Job Requirements
Job benefits
-
Medical insurance
To ensure your health and wellbeing, you have various medical plans to choose from depending on your situation and unique needs. From partial up to full medical coverage, we got you covered.
-
Team-building events
Our company simply cannot function well without teams of people working together. That said, we provide numerous team-building activities and events for you and your team to nurture meaningful relationships between every individual.
-
Vacation & Leaves
Feel a need for a short break from work? our company is quite flexible when it comes to leaves; be it for vacation, sick, personal, or mental health days. Simply discuss what you need and we will try to cater to those.
-
Professional Development
Every employee is an invaluable asset to any team; that's why we want to help you grow. Level up your skills and expertise through our professional co-development programs with notable organizations. We will cover the cost.
Skills
Job description for IT Security Analyst (Information Security Department) [NIE] at National Institute Of Education
- Respond to escalated incidents and perform deep analysis and correlate with threat intelligence to identify the threat actor, nature of the attack and systems or data affected.
- Establish, maintain and execute all components of the incident response plan, from incident intake through root cause analysis, technical remediation analysis, and reporting.
- Prioritise alerts or issues and performs triage to confirm a real security incident is taking place.
- Decide on the strategy for containment, remediation and recovery and acts on it, through conducting forensic and root cause analysis, including events based on sparse symptom detail.
- Contextualise security events within the network environment and coordinates the response activities with key staff in real-time.
- Review day-to-day alerts, industry news, threat intelligence and security data.
- Actively hunt for cyber threats that have found their way into the network, as well as unknown vulnerabilities and security gaps.
- Understand data structures and transform, analyse and visualise them to uncover cyber-attack patterns or derive meaningful insights from various sources (E.g. From private feeds, open-source data, network logs, etc.)
- Leverage on security tools to pivot from threat intelligence into enterprise data, to produce analytics and detect new or stealthy attacks.
- Enhance existing SOC processes and perform reviews to optimise existing workflows and operations within the SOC, in alignment with the business requirements and long-term strategy and planning.
- Collaborate with various IT teams in evaluating, procuring and deploying new IT security solutions.
- Bachelor’s Degree in Computer Science/Information Security or equivalent with at least eight years of progressive experience in IT security (IT infrastructure and applications) or security operation centre.
- Strong technical skills (E.g. ability to code and script; knowledge and usage of regular expressions; etc.). Experience in developing detection use cases for a variety of log types for Splunk (E.g. Security Events, Firewall).
- Experience leading and driving the investigation of complex security incidents, with strong analytical and problem-solving skills, to analyse the root-causes.
- Experience in performing digital forensics.
- Knowledge of industry standards and information security policy and frameworks.
- The possession of professional certifications such as GCIA, OSCP or Splunk would be an advantage.