The MDR Analyst/Threat Hunter will operate and enhance the Managed Endpoint Detection and Response program, conduct threat hunting and digital forensic investigations, analyze network traffic, and support incident response efforts. This role requires collaboration with clients, improvement of security metrics, and conducting research on threats and vulnerabilities.
Ensign is hiring !
Responsibilities
- Setup and operating Managed Endpoint and Detection Response (MDR) program and proposing enhancement to achieve better efficiency/ effectiveness
- Operating Network Traffic Analytics (NTA) program, identification of abnormalities in client’s environment
- Performs threat hunting within the clients’ technology environments to uncover indicators of threat activities
- Performs digital forensic preservation, legal documentation and electronic discovery for incidents and investigations
- Supports the development of tactics, techniques, and procedures in providing proactive threat hunting and analysis against the available information sources (e.g. Netflow, DNS and Firewall logs, etc.)
- Supports the identification and documentation of Indicators of Compromise (IoCs)
- Leverages internal and external resources to research threats, vulnerabilities and intelligence on various threat actors and exploitation tools and platforms
- Use an analytics platform to identify threats in the available information repositories
- Perform threat research to identify potential threat vectors and work with multi-disciplines to improve prevention and detection methods
- Identify gaps in an organisation’s measurement metrics, telemetry and logging capabilities and propose enhancement strategies to achieve the intended outcomes
- Work with client’s appointed Incident Response Management team for cyber security incidents such as data security breach, Advanced Persistent Threat (APT)
Requirements
- Bachelor’s Degree in Computer Engineering, Computer Science, Cyber Security, Information Security or other equivalents
- 1 to 3 years of experience with threat hunting
- 1 to 3 years of experience in incident response handling
- 1 to 2 years of experience with digital forensics investigations
- Experience in consulting, including both internal and client facing experiences
- Ability to obtain a security clearance
- Ability to travel 20% of the time
Preferred Skills /Qualities
- 1 to 3 years of experience supporting or providing expert witness testimonials
- 1 to 3 years of experience in data analysis
- 1 to 3 years of experience in log analysis
- 1 to 3 years of experience in reverse malware analysis
- Experience with research, technical and business documentation and analysis
- Knowledge of the Singapore Law, Singapore Government regulations and policies
- Ability to demonstrate flexibility, initiative and innovation in dealing with ambiguous, fast-paced situations
- Ability to show proficiency in one or more regional languages and dialects
- Ability to show proficiency in Microsoft Office, Power BI and Tableau
- Ability to show proficiency in Forensic Toolkits, e.g. EnCase Forensics, FTK Forensics, Magnet Forensics and Write Blockers
- Ability to show proficiency in reverse malware engineering tools, e.g. IDA Pro
- Ability to show proficiency in programming and scripting, e.g. Java, .NET Programming, Python & PERL scripting, etc
- Possession of excellent presentation and briefing skills
- Possession of excellent oral and written communication skills
- Professional certifications, including EnCE, GCIH, GCFE, GCFA, GREM, GNFA, GASF, GCTI, CISSP, or other SANS certifications
Top Skills
.Net
Java
Perl
Python
Ensign InfoSecurity Singapore Office
30A Kallang Place, #08-01, Singapore, Singapore , Singapore, 339213
Similar Jobs
Artificial Intelligence • Cloud • Sales • Security • Software • Cybersecurity • Data Privacy
The Senior Solution Engineer will work with sales teams to support direct and indirect sales efforts, engaging with partners and customers to articulate the value of SailPoint solutions. This role requires expertise in identity management and excellent communication skills to understand customer requirements and demonstrate product capabilities. Achieving set milestones in the first year is essential for success.
Top Skills:
JavaLdapSQLXML
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
As a Cloud Incident Response Consultant at CrowdStrike, you will lead cloud incident response engagements, manage projects involving Azure, AWS, or GCP, and assist clients with threat actor activity. You'll perform forensic analysis, deliver technical assessments, and present findings to stakeholders. You should have expertise in cloud security and incident response methodologies, with strong communication skills to convey complex information effectively.
Top Skills:
AWSAzureGCP
Artificial Intelligence • Fintech • Other • Automation
Join Hudson River Trading as a Senior Security Operations Engineer responsible for designing, building, and supporting solutions to impact global cyber security systems. Key responsibilities include building and maintaining security detection and response programs, analyzing network activity, and fostering cross-functional relationships.
Top Skills:
Python
What you need to know about the Singapore Tech Scene
The digital revolution has driven a constant demand for tech professionals across industries like software development, data analytics and cybersecurity. In Singapore, one of the largest cities in Southeast Asia, the demand for tech talent is so high that the government continues to invest millions into programs designed to develop a talent pipeline directly from universities while also scaling efforts in pre-employment training and mid-career upskilling to expand and elevate its workforce.