- Diploma or Degree in Information Technology or Computer Sciences, preferably with focus on cybersecurity subjects with at least 1 year of demonstrated experience in system, network, and/or application security.
- Knowledge of network and web-related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, BGP and other routing protocols)
- Knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits
- Excellent customer orientated, teamwork
- Strong sense of ownership and drive
- Basic knowledge in the information security space with emphasis on TCP/IP network security, operating system security, common attack patterns, and exploitation techniques
Cyber Security Anlayst - Singapore - JOBLINE RESOURCES PTE. LTD.
Description
Roles & ResponsibilitiesResponsiblitiies:
· Administer, manage and update cybersecurity related tickets
· Learn to be accurate and provide rapid response to security events according to standard operating procedure (SOP)
· Assist with security risk assessment, threat modelling, and vulnerability management
· Assist in security policies and procedures
· Participate in security incident responses
· Assist in identifying security issues and risks and then develop mitigation plans
· Willing to work in a rotational 24/7 ARC environment
· Assist in 1stlevel troubleshooting on security tools operational issues
· Provide analysis and trending of security log data from various security devices
· Maintain up-to-date knowledge of the IT security industry, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors
· Provide information security reporting, including security metrics as required
· Recommend solutions to mitigate risk in any activity that potentially impacts security of existing IT and information management
Requirement:
Shortlisted candidates will be offered a 1 Year Agency contract employment.
License No : 12C6060
Tell employers what skills you haveInformation Security
Troubleshooting
Remediation
Application Security
Risk Assessment
Vulnerability Management
Information Management
Exploitation
Information Technology
Penetration Testing
Routing Protocols
Network Security
UDP
BGP