
Security Operations Associate - Data Loss Prevention and Insider Threat Analyst
- Singapore
- Permanent
- Full-time
- Perform daily real-time monitoring and analysis of internal security events adhering to standard operating procedures to ensure timely detection and response.
- Review network and endpoint DLP events to assess risk and impact, delivering findings in a clear and concise manner.
- Conduct thorough security investigations, analyzing logs, network traffic, and other data sources to identify root causes, assess impact, and gather evidence for response and mitigation.
- Collaborate with cross-functional teams to develop and implement coordinated security strategies, policies, and procedures, while educating employees on best practices.
- 2+ years of experience in cybersecurity operations or a related field, with a focus on DLP and insider threat detection.
- Bachelor Degree in Computer Science/Information Systems/Engineering or related disciplines
- Demonstrate experience in network traffic analysis, PCAP analysis and log analysis to identify anomalous behavior associated with insider threats and respond to security incidents.
- Strong Investigative mindset with the ability to follow data and build cases, supported by foundational knowledge of cybersecurity practices, operations, risk management processes, principles, architectural requirements, engineering, threats, and vulnerabilities, including incident response methodologies.
- Proficiency in using Splunk or similar for log analysis, developing queries, correlations, dashboards and automation.
- Strong analytical skills, ability to interrogate large data sets and interpret various security, application and system logs.
- Ability to collaborate with high-performing Agile teams and individuals throughout the firm to achieve goals.
- Knowledge of Data Loss Prevention (DLP), including experience developing risk-aligned DLP monitoring rules, familiarity with DLP systems and products, or experience on a security assurance operations team performing DLP triage operational functions.
- Foundational knowledge of computer forensics, legal, government, and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing.
- Foundational knowledge of cloud computing, computer network defense, external organizations and academic institutions dealing with cybersecurity issues, financial authorities and regulations, identity management, incident management, information assurance, information management, information systems, network security, and infrastructure design.
- Ability to analyze vulnerabilities, threats, designs, procedures, and architectural design, producing reports and sharing intelligence.
- Knowledge and experience related to Insider Threat monitoring and operations.
- Proficiency in scripting to automate tasks, implement controls, and manipulate data.
- Possession of recognized industry certifications such as CISSP, CISM, CISA, CCSP, CSX-S, CSX-E would be desirable