity. This analyst role will come under the IT Risk and Security department reporting to the Security Operations...


  • Singapore IT CONSULTANCY & SERVICES PTE LTD Full time

    Analyzing and verifying information through various investigative techniques, internal resources, forensics, and Insider threat tools such as Data Loss Prevention, End Point Detection and Response, Network Traffic Analysis & Deceptive Technology to detect malicious lateral movement & Privilege escalation in On-prem and Cloud environment.Experience using...