Lamaran Pekerjaan Ensign InfoSecurity (Cyber Security) Pte Ltd

Ensign InfoSecurity (Cyber Security) Pte Ltd

  • Diposting Oleh:
  • Diposting Tanggal:
  • Kategori Pekerjaan:
    Uncategorized, Fresh Graduate, Strata 1, SwastaUncategorized, Fresh Graduate, Strata 1, Swasta
  • Lokasi Kerja:
    Indonesia - Singapura
  • Pengalaman:
    0 - 5 Tahun
  • Pendidikan:
    S1
  • Sudah dilihat:
    444

Dikutip dari ITB Karir, Ensign InfoSecurity adalah penyedia layanan keamanan siber end-to-end murni terbesar di Asia. Berkantor pusat di Singapura, Ensign menawarkan solusi dan layanan khusus untuk memenuhi kebutuhan keamanan siber klien mereka. Kompetensi inti mereka adalah dalam penyediaan layanan konsultasi dan jaminan keamanan siber, desain arsitektur dan layanan integrasi sistem, dan layanan keamanan terkelola untuk deteksi ancaman tingkat lanjut, perburuan ancaman, dan respons insiden. Yang mendasari kompetensi ini adalah penelitian dan pengembangan internal dalam keamanan siber. Ensign memiliki rekam jejak yang terbukti selama dua dekade sebagai penyedia layanan tepercaya dan relevan, melayani klien dari sektor publik dan swasta di kawasan Asia Pasifik.

Lamaran Pekerjaan Ensign InfoSecurity (Cyber Security) Pte Ltd

Dilansir dari itb karir, bahwa saat ini Ensign InfoSecurity (Cyber Security) Pte Ltd sedang membutuhkan tenaga kerja baru di berbagai posisi. Berikut ini adalah daftar tenaga kerja baru Ensign InfoSecurity (Cyber Security) Pte Ltd yang dibutuhkan:

1. Endpoint Security Operation Operator

Responsibility

  • Provide day-to-day operational support and maintenance of the Cyber Security service in a 24/7 staffed Operations
  • Ensure all incident escalation are properly tracked, escalated and with proper closure
  • Implement configuration changes and process requests from clients
  • Manage and maintain the security policies for the service Manage device tuning and patching
  • Assist in troubleshooting if required
  • Monitor the infrastructure’s health and service’s availability
  • Resolve the incident tickets within the Service Level Agreement (SLA)
  • Work closely with the team lead/manager to ensure tasks are executed
  • Maintain existing operational documentation to ensure that any newest changes are captured

Requirement

  • Diploma/Degree in Information Technology or related discipline
  • Basic knowledge in Information Technology (e.g., Operating Systems, Network)
  • Knowledge in Cyber Security (e.g., Firewall, Device control, Anti-virus, etc.) is preferred
  • Ability to communicate effectively in writing or verbally
  • Meticulous self-starter with a positive attitude
  • Fresh graduates with passion for cyber security are welcome

2. Ensign InfoSecurity (Cyber Security) Pte Ltd

Job Description

            Act as Incident first responder for a 24/7 staffed SOC, reviewing and verifying system alerts

  • Assist with the development of incident response plans, workflows, and SOPs
  • Maintain security sensors and tools
  • Monitor security sensors and review logs to identify intrusions
  • Escalate security incidents using established policies and procedures
  • Perform initial analysis of security events, network traffic, and logs to engineer new detection methods, or create efficiencies when available
  • Work directly with threat intelligence analysts to convert intelligence into useful detection
  • Identify incident root cause and take proactive mitigation step
  • Perform lessons learned activities
  • Provide analysis of security log data from a large number of heterogeneous security devices
  • Review vulnerabilities and track resolution
  • Review and process threat intel reports
  • Implement detection use cases
  • Liaise with Ensign customers on security intrusions and provide swift and accurate remedial action

