Security Consultant
Date: 10 Oct 2025
Location: Singapore, Singapore
Company: Singtel Group
At Singtel, we believe in the strength of a vibrant, diverse and inclusive workforce where backgrounds, perspectives and life experiences of our people help us innovate and create strong connections with our customers.
We strive to ensure all our people practices are non-discriminatory and provide a fair, performance-based work culture that is diverse, inclusive and collaborative.
Join us and experience what it's like to be with an Employer of Choice*.
Together, let's create a brighter digital future for all.
*Awarded at the HR Fest Awards 2020.
Make an Impact by:
- Point of contact for Presales and Operation.
- Collaborate with cross-functional teams to ensure alignment between product design, engineering feasibility, and management/ operation processes.
- Maintaining internal documentation and security standards to ensure operation management and security best practices are followed.
- Lead the end-to-end development of new products or services, including concept design, prototyping, validation, and operational support for the services.
- Provide standard security guidance for all new products and technologies within the organization.
- Lead and create the SOC playbook (SOAR), correlation rules and use cases for Managed Threat Detection Service.
- Proactively develop new playbooks, correlation rules and use cases for emerging threats.
- To perform regular product security assessments and threat modelling.
- Leading the tuning of the SIEM tool to reduce false positives
- Designing and implementing tools to automate and scale processes.
- Support and advise on incident detection and response processes.
- Lead and oversee the selection of technologies to support the product offering.
- Lead and work closely with suppliers, vendors, and operations teams to optimize production processes and ensure cost efficiency.
- Accountable for setting up a simulation test lab to support the product offering.
- Understand and identify customers' challenges in the cybersecurity domain.
- Translate customer needs and business requirements into technical specifications.
- Responsible for orchestrating the inter-operability of various subsystems to the main system/platform.
- Responsible in working closely with principal partners for technology knowledge transfer and technology notice broadcast such as End of Life or End of Sale.
- Test the stability of the new release firmware.
- Perform product testing and validation, analyze results, and apply design improvements.
- Accountable on reviewing and development of security products, services.
- Accountable for aligning and detailing the scope of work based on the defined service scheme SLA.
- Accountable for defining the technical parameters for Managed Services on-premises, hosted, cloud-based solutions and so on
- Accountable for defining the baseline product features for Managed Services.
- Accountable for supporting and evaluating product feature evolution, including new feature development and enhancements.
- Accountable for overseeing service performance post-launch and driving continuous improvement initiatives.
- Collect and analyse cyber threat data from internal and external sources (OSINT, commercial feeds, dark web, etc.) and identify, evaluate, and track cyber threats, campaigns, and threat actors.
- Produce and distribute threat intelligence reports tailored to technical, operational, and executive audiences.
- Enrich and validate Indicators of Compromise (IOCs), Tactics, Techniques, and Procedures (TTPs).
- Collaborate with SOC, Incident Response, and Threat Hunting teams to improve threat detection and response.
- Maintain and manage threat intelligence platforms (TIPs) and integrate threat data into SIEM/SOAR tools.
- Provide timely intelligence during security incidents and support attribution efforts.
- Monitor trends in the threat landscape and provide strategic insights to inform risk decisions.
- Participate in threat intelligence sharing communities (e.g., ISACs, CERTs).
- Develop playbooks and methodologies for threat actor tracking and threat intelligence lifecycle management.
Skills for Success:
- Degree or Post Graduate degree in Computer Science, Engineering and Information Systems.
- 3-5 years in implementation of Network and Security Projects.
- 3-5 years of relevant working experience in the area of cyber security.
- 2-3 years of information security management system (ISMS) practice.
- 2–5 years of experience in cyber threat intelligence, incident response, or related security roles.
- Strong understanding of threat intelligence frameworks (e.g., MITRE ATT&CK, Kill Chain, Diamond Model).
- Experience with threat intelligence tools and platforms (e.g., OpenCTI, Recorded Future, Intel 471, ThreatConnect).
- Good working knowledge of technical vulnerability management, application security, security technologies (system hardening, IDS/IPS, firewall, SIEM).
- GCIH (GIAC Certified Incident Handler) certification.
- GIAC Cyber Threat Intelligence (GCTI).
- Certified Ethical Hacker (CEH).
- Candidate must also be innovative, customer-focused and possess strong interpersonal and communication skills.
Are you ready to say hello to BIG Possibilities?
Take the leap with Singtel to unlock new opportunities and accelerate your growth.
Apply now and start your empowering career