Apply on
Original
Simplified
Ensign is hiring !
Responsibilities
- Follow up and track all events/incidents until closure
- Perform initial triage of cyber threat intelligence to assess relevance of technical indicators (IOC) to organizational assets.
- Perform escalation of suspicious security incident after verification with a senior security analyst
- Respond to on-call escalation after office hours
- Validation of event against change or access request system(s)
- Support all audit fieldwork require by appointed auditors when necessary.
- Assist cybersecurity team on all related cyber security remediation activities.
- Manage all use cases, reports and dashboards on SIEM platform.
- Manage all playbooks, automation scripts, integrations, dashboards and reports on SOAR platform.
- Perform review to detect and identify any suspicious activities.
Requirements
- Degree/Diploma in IT, Cybersecurity or a related field of study.
- 3-7 years of relevant experience in cybersecurity operations.
- Knowledge in network, Linux and Windows infrastructure.
- Knowledge in Cloud infrastructure.
- Knowledge and experience in SIEM and SOAR platforms.
- Experience working in SOC environment.
- Experience in security, network and cyber threat analysis.
Preferred Skills / Qualities
- Experience working in financial services sector would be advantageous.
- Professional information technology/security certifications such as ITIL, CCNA and CEH will be preferred but related qualification (i.e. GCIH, GCIA, CISSP etc.) will be an advantage
Other Special Working Conditions
- You may be required to work either at Ensign’s or a client’s work premise. As such, you may be required to adhere to any telecommuting working arrangements when required.
- You may be required to perform 12-hour shift duties (2 days’ work with 2 off-days) if you are not seconded to a client. Shift working hours are from 0830H to 2030H, and 2030H to 0830H. Shift patterns and duration may vary from time to time
Similar Jobs