Snaphunt Pte Ltd – Cyber Threat (SOC) Analyst

Company
Snaphunt Pte Ltd
snaphunt.com
Designation
Cyber Threat (SOC) Analyst
Date Listed
14 Oct 2024
Job Type
Entry Level / Junior Executive
Full/Perm
Job Period
Immediate Start, Permanent
Profession
IT / Information Technology
Industry
Computer and IT
Location Name
Singapore
Allowance / Remuneration
$5,000 - 8,000 monthly
Company Profile

Over the years, it has cultivated a niche in interconnecting applications from mobile and web frontends to the traditional ERP systems through middleware. Today, its best value to the customer is its experience and ability in cross-application connectivity.

To date, its business has remained as that of an outsourced IT arm to the industries.



Job Description
  • Work within a company with a solid track record of success
  • Work alongside & learn from best in class talent
  • Excellent career development opportunities

The Job

Position Summary:

As a Cyber Threat (SOC) Analyst, you will monitor and analyze security events using various cyber defense tools. You'll perform 24x7 surveillance, assess potential threats, and escalate incidents when necessary to protect the company from cyber risks.

Key Responsibilities:

  • Monitor and analyze internal and external security data to detect potential threats and vulnerabilities.
  • Identify and respond to security incidents, distinguishing between real threats and benign activities.
  • Use cyber defense tools for continuous monitoring and threat detection.
  • Develop scripts and fine-tune SIEM rules to automate threat analysis.
  • Provide incident response support and generate actionable threat intelligence.
  • Hunt for indicators of compromise (IOCs) and analyze threat actor tactics, techniques, and procedures (TTPs).

Ideal Candidate

Requirements:

  • Degree or Diploma in Computer Science, Computer Engineering, or Information Security.
  • 2+ years of experience in a SOC or CERT/CIRT environment.
  • Familiarity with network tools (ping, traceroute, nslookup) and incident response.
  • Security certifications (GSEC, GCIH, GCIA, etc.) and scripting skills (Python, Bash, PowerShell) are a plus.
  • Knowledge of OWASP Top 10, MITRE ATT&CK, Cyber Kill Chain, and DevSecOps is preferred.
  • Able to work 12-hour shifts and adapt to changing schedules.
  • This role requires strong analytical skills, cybersecurity expertise, and the ability to respond quickly to emerging threats.

Ref: 7B1EC9NW7K

This position is already closed and no longer available.  You may like to view the other latest internships here.

Related Job Searches:

Discuss this Job:

You can discuss this job on Clublance.com #career-jobs channel, or chat with other community members for free:
Share This Page