Intern, SOC Analyst
at Ensign InfoSecurity
Singapore, Southeast, Singapore -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 16 Jul, 2024 | Not Specified | 18 Apr, 2024 | 1 year(s) or above | Fundamentals,Network Architecture,Key Management,Ccna,Encryption,Operating Systems,Itil,Cyber Security,Working Experience,Design | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
Ensign is hiring !
Responsibilities:
- Act as Incident first responder for a 24/7 staffed SOC
- Perform security monitoring, vulnerability management, data loss / policy violation prevention and threat hunting
- Monitor security sensors and review logs to identify network anomalies or intrusions
- Provide analysis from monitoring, research and assessment of security log data from a large number of heterogeneous security devices
- Escalate security incidents using established policies and procedures in a timely manner
- Liaise with Ensign customers on security intrusions, identifying root cause and recommend mitigation step(s)/ remedial action(s)
- Perform initial analysis of security events, network traffic, and logs
- Assist with the development of incident response plans, workflows, and SOPs
- Work directly with threat intelligence analysts to convert intelligence into useful detection
- Monitoring the Managed Endpoint and Detection Response (MDR) platforms and performing analysis for notifications
- Performing Response action on Managed Endpoint and Detection Response (MDR) platforms based on standardize workflow and agreement with clients.
- Act as a liaison party for configured alerts to monitor performance of security sensors and tools
- Fulfil Change Requests, Service Requests and respond to internal / external enquiries with regards to Incident Management
Requirements:
- Diploma/Degree in Information System/Information Security from a recognized institution
- 1 year of working experience in networking environment
- Basic, yet sound knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
- Basic, yet sound technical understanding of operating systems, network architecture and design
- Basic, yet sound knowledge of encryption, key management and cryptology
- Proven ability to plan and prioritize work, both their own and that of project team
- Sound understanding of organizational issues and challenges. Able to work effectively with participants at all levels in an organization
- Ability to analyze problems and determine root causes, generating alternatives, evaluating and selecting alternatives and implementing solutions
- Possess excellent writing skills and the ability to communicate to teammates as well as technical and executive level staff
- Results Oriented
- Fresh graduates with passion for cyber security are welcome and they will be enrolled in an extensive On-Job-Training (OJT) and training for professional certification.
Preferred Skills /Qualities:
- Professional information technology/security certifications such as ITIL, CCNA and CEH will be preferred but related qualification (i.e. GCIA, CISSP etc.) will be an advantage
Other Special Working Conditions:
- Able to perform 12-hour shift duties (2 days’ work with 2 off-days). Working hours: AM - 8:30am to 8:30pm; PM - 8:30pm to 8:30am. Shift patterns and duration may vary from time to time
How To Apply:
Incase you would like to apply to this job directly from the source, please click here
Responsibilities:
- Act as Incident first responder for a 24/7 staffed SOC
- Perform security monitoring, vulnerability management, data loss / policy violation prevention and threat hunting
- Monitor security sensors and review logs to identify network anomalies or intrusions
- Provide analysis from monitoring, research and assessment of security log data from a large number of heterogeneous security devices
- Escalate security incidents using established policies and procedures in a timely manner
- Liaise with Ensign customers on security intrusions, identifying root cause and recommend mitigation step(s)/ remedial action(s)
- Perform initial analysis of security events, network traffic, and logs
- Assist with the development of incident response plans, workflows, and SOPs
- Work directly with threat intelligence analysts to convert intelligence into useful detection
- Monitoring the Managed Endpoint and Detection Response (MDR) platforms and performing analysis for notifications
- Performing Response action on Managed Endpoint and Detection Response (MDR) platforms based on standardize workflow and agreement with clients.
- Act as a liaison party for configured alerts to monitor performance of security sensors and tools
- Fulfil Change Requests, Service Requests and respond to internal / external enquiries with regards to Incident Managemen
REQUIREMENT SUMMARY
Min:1.0Max:6.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Software Engineering
Diploma
Information system/information security from a recognized institution
Proficient
1
Singapore, Singapore