Ensign is hiring !
Responsibilities
- Setup and operating Managed Endpoint and Detection Response (MDR) program and proposing enhancement to achieve better efficiency/ effectiveness
- Operating Network Traffic Analytics (NTA) program, identification of abnormalities in client’s environment
- Performs threat hunting within the clients’ technology environments to uncover indicators of threat activities
- Performs digital forensic preservation, legal documentation and electronic discovery for incidents and investigations
- Supports the development of tactics, techniques, and procedures in providing proactive threat hunting and analysis against the available information sources (e.g. Netflow, DNS and Firewall logs, etc.)
- Supports the identification and documentation of Indicators of Compromise (IoCs)
- Leverages internal and external resources to research threats, vulnerabilities and intelligence on various threat actors and exploitation tools and platforms
- Use an analytics platform to identify threats in the available information repositories
- Perform threat research to identify potential threat vectors and work with multi-disciplines to improve prevention and detection methods
- Identify gaps in an organisation’s measurement metrics, telemetry and logging capabilities and propose enhancement strategies to achieve the intended outcomes
- Work with client’s appointed Incident Response Management team for cyber security incidents such as data security breach, Advanced Persistent Threat (APT)
Requirements
- Bachelor’s Degree in Computer Engineering, Computer Science, Cyber Security, Information Security or other equivalents
- 1 to 3 years of experience with threat hunting
- 1 to 3 years of experience in incident response handling
- 1 to 2 years of experience with digital forensics investigations
- Experience in consulting, including both internal and client facing experiences
- Ability to obtain a security clearance
- Ability to travel 20% of the time
Preferred Skills /Qualities
- 1 to 3 years of experience supporting or providing expert witness testimonials
- 1 to 3 years of experience in data analysis
- 1 to 3 years of experience in log analysis
- 1 to 3 years of experience in reverse malware analysis
- Experience with research, technical and business documentation and analysis
- Knowledge of the Singapore Law, Singapore Government regulations and policies
- Ability to demonstrate flexibility, initiative and innovation in dealing with ambiguous, fast-paced situations
- Ability to show proficiency in one or more regional languages and dialects
- Ability to show proficiency in Microsoft Office, Power BI and Tableau
- Ability to show proficiency in Forensic Toolkits, e.g. EnCase Forensics, FTK Forensics, Magnet Forensics and Write Blockers
- Ability to show proficiency in reverse malware engineering tools, e.g. IDA Pro
- Ability to show proficiency in programming and scripting, e.g. Java, .NET Programming, Python & PERL scripting, etc
- Possession of excellent presentation and briefing skills
- Possession of excellent oral and written communication skills
- Professional certifications, including EnCE, GCIH, GCFE, GCFA, GREM, GNFA, GASF, GCTI, CISSP, or other SANS certifications
Top Skills
What We Do
Ensign InfoSecurity is the largest pure-play end-to-end cybersecurity service provider in Asia. Headquartered in Singapore, Ensign offers bespoke solutions and services to address their clients’ cybersecurity needs. Their core competencies are in the provision of cybersecurity advisory and assurance services, architecture design and systems integration services, and managed security services for advanced threat detection, threat hunting, and incident response. Underpinning these competencies is in-house research and development in cybersecurity. Ensign has two decades of proven track record as a trusted and relevant service provider, serving clients from the public and private sectors in the Asia Pacific region