Ensign is hiring !
Responsibilities
Setup and operating Managed Endpoint and Detection Response (MDR) program and proposing enhancement to achieve better efficiency/ effectivenessOperating Network Traffic Analytics (NTA) program, identification of abnormalities in client’s environmentPerforms threat hunting within the clients’ technology environments to uncover indicators of threat activitiesPerforms digital forensic preservation, legal documentation and electronic discovery for incidents and investigationsSupports the development of tactics, techniques, and procedures in providing proactive threat hunting and analysis against the available information sources (e.g. Netflow, DNS and Firewall logs, etc.)Supports the identification and documentation of Indicators of Compromise (IoCs)Leverages internal and external resources to research threats, vulnerabilities and intelligence on various threat actors and exploitation tools and platformsUse an analytics platform to identify threats in the available information repositoriesPerform threat research to identify potential threat vectors and work with multi-disciplines to improve prevention and detection methodsIdentify gaps in an organisation’s measurement metrics, telemetry and logging capabilities and propose enhancement strategies to achieve the intended outcomesWork with client’s appointed Incident Response Management team for cyber security incidents such as data security breach, Advanced Persistent Threat (APT)Requirements
Bachelor’s Degree in Computer Engineering, Computer Science, Cyber Security, Information Security or other equivalents1 to 3 years of experience with threat hunting1 to 3 years of experience in incident response handling1 to 2 years of experience with digital forensics investigationsExperience in consulting, including both internal and client facing experiencesAbility to obtain a security clearanceAbility to travel 20% of the timePreferred Skills /Qualities
1 to 3 years of experience supporting or providing expert witness testimonials1 to 3 years of experience in data analysis1 to 3 years of experience in log analysis1 to 3 years of experience in reverse malware analysisExperience with research, technical and business documentation and analysisKnowledge of the Singapore Law, Singapore Government regulations and policiesAbility to demonstrate flexibility, initiative and innovation in dealing with ambiguous, fast-paced situationsAbility to show proficiency in one or more regional languages and dialectsAbility to show proficiency in Microsoft Office, Power BI and TableauAbility to show proficiency in Forensic Toolkits, e.g. EnCase Forensics, FTK Forensics, Magnet Forensics and Write BlockersAbility to show proficiency in reverse malware engineering tools, e.g. IDA ProAbility to show proficiency in programming and scripting, e.g. Java, .NET Programming, Python & PERL scripting, etcPossession of excellent presentation and briefing skillsPossession of excellent oral and written communication skillsProfessional certifications, including EnCE, GCIH, GCFE, GCFA, GREM, GNFA, GASF, GCTI, CISSP, or other SANS certifications