A healthy, engaged and well-supported workforce are better equipped to do their best work and, more importantly, enjoy their lives inside and outside the workplace. That's why we are committed to providing an environment with your development and wellbeing at its center.
You can expect:
Flexible benefits plan including virtual doctor consultation services
Comprehensive leave benefits
Gender Neutral Parental Leave
Flexible working arrangements
25 days of annual paid leave, plus public holiday & Flexible Working Arrangement
Your key responsibilities:
Pro-actively identify threats and track threat actors, TTPs, and ongoing campaigns to produce timely actionable intelligence.
Monitor, track and manage developing threats, provide recommendations on mitigations.
Produce strategic and tactical threat assessments to support threat mitigation activities.
Analyze multiple data/intelligence sources and sets in order to identify patterns of activity that could be attributed to threats and develop informed recommendations.
Conduct analysis on files/binaries, packet captures, and supporting materials to extract relevant artifacts, observables and IOC.
Proactively drive improvements of internal processes, procedures, and workflows.
Participate in the testing and integration of new security monitoring tools.
Meet strict deadlines to deliver high quality reports on threats, findings and broader technical analysis.
Take ownership for personal career development and management, seeking opportunities to develop personal capability and improve performance contribution.
Develop and maintain relationships with internal stakeholders, external intelligence sharing communities.
Your skills and experience:
Min 5 years of experience in cybersecurity, with a focus on threat intelligence, analysis, and mitigation.
Proven background in Threat intelligence and experience in Open-Source Intelligence (OSINT) techniques.
Operational understanding of computing/networking (e.g. OSI Model & TCP/IP) with working knowledge on the functions of security technologies such as IPS/IDS, Firewalls, EDR, etc.
Bachelor's degree in computer science, networking, engineering, or other field associated with cyber, intelligence or analysis.
Working knowledge of virtual environments and cloud (e.g., vSphere, Hypervisor, AWS, Azure, GCP).
Working knowledge and keen interest in tracking prominent cyber threat actor groups, campaigns and TTPs in line with industry standards.
Experience of working with intelligence lifecycle, intelligence requirements and Mitre ATT&CK Framework.
Certifications such as CISSP, CISM, GIAC, GCTI, GCIH, GCFE, GCFA, GREM, GNFA, Security+, CEH.
Capability of explaining the characteristics and impact of threats to both technical and potentially non-technical parties.
Self-motivated, strong team player, and interested in learning new things.
Role is required to be performed on-site at One Raffles Quay office. Relevant vaccination requirements may apply.
How we'll support you:
Flexible working to assist you balance your personal priorities.
Coaching and support from experts in your team.
A culture of continuous learning to aid progression.
A range of flexible benefits that you can tailor to suit your needs.
Training and development to help you excel in your career.