Cyber security engineer (siem) - Yishun
HI5 CONSULTING SOLUTIONS PTE. LTD. Yishun
SIEM Implementation and Management: Design, implement, and manage SIEM solutions to monitor and analyze security event logs, detect threats, and respond to incidents.
- Cybersecurity Threat Detection: Develop and maintain threat detection rules, alerts, and dashboards to identify potential security threats.
- Incident Response: Collaborate with incident response teams to investigate and respond to security incidents, providing technical expertise and support.
- Security Monitoring: Continuously monitor security event logs, network traffic, and system activity to identify potential security threats.
- Compliance: Ensure SIEM solutions meet regulatory compliance requirements and industry standards (e.g., HIPAA, PCI-DSS, GDPR).
- Technical Collaboration: Work with cross-functional teams, including IT, development, and security operations, to ensure security solutions meet business needs.
Requirements:
- Technical Skills:
- Experience with SIEM solutions (e.g., Splunk, ELK Stack, IBM QRadar)
- Knowledge of cybersecurity threats, vulnerabilities, and attack vectors
- Familiarity with security frameworks and regulations (e.g., NIST, HIPAA, PCI-DSS)
- Strong understanding of network protocols, operating systems, and cloud security
RECRUIT EXPRESS PTE LTDToa Payoh, 11 km from Yishun
call
• Any other ad hoc duties assigned by the supervisors
Requirements:
• Bachelor's Degree or Diploma in Cyber Security, Computer Science, Computer Engineering or related field
• Relevant experience in IT industry providing network support...
TG Group Pte LtdAng Mo Kio, 7 km from Yishun
Responsibilities:
• Assist in Cybersecurity project implementations to ensure that the application development team can deliver application solutions
• Create use cases for Cybersecurity project implementations based on project documents...
HI5 CONSULTING SOLUTIONS PTE. LTD.Sembawang, 3 km from Yishun
SIEM Implementation and Management: Design, implement, and manage SIEM solutions to monitor and analyze security event logs, detect threats, and respond to incidents.
• Cybersecurity Threat Detection: Develop and maintain threat detection rules...