Position Title: SOC Analyst - IFS/SA/TLY
Company: ST Electronics (Info-Security) Pte Ltd
Business Area: Electronics

This role is focused on the detection, prevention & response to cyber security threats and alerts. This person will have the opportunity to work on technology and processes with a global reach and is an integral part of the security controls that the company uses to protect its data and intellectual property.
 
To be successful you'll need to demonstrate you have the skills and aptitude to understand and support our complex systems and processes that enable the delivery of our world-class services. This position also requires the ability to: work with a variety of different groups; communicate effectively electronically and in person, drive a problem to resolution or know when to escalate and seek assistance; work independently and as part of a team; also requires a keen attention to detail and follow through on work items.
 
Responsibilities:
  • Proactive monitoring, detection and response to known and or emerging threats.
  • Perform enrichment and gather information about high-value assets, threat landscape, and breach exposure from a myriad array of sources.
  • Conducting detailed & comprehensive investigation and triage on wide variety of security events, and recommend and implement remediation processes.
  • Perform complex data analysis in support of security event management.
  • Participation on Incident Response that includes root cause and lessons learned.
  • Identify opportunities to improve process and/or tools to ensure highest level of quality, including documentation, mentoring and training sessions.
  • Performing analysis on suspicious files
  • Participation in the development of new SIEM rules and analytics stories
  • Assist in any ad-hoc tasks when necessary
  • Participation in a 24/7 rotating shift roster
Requirements / Qualifications:
  • 2+ years working experience on SIEM/ Analytics in  a SOC environment, fresh graduates can also apply
  • 2+ years experience of one of the following:
    • Network operations or engineering , including packet analysis
    • System administration on Unix, Linux, or Windows
  • 2+ years experience with common security operations systems, Intrusion Detection Systems (IDS/IPS), Security Incident Event Management systems (SIEM), anti-virus log collection systems, etc.
  • Demonstrated experience with a wide variety of security logs to detect and resolve security issues.
  • Familiarity with current legal and regulatory standards and requirements around information security and privacy, including ISO , ITIL,  PCI, SOX, HIPAA, etc
  • Experience with security events, including participation in large-scale breaches and the ability to identify themes and trends out of large datasets.
  • Possesses relevant professional certifications
  • Strong problem resolution, judgment and decision making skills
  • Fosters proactive and cooperative relationships within own team and other individuals/groups that interface with the team.
  • Excellent interpersonal and group dynamic skills.
  • Highly developed analytical and problem solving skills.
  • Ability to deal with the ambiguity associated with working in a fast paced and changing environment
  • Excellent written and oral communication skills.
  • Degree or Diploma in Computer Science, IS, or related field or three years of equivalent experience
Highly Preferred:
  • Understanding of or exposure to multiple programming languages a plus
  • Knowledge and/or experience in reverse engineering of software is a plus
  • Experience in developing correlations between disparate event sources and databases
 
Back to Job Listing