COMPANY DESCRIPTION
CrimsonLogic, part of the PSA Group, is a global technology company that digitalises and simplifies global trade for businesses and governments around the world through intuitive and delightful solutions.
With over 35 years of experience advancing trade facilitation, compliance, port operations, government services and logistics, we push the boundaries of technology with insightful innovation and deep domain expertise of global trade driven by customer-centricity at our core.
Having pioneered the world's first single-window trade facilitation system, we continue to drive the digital transformation of global trade in over 40 countries with sustainable, impactful solutions for a more seamlessly connected world.
RESPONSIBILITIES
Role Purpose(s)
This individual will perform the role of level 2 security analyst in a 24x7 Security Operations Center responsible for monitoring the environment for potential security threats and incidents. This will include the identification, triaging, analysis, threat-hunting, lead incident investigation and support of remediation recommendations to mitigate the security threats and incidents.
Key Accountabilities
- Monitors, analyzes and responds to security events in a timely manner.
Job Responsibilities & Duties
- Using security tools, perform monitoring and analysis of security events of interest to detect security risks and threats.
- Create incidents and support the investigation of such incidents to not only mitigate the current threat but also prevent future occurrences.
- Document all actions taken as part of incident investigation.
- Work closely with other teams to support the incident management process.
- Provide tuning and filtering recommendations to the engineering team.
- Conduct investigations upon requests for data by the customer and/or other teams.
- Assist with the identification, creation, and refinement of the team's processes and procedures.
- Stay abreast of current threats and vulnerabilities, particularly those that may directly impact the customer.
- Conduct hunts (specialized searches) for evidence of compromise.
- Track suspicious network, application, and user behavior.
- Investigate breaches, gather evidence, and analyze data.
- Support and guide Junior analysts and engineers on investigations as required.
Key Job Competencies
- Good analytical skills.
- Result-oriented.
- Good communication skills.
- Teamwork.
Education Requirements
- Bachelor's degree or equivalent experience in a related field with 3 years of working experience.
- GCIA, GCIH or equivalent.
Working Experience Requirements
- 3 years of working experience in a relevant field.
Skills Required
- Prior experience in an operations environment as a security analyst.
- Highly independent with robust analytical skills.
- Incident Response Experience with Remediation.
- Basic OS and SIEM administration experience.
- Programming languages: KQL, Regex.
QUALIFICATIONS
- Bachelor's degree or equivalent experience in a related field with 3 years of working experience.
Please note that your application will be sent to and reviewed by the direct employer - Crimsonlogic Pte Ltd.