QCP
SOC Engineer
QCPSingapore20 hours ago
Full-timeOther
QCP is Asia's leading digital asset partner, empowering clients to seamlessly integrate digital assets into their portfolios.

We offer a comprehensive range of solutions - from spot on/off ramping and fixed income strategies to vanilla options and bespoke exotics.

Driven by the vision to be the most trusted partner in digital asset markets, we provide innovative solutions that make digital assets a core component of every portfolio, balance sheet, and treasury.

Since our founding in 2017, we have witnessed the potential of digital assets to transform financial markets and the world at large. We exist at the centre of change, successfully navigating three market cycles and bridging institutional and crypto ecosystems.

We work to build trusted partnerships, putting client success and care at the heart of everything that we do.

Responsibilities

  • Safeguard the organization's systems and data
  • Implement and manage Security Information and Event Management (SIEM) and User and Entity Behavior Analytics (UEBA) Systems to facilitate threat monitoring and analysis
  • Develop, administer and fine-tune security monitoring rules, security baselines and automated workflows to comply with regulatory requirements, industry standards and best practices (e.g., MAS TRM, ISO 27001, GDPR, PDPA, etc.)
  • Manage and optimize SIEM, EDR, NDR, IDS/IPS and threat intelligence platforms to improve coverage, detection, accuracy and response speed
  