×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Threat and Incident Response Analyst; Remote

Remote / Online - Candidates ideally in
Singapore
Listing for: Propine
Remote/Work from Home position
Listed on 2026-01-10
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 60000 - 80000 SGD Yearly SGD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Threat and Incident Response Analyst (Remote)

Work should be challenging.

Your work should challenge the status quo.

You should be defining the future, not being dependent on it.

You don't like it safe and prefer to swim in the deep end while figuring things out.

You want to be avant-garde.

If this resonates with you, then you'll fit right in here at Propine.

Propine is re-inventing capital markets using blockchain technology. We've worked with the Monetary Authority of Singapore (MAS) to become the first licensed custodian for digital assets in the world.

We are re-imagining the issuance and lifecycle management of capital market products like equities, debt, structured products, and funds using blockchain technology to reduce friction and increase value for issuers and investors.

This role requires a 'do-whatever-it-takes' mindset and the ability to operate just outside your comfort zone. If this excites and slightly unnerves you, you might be the right fit.

Seniority: Associate

Position Title: Threat and Incident Response Analyst

Job Description:

We seek a highly motivated and skilled Threat and Incident Response Analyst to join our information security team. The ideal candidate will be passionate about security and eager to work with the latest tools to investigate and respond to attacks.

Responsibilities:

  • Identify and analyze cybersecurity threats impacting the organization.
  • Proactively discover new attacks using advanced security monitoring tools.
  • Investigate and respond to security incidents following a defined process.
  • Create playbooks and response processes.
  • Collaborate with engineering to automate incident responses.
  • Update detection and response capabilities based on emerging threats.
  • Perform threat modeling across organizational technologies and applications.
  • Identify relevant data sources and onboard them to the SIEM platform.
  • Operate and administer the SIEM platform.
  • Utilize security tools like SIEM, EDR, WAF, IDS, and Netflow.
  • Manage threat intelligence feeds for security event correlation.
  • Participate in 24x7 on-call support for security operations.
  • Qualifications:

    • 5-7 years in security/threat analysis, detection, and prevention technologies.
    • Strong analytical skills and a proactive learning attitude.
    • Deep knowledge of Unix/Linux, Windows, AD, Databases, Cloud, and Dev Ops.
    • Experience with endpoint and network security tools such as IDS, IPS, EDR, ATP, Malware defenses.
    • Experience with SIEM and log management.
    • Understanding of Cyber Threat TTPs, Threat Hunting, and the Mitre Attack framework.
    • Scripting skills.
    • Familiarity with threat modeling methods like STRIDE and PASTA.
    • Effective communication with technical and non-technical teams across geographies.
    #J-18808-Ljbffr
    To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary