Your browser cookies must be enabled in order to apply for this job. Please contact [email protected] if you need further instruction on how to do that.

Incident Response Expert

Incident Response | Singapore, Singapore | Full Time

Job Description

Sygnia is a top tier cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide. Sygnia works with companies to proactively build their cyber resilience and to respond and defeat attacks within their networks. It is the trusted advisor and cyber security service provider of IT and security teams, senior managements, and boards of top organizations worldwide, including Fortune 100 companies.

 

The company has some of the world’s top talents in cyber security. The company applies technological supremacy, digital combat experience, data analytics and a business-driven mindset to cyber security, enabling organizations to excel in the age of cyber.

 

Sygnia seeks for an Incident Response Expert

The Incident Response Expert role includes conducting in-depth investigation and response to real-world cyber threats. A significant part of our investigations is performed onsite at the client location, in collaboration with the client’s IT and security teams.

 

Main Responsibilities

  • Participate in large-scale incident response investigations: conduct log analysis, host and network-based forensics and malware analysis.
  • Participate in threat hunting: proactively hunt for targeted attacks and new emerging threats in client’s networks.
  • Identify indicators of compromise (IOCs) and tools, tactics, and procedures (TTPs) to help ascertain whether and how breaches have occurred.
  • Utilize and develop tools and methodologies to improve Sygnia’s existing investigative and hunting technological stack.
  • Collaborate with IT and Security teams during investigations.
  • Generate and present a comprehensive and professional report of findings from investigations

 

Main Requirements

  • At least 3 years of a relevant experience (from military service and/or industry)
  • Bright, curios and determined team player, who strive for excellency
  • Problem solver, In-depth thinker with growth mindset.
  • Demonstrated in-depth understanding of the life cycle of advanced security threats, attack vectors and variant methods of exploration.
  • Deep technical understanding of network fundamentals and common Internet protocols
  • Solid understanding of system and security controls on at least two OSs (Windows, Linux / Unix and MacOS), including host-based forensics and experience with analyzing OS artifacts
  • Fluency with one or more scripting language (i.e. Python)
  • Multidisciplinary knowledge and competencies, such as:
    1. Hands-on experience in data analysis (preferably network traffic or log analysis) in relevant data analysis and data science platforms (Jupyter, Splunk, pandas, SQL)
    2. Familiarity with cloud infrastructure, web application and servers, android and iOS mobile platforms
    3. Experience with malware analysis and reverse engineering
    4. Familiarity with enterprise SIEM platforms (e.g. Splunk, QRadar, ArcSight)
  • Excellent communication and interpersonal skills. Fluent English, including the ability to document and explain technical information in a concise, understandable manner.
  • Willing to travel abroad (~30%)