SOC Analyst at Flintex Consulting Pte Ltd
, , Singapore -
Full Time


Start Date

Immediate

Expiry Date

26 Mar, 26

Salary

0.0

Posted On

26 Dec, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Network Security, Web Security, Endpoint Security, Threat Monitoring, Vulnerability Management, Cloud Security, Identity Management, Threat Hunting, Digital Forensics, Risk Mitigation, Threat Detection, Security Alerts, Security Incidents, Cyber Projects, Threat Landscape, Security Posture

Industry

Staffing and Recruiting

Description
Roles and Responsibilities • Monitor network traffic, system logs, and security alerts to identify potential security incidents and unauthorized activities in a timely manner • Design, deploy, and manage threat detection rules and preventive security controls to safeguard critical systems and data in response to the latest threat landscape • Perform in-depth analysis of security events to determine the nature and scope of potential security incidents and recommend risk mitigation strategies. When necessary, carry out digital forensic for reporting and auditing purposes • Contribute in threat hunting exercises or cyber projects to improve overall security posture Qualifications & Experience • Technical know-how and experience in solutions such as but not limited to: o Network Security (F/W, IPS, VPN, NAC) - Fortigate, Palo Alto o Web Security (WAF, Web isolation) - Cloudflare, Zscaler, Microsoft o Endpoint Security (EDR, AV, DLP) - Crowdstrike, Microsoft o Threat Monitoring - Qradar, GoogleSec Ops, Resilient, Claroty o Vulnerability Management – Tenable, Ivanti, Microsoft o Cloud Security – Microsoft, Palo Alto o Identity Management - Microsoft, CyberArk o Threat Hunting and Simulation – Cymulate, Crowdstrike • Minimum 3 years of relevant experience in SOC environment
Responsibilities
The SOC Analyst will monitor network traffic and security alerts to identify potential security incidents. They will also design and manage threat detection rules and perform in-depth analysis of security events.
Loading...