Singapore Economic Development Board (EDB)
Jobs
[LTA-ITCD] LEAD / PRINCIPAL / SENIOR CYBER THREAT INTEL ANALYST
Singapore Economic Development Board (EDB)
[LTA-ITCD] LEAD / PRINCIPAL / SENIOR CYBER THREAT INTEL ANALYST
Be an Early Applicant
The role involves developing threat intelligence capabilities, conducting research on cyber threats, and supporting incident response efforts. It requires monitoring and assessing vulnerabilities, correlating intelligence with internal data, and producing analytical reports for stakeholders.
[What the role is]
[LTA-ITCD] LEAD / PRINCIPAL / SENIOR CYBER THREAT INTEL ANALYST[What you will be working on]
The Cyber Threat Intelligence Analyst will be responsible for identifying, tracking, and analysing emerging cyber threats, with a focus on protecting critical IT/OT systems in the land transportation sector. This role goes beyond passive news consumption and emphasises active threat research, transforming global threat data into localised, actionable monitoring strategies and detection logic.
Key Responsibilities
- Intelligence Programme Development: Lead the development and continuous improvement of the Threat Intelligence (TI) function, including the implementation of of Standard Operating Procedures (SOPs) and CTI solution for intelligence collection, analysis, and dissemination.
- Threat Research & Actor Tracking : Conduct proactive research into the Tactics, Techniques, and Procedures (TTPs) of threat actors, with particular focus on the Asia‑Pacific region and Industrial Control Systems (ICS).
- Monitoring List Management : Curate, validate, and maintain high‑fidelity monitoring lists, including Indicators of Compromise (IOCs), for ingestion into SIEM, EDR, and Network Traffic Analysis tools.
- Detection Engineering Support : Translate research findings into technical detection artefacts, such as YARA, Sigma, or Snort rules, to strengthen proactive threat hunting and detection capabilities.
- Incident Response Integration : Act as the Tier- 3 intelligence lead during critical incidents, providing real‑time threat context, infrastructure pivoting, and attribution support to the CERT team.
- Vulnerability Intelligence : Monitor and prioritise newly disclosed CVEs based on the organisation’s technology stack, providing actionable, risk‑based assessments to patching and infrastructure teams.
- TTP Mapping : Map observed adversary behaviours to the MITRE ATT&CK framework to identify visibility gaps and areas for improvement in existing security controls.
- Stakeholder Reporting : Produce high‑quality intelligence report/ update (including Flash Alerts) for emerging or imminent threats and monthly strategic summaries for management and public transport operators.
Technical Skills & Competencies
- OSINT & Investigation - Strong capability in conducting open‑source investigations across surface, deep, and dark web sources, including forums, code repositories, and social media, to identify leaked credentials or planned threat campaigns.
- Automation - Proficiency in scripting to build custom scrapers, automate Threat Intelligence Platform (TIP) workflows, and manage large‑scale intelligence datasets.
- Log Analysis - Ability to correlate threat intelligence with internal telemetry (e.g. proxy, firewall, EDR logs) to validate malicious activity and identify early indicators of compromise.
- Framework Knowledge - Strong understanding of MITRE ATT&CK, Diamond Model of Intrusion Analysis, and Cyber Kill Chain.
[What we are looking for]
- Knowledge in Computer Science, Computer Engineering, Information Technology or related field.
- At least 8 years of experience in cybersecurity, with at least 4 years in Threat Intelligence, Advanced SOC Operations, or Incident Response roles.
- Education - Bachelor’s degree in Computer Science, Information Security, or a related discipline.
- Professional Certifications - GIAC Cyber Threat Intelligence (GCTI) or Certified Information Systems Security Professional (CISSP)
- Desired Technical Certifications - Relevant technical certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA) or GIAC Reverse Engineering Malware (GREM) would be advantageous.
- Demonstrated track record in mentoring junior analysts and uplifting SOC/CERT capabilities.
- Strong technical writing and communication skills, with the ability to brief senior leadership and executive stakeholders on complex cyber risk matters.
- Ability to operate effectively in a cross‑matrix environment, as well as independently and decisively in a fast‑paced, high‑impact operational setting.
Singapore Economic Development Board (EDB) Singapore Office
Similar Jobs
Fintech • Payments • Financial Services
The Business Analyst - Pricing will analyze data to ensure optimal transaction costs for merchants, refine pricing models, and support fee changes across APAC markets.
Top Skills:
LookerPythonSQLTableau
Artificial Intelligence • Cloud • Security • Software • Cybersecurity
As a Senior Deal Desk Analyst, you'll support the Global Sales Team with deal structuring, quoting, and negotiation while collaborating with various teams within Datadog.
Top Skills:
CpqExcelSalesforce
Artificial Intelligence • Cloud • Security • Software • Cybersecurity
As a Manager for the Implementation Services team, you'll guide Service Architects in delivering high-quality Datadog implementations and build relationships to enhance customer satisfaction and program effectiveness.
Top Skills:
DatadogDevops MonitoringMonitoring SolutionsTechnical Architecture
What you need to know about the Singapore Tech Scene
The digital revolution has driven a constant demand for tech professionals across industries like software development, data analytics and cybersecurity. In Singapore, one of the largest cities in Southeast Asia, the demand for tech talent is so high that the government continues to invest millions into programs designed to develop a talent pipeline directly from universities while also scaling efforts in pre-employment training and mid-career upskilling to expand and elevate its workforce.