Requirement

  •  Diploma/Degree in Information System/Information Security from a recognized institution.
  • 1 year of working experience in networking environment.
  • Basic, yet sound knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
  • Basic, yet sound technical understanding of operating systems, network architecture and design
  • Basic, yet sound knowledge of encryption, key management and cryptology
  • Proven ability to plan and prioritize work, both their own and that of project team.
  • Sound understanding of organizational issues and challenges. Able to work effectively with participants at all levels in an organization
  • Ability to analyze problems and determine root causes, generating alternatives, evaluating and selecting alternatives and implementing solutions.
  • Possess excellent writing skills and the ability to communicate to teammates as well as technical and executive level staff
  • Results Oriented
  • Fresh graduates with passion for cyber security are welcome and they will be enrolled in an extensive On-Job-Training (OJT) and training for professional certification

Preferred Skills /Qualities

  • Professional information technology/security certifications such as ITIL, CCNA and CEH will be preferred but related qualification (i.e. GCIA, CISSP etc.) will be an advantage

 Other Special Working Conditions

  • Able to perform 12-hour shift duties (2 days’ work with 2 off-days). Working hours: AM – 8:30am to 8:30pm; PM – 8:30pm to 8:30am.  Shift patterns and duration may vary from time to time.

3. Automation Developer

Job Description

  • Responsible for managing automation/integration library.
  • Create and use test cases to assess automation ideas, based on SOC-Internal/client requests and innovative ideas.
  • Coordinate with SOC Managers/Directors to adopt and deploy new SOAR automation and playbooks
  • Administration of SOAR platforms deployed in SOCaaS client environments
  • Develop automation to integrate SOC with business processes.
  • Collaborate with the SOC users to understand, suggest workflow optimization and build required playbooks & automations.
  • Develop data connectors/integrations for SOAR and SIEM tools.
  • Investigate/troubleshoot SOAR system issues and coordinate with relevant vendors to resolve issues.
  • Actively participate in weekly cadence to report progress of automation tasks
  • Actively participate in the SOCaaS continuous improvement program.
  • Actively participate in automation road map design for SOCaaS.
Lamaran Lainnya:  Telkomsigma

Requirement

  • Experience in one or more of following areas: SOC functions, IT security, Engineering or any other related field.
  • Experience in one or more programming languages: Python, NodeJs, Shell scripting
  • Experience with Linux system administration and cloud administration
  • Ability to create and maintain test environments required for development tasks
  • Ability to manage relationships with both internal and external stakeholders
  • Ability to multi-task and prioritize with great attention to detail
  • Ability to function effectively under pressure in time sensitive situations
  • Excellent written and verbal communication skills
  • Effective presentation skills
  • Requires strong decision making, analytical, and problem-solving skills
  • Bachelor’s degree or equivalent experience in Cybersecurity is preferred
  • Be a strong team player, and have a positive learning mindset

4. SIEM Engineer

Job Description

  • Communicate effectively to both technical and non-technical audiences on log source onboarding and use case related topics.
  • Onboard log sources to SIEM as per the contracted service levels by coordinating with client and vendor contacts.
  • Parse the logs/events of onboarded log sources, verify the accuracy and the completeness of the field mapping.
  • Develop new collectors on SIEM to support log source onboarding activities
  • Integrate SIEM with other tools/applications/systems to enrich the alerts/events
  • Develop/tune SIEM rules and use-cases to ensure that threats to the environment are detected as per the client requirement and industry best practices.
  • develop custom threat detection rules based on use cases adhering to the set service level agreements
  • Actively participate in continuous improvement program to increase SOC detection capabilities and efficiency
  • Maintain the Use Case Library and responsible for lifecycle management activities of the Use Case Library
  • Troubleshoot and resolve SIEM related issues in collaboration with application owners and SIEM vendor
  • Monitor SIEM performance to proactively identify potential issues impacting the SOC services
  • Actively participate in SOC Threat Hunt program
  • Recommend security monitoring tools optimizations based on threat hunting discoveries
  • Assist in the SOC’s daily operations and provide support to incident response
  • Manage relationships with our customers’ in-house operations teams and frequently interact with client management
  • Work closely with the SOC Director to manage ongoing service delivery and onboarding of team members within the SOC

Requirement

  • Bachelors or college degree of computer science, computer engineering or other relevant degrees
  • Hands-on experience and knowledge in any of the following SIEMs Splunk, QRadar, Devo
  • Knowledge and hands-on experience with SOAR is an advantage
  • Knowledge and hands on experience on cloud operations is an advantage
  • At least 4 years of SOC operations experience
  • At least 1 year experience in SOC service transition and SIEM Management
  • Relevant industry certifications or relevant technology vendor certifications
  • Ability to perform and grow in a continuous improvement focused environment
  • Strong knowledge of Cyber Security forensics, project management, change management, technology implementation and risk analysis strategy
  • Proficient at professional communication and documentation of processes and procedures

5. Level 3 Analyst

Job Description

Duties and Responsibilities
  • Performs threat hunting within the clients’ technology environments to uncover indicators of threat activities.
  • Support SIEM use case management process
  • Supports the development of tactics, techniques, and procedures in providing proactive threat hunting and analysis against the available information sources (e.g. SaaS logs, Kubernetes  and Firewall logs, etc.).
  • Supports the identification and documentation of Indicators of Compromise (IoCs).
  • Leverages internal and external resources to research threats, vulnerabilities and intelligence on various threat actors and exploitation tools and platforms.
  • Use an analytics platform to identify threats in the available information repositories.
  • Perform threat research to identify potential threat vectors and work with multi-disciplines to improve prevention and detection methods.
  • Identify gaps in an organisation’s measurement metrics, telemetry and logging capabilities and propose enhancement strategies to achieve the intended outcomes.

Requirement

Basic Requirements
  • 1 to 3 years of experience with threat hunting
  • 1 to 3 years of experience in incident response handling

Currently doing L3 SOC analysts or been L2 senior SOC analysts (more than 1.5 years)
Cloud experience (GCP, AWS, Azure)
Experience in malware analysis for Win and Linux/Mac

Outstanding troubleshooting and investigation/hunt/curious mindset

Well verse in scripting languages (Python, Go, Powershell, Bash, etc) preferred

  • Bachelor Degree in Computer Engineering, Computer Science, Cyber Security, Information Security or other equivalents

Preferred Skills /Qualities

  • Regularly keeping up with  infosec affairs, threat landscapes and exposed to well-known threat actors
    PreferredSelf starter and independent with minimal supervision is required
    Exposed to mid/large scale of IR
  • Able to install own mini Lab from scratch if needed
  • Ability to demonstrate flexibility, initiative and innovation in dealing with ambiguous, fast-paced situations.
  • Ability to show proficiency in one or more regional languages and dialects.
  • Possession of excellent presentation and briefing skills.
  • Possession of excellent oral and written communication skills.
  • Professional certifications, including EnCE, GCIH, GCFE, GCFA, GREM, GNFA, GASF, GCTI, CISSP, or other SANS certifications.

6. Senior Security Analyst – Based in Singapore

Job Description

Ensign InfoSecurity is seeking a Senior Security Analyst who will be responsible for day-to-day security threat hunting and analysis. Reporting to our Security Operations Center Manager, you will work on threat intelligence, threat hunting and incident response that adhere to best practices and recognized control frameworks.

Lamaran Lainnya:  PT Len Railway Systems

Responsibility

  • Setup and operating Managed Endpoint and Detection Response (MDR) program and proposing enhancement to achieve better efficiency/ effectiveness
  • Operating Network Traffic Analytics (NTA) program, identification of abnormalities in user’s environment
  • Performs threat hunting within the users’ technology environments to uncover indicators of threat activities
  • Performs digital forensic preservation, legal documentation and electronic discovery for incidents and investigations
  • Supports the development of tactics, techniques, and procedures in providing proactive threat hunting and analysis against the available information sources (e.g. Netflow, DNS and Firewall logs, etc.)
  • Supports the identification and documentation of Indicators of Compromise (IoCs)
  • Leverages internal and external resources to research threats, vulnerabilities and intelligence on various threat actors and exploitation tools and platforms
  • Use an analytics platform to identify threats in the available information repositories
  • Perform threat research to identify potential threat vectors and work with multi-disciplines to improve prevention and detection methods
  • Identify gaps in an organisation’s measurement metrics, telemetry and logging capabilities and propose enhancement strategies to achieve the intended outcomes
  • Work with user’s appointed Incident Response Management team for cyber security incidents such as data security breach, Advanced Persistent Threat (APT)

Requirement

  • Bachelor’s Degree in Computer Engineering, Computer Science, Cyber Security, Information Security or other equivalents
  • 1 to 3 years of experience with threat hunting
  • 1 to 3 years of experience in incident response handling
  • 1 to 2 years of experience with digital forensics investigations
  • Experience in consulting, including both internal and user facing experiences

Preferred Skills /Qualities

  • 1 to 3 years of experience supporting or providing expert witness testimonials
  • 1 to 3 years of experience in data analysis
  • 1 to 3 years of experience in log analysis
  • 1 to 3 years of experience in reverse malware analysis
  • Experience with research, technical and business documentation and analysis
  • Knowledge of the Singapore Law, Singapore Government regulations and policies
  • Ability to demonstrate flexibility, initiative and innovation in dealing with ambiguous, fast-paced situations
  • Ability to show proficiency in one or more regional languages and dialects
  • Ability to show proficiency in Microsoft Office, Power BI and Tableau
  • Ability to show proficiency in reverse malware engineering tools, e.g. IDA Pro
  • Ability to show proficiency in programming and scripting, e.g. Java, .NET Programming, Python & PERL scripting, etc
  • Possession of excellent presentation and briefing skills
  • Possession of excellent oral and written communication skills
  • Professional certifications, including EnCE, GCIH, GCFE, GCFA, GREM, GNFA, GASF, GCTI, CISSP, or other SANS certifications

7. Threat Analyst – Based in Singapore

Job Description

  • Monitor third party security feeds, forums, and mailing lists to gather information related to the client through automated means
  • Produce intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source reporting
  • Produce actionable intelligence information for delivery to colleagues and customers in the form of technical reports, briefings, and data feeds
  • Review vulnerabilities advisories
  • Review and process threat intelligence reports
  • Perform detailed investigative works into all traffic anomalies against established, historical baselines of individual agencies. Reviewing and profiling the events of all monitored clients
  • Assess each event based on factual information and wider contextual information available
  • Review, propose and generate reports to automate or reduce low value event escalations
  • Build rules and intelligence to detect such threats and proliferate to all monitored networks. Implementing and devising detection method of such threats in our security operations through SIEM Rules, DB scripts etc.
  • Perform periodic analysis of security events, network traffic, and logs to engineer new detection methods, or create efficiencies when available
  • Supports the development of tactics, techniques, and procedures in providing proactive threat hunting and analysis against the available information sources (e.g. Netflow, DNS and Firewall logs, etc.)
  • Assist the Security Analysts with the investigative works
  • Prepare training programme for Security Analyst and conduct knowledge sharing sessions for Security Analyst
  • Fulfil Change Requests, Service Requests and respond to internal / external enquiries with regards to detection Use Case
  • Any other tasks as assigned

 Requirement

  • Degree holder with at least 5 years’ of experience in related field and capacity
  • Prior experience working in a Security Operations Centre (SOC) or Computer Emergency Response Team (CERT/CIRT).
  • Possessed deep interest in open source research and critical thinking / contextual analysis abilities
  • Investigative and analytical problem solving skills
  • An understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security;
  • Related professional cyber security certification, such as GCIA, CEH, will be preferred.
  • Experience with intelligence analysis processes, including Open Source Intelligence (OSINT) and closed source intelligence gathering, source verification, data fusion, link analysis, and threat actor.
  • Ability to research and characterize security threats to include identification and classification of threat indicators
  • Please note that this role is based in singapore
Lamaran Lainnya:  PT Telkom Indonesia

8. Security Analyst – Based in Singapore

Job Description

  • Act as a 24/7 SOC Incident first responder 
  • Perform security monitoring, vulnerability management, data loss / policy violation prevention and threat hunting
  • Monitor security sensors and review logs to identify network anomalies or intrusions
  • Provide analysis from monitoring, research and assessment of security log data from a large number of heterogeneous security devices
  • Escalate security incidents using established policies and procedures in a timely manner
  • Liaise with Ensign customers on security intrusions, identifying root cause and recommend mitigation step(s)/ remedial action(s)
  • Perform initial analysis of security events, network traffic, and logs
  • Assist with the development of incident response plans, workflows, and SOPs
  • Work directly with threat intelligence analysts to convert intelligence into useful detection
  • Monitoring the Managed Endpoint and Detection Response (MDR) platforms and performing analysis for notifications.
  • Performing Response action on Managed Endpoint and Detection Response (MDR) platforms based on standardize workflow and agreement with clients.
  • Act as a liaison party for configured alerts to monitor performance of security sensors and tools
  • Fulfil Change Requests, Service Requests and respond to internal / external enquiries with regards to Incident Management

Requirements

  • Diploma/Degree in Information System/Information Security from a recognized institution
  • At least 2 year of working experience in SOC
  • Basic, yet sound Fundamental knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
  • Basic, yet sound Fundamental knowledge technical understanding of operating systems, network architecture and design
  • Basic, yet sound Fundamental knowledge of encryption, key management and cryptology
  • Proven ability to plan and prioritize work, both their own and that of project team
  • Sound understanding of organizational issues and challenges. Able to work effectively with participants at all levels in an organization
  • Ability to analyze problems and determine root causes, generating alternatives, evaluating and selecting alternatives and implementing solutions.
  • Possess excellent writing skills and the ability to communicate to teammates as well as technical and executive level staff
  • Results Oriented

Preferred Skills /Qualities

  • Professional information technology/security certifications such as ITIL, CCNA and CEH will be preferred but related qualification (i.e. GCIA, CISSP etc.) will be an advantage

Other Special Working Conditions

  • 4-day work week from 8:30 to 8:30 (ENSOC scheduling follows a 7-days work for 2 weeks from 8:30 to 8:30.)
  • Able to perform Shift Duties.
  • Please note that working location is in singapore

9. Cyber Security Consultant (Endpoint Security) – Based in Singapore

Job Description

The incumbent is responsible for delivering information security projects that are related to Ensign’s Endpoint Security (ES) competency tower, including the execution of all project implementation activities. The competency tower’s portfolio includes:

  • Endpoint Security
  • Extended Detection & Response
  • Mobile Security
  • Application & Device Control
  • File Integrity Monitoring
  • Content Disarm and Reconstruction
  • Micro-Segmentation, etc

Responsibility

Responsibilities

  • Carry out project solutioning and deployment engagement for tower portfolio technology
  • Deploy ES solution and provide consultation with regard to the deployment as a Subject Matter Expert (SME)
  • Create technical documentation for the project deployment
  • Provide post-sales support services for corrective and preventive maintenance
  • Carry out technical enablement

Requirement

  • Good Diploma or Bachelor’s Degree in Information Technology
  • Knowledge in information security technologies & solutions such as EDR, XDR, EPP is preferred
  • At least 2 years of IT security experience
  • Experience in IT network / System administration will be a strong advantage
  • Good communication and written skills
  • Positive working attitude
  • Passionate in information security
  • Please note that the role is based in Singapore

10. Cyber Security Consultant (Advanced Analytics) – Based in Singapore

Job Description

The incumbent is responsible for delivering information security projects that are related to Advanced Analytics (AA), such as Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), Threat Intelligence Management and Vulnerability Management, including the execution of all project implementation activities.

Responsibilities

  • Carry out pre-sales engagement for projects relating to AA
  • Deploy AA related projects and provide consultation with regard to the deployment as a Subject Matter Expert (SME)
  • Develop SIEM correlation rules for security monitoring and detection of new threats
  • Develop SIEM and Threat Intelligence report templates that are useful for analysis by the customers
  • Develop playbooks for automated incident management
  • Create technical documentation for the AA deployment
  • Provide post-sales support services for corrective and preventive maintenance
  • Carry out technical enablement

Requirements

  • Good Diploma or Bachelor’s Degree in Information Technology
  • Knowledge and experience in information security technologies such as SIEM, Threat Intelligence and Vulnerability Management is preferred
  • At least 3 to 5 years of IT security experience
  • Good communication and written skills
  • Positive working attitude
  • Passionate in information security
  • Please note that this role is based in singapore

For interested applicants, please do send your resume in word.doc/PDF an email to Ms Magdalene Ho- [email protected]

Shortlisted applicants will be notified.




Rating

4

( 22 Votes )
Please Rate!
Ensign InfoSecurity (Cyber Security) Pte Ltd

Beri kami Penilaian terhadap iklan ini

Tinggalkan Balasan

Alamat email Anda tidak akan dipublikasikan. Ruas yang wajib ditandai *