Cyber Specialist at DSO National Laboratories
Singapore 118225, , Singapore -
Full Time


Start Date

Immediate

Expiry Date

20 Aug, 25

Salary

0.0

Posted On

20 May, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Incident Handling, Digital Forensics, Cyber Security

Industry

Information Technology/IT

Description

Responsibilities
DSO National Laboratories (DSO) is Singapore’s largest defence research and development (R&D) organisation, with the critical mission to develop technological solutions to sharpen the cutting edge of Singapore’s national security. At DSO, you will develop more than just a career. This is where you will make a real impact and shape the future of defence across the spectrum of air, land, sea, space and cyberspace.
The Digital Division leads the digital transformation of DSO through the master planning and policies, delivering digital capabilities through IT infrastructure, and providing one stop service to corporate and R&D Divisions. The Digital Division will transform the way we work, our workplace, and the capabilities we deliver to the MINDEF/SAF and for the security of Singapore.
People are DSO’s greatest asset. You will get to realise your career aspirations and develop your own niche either as a deep technical expert or a leader in the team. With frequent career dialogues and a robust training and development framework, we will provide you with the necessary development tools for you to reach your potential. You will also be recognised and rewarded through competitive remuneration packages and scholarship opportunities.
Cyber Specialist

In this role, you will:

  • Play an operational role in strengthening DSO’s security posture, ensuring a system of robust security controls
  • Perform triage and implement containment, remediation procedures for cyber security incidents; develop triage and containment tools used
  • Conduct root cause determination, and identify weaknesses exploited to resolve cyber security incidents
  • Conduct malware analysis to uncover indicators of compromise
  • Carry out forensic analysis on endpoints and network logs to supplement incident investigations
  • Interpret Cyber Threat Intel, perform cybersecurity monitoring, perform continuous threat hunting and provide early detection and actionable protection against APT
  • Cross-deploy to Information Division to deepen competencies and contribute in some parts of R&D functions in areas such as malware analysis, forensic analysis, and threat hunting
  • Conduct cybersecurity experiments using in-house or publicly available research tools or techniques
  • Implement, extend or customize cybersecurity tools to improve its effectiveness or efficiency

Requirements

  • Degree in Computer Science / Cyber Security
  • Experience in Cyber Incident Handling, Digital Forensics, Security monitoring Operation
  • Experience working in cybersecurity field / SOC or IT domains will be an advantage
  • Professional accreditation not limited to Certified Incident Handler (GCIH) or Certified Incident Handler (GCIH) will be an advantage
Responsibilities
  • Play an operational role in strengthening DSO’s security posture, ensuring a system of robust security controls
  • Perform triage and implement containment, remediation procedures for cyber security incidents; develop triage and containment tools used
  • Conduct root cause determination, and identify weaknesses exploited to resolve cyber security incidents
  • Conduct malware analysis to uncover indicators of compromise
  • Carry out forensic analysis on endpoints and network logs to supplement incident investigations
  • Interpret Cyber Threat Intel, perform cybersecurity monitoring, perform continuous threat hunting and provide early detection and actionable protection against APT
  • Cross-deploy to Information Division to deepen competencies and contribute in some parts of R&D functions in areas such as malware analysis, forensic analysis, and threat hunting
  • Conduct cybersecurity experiments using in-house or publicly available research tools or techniques
  • Implement, extend or customize cybersecurity tools to improve its effectiveness or efficienc
Loading...