Position Title: SOC Forensics Analyst - IFS/SFA/TLY
Company: ST Electronics (Info-Security) Pte Ltd
Business Area: Electronics
This is a role whereby the candidate will focus primarily on digital forensics and at the same time learn, understand and apply the knowledge/skills to detect, prevent and respond to cyber security threats and alerts. This person will have the opportunity to work on technology and processes with a global reach and is an integral part of the security controls that the company uses to protect its data and intellectual property.
To be successful you'll need to demonstrate you have the skills and aptitude to understand and support our complex systems and processes that enable the delivery of our world-class services. This position also requires the ability to: work with a variety of different groups; communicate effectively electronically and in person, drive a problem to resolution or know when to escalate and seek assistance; work independently and as part of a team; also requires a keen attention to detail and follow through on work items.

Job Description:
comprehensive evaluation of various new cyber forensic related technologies by integrating and operating them 
Acquire evidence using forensically-sound methods
Perform in-depth investigation and analysis to determine the root cause of an incident
Write technical reports detailing the root cause analysis
Provide recommendations to prevent occurrence of similar incidents
Ad-hoc search for IOC in the enterprise environment
Proactive monitoring, detection and response to known and or emerging threats.
Perform enrichment and gather information about high-value assets, threat landscape, and breach exposure from a myriad array of sources.
Conducting detailed & comprehensive investigation and triage on wide variety of security events, and recommend and implement remediation processes.
Perform complex data analysis in support of security event management.
Participation on Incident Response that includes root cause and lessons learned.
Identify opportunities to improve process and/or tools to ensure highest level of quality, including documentation, mentoring and training sessions.
Performing analysis on suspicious files
Participation in the development of new SIEM rules and analytics stories
Participation in a 24/7 rotating shift roster

Job Requirements:
Degree or Diploma in Computer Science, IS, or related field or three years of equivalent experience
2+ years working experience on SIEM/ Analytics in  a SOC environment, fresh graduates can also apply 
2+ years experience with common security operations systems, Intrusion Detection Systems (IDS/IPS), Security Incident Event Management systems (SIEM), anti-virus log collection systems, etc.
Demonstrated experience with a wide variety of security logs to detect and resolve security issues.
Familiarity with current legal and regulatory standards and requirements around information security and privacy, including ISO , ITIL,  PCI, SOX, HIPAA, etc
Experience with security events, including participation in large-scale breaches and the ability to identify themes and trends out of large datasets.
Possesses relevant professional certifications 
Strong problem resolution, judgment and decision making skills
Highly developed analytical and problem solving skills.
Degree or Diploma in Computer Science, IS, or related field or three years of equivalent experience
 
Highly Preferred:
Understanding of or exposure to multiple programming languages a plus
Knowledge and/or experience in reverse engineering of software is a plus
We regret that only shortlisted candidates will be notified.
Back to Job Listing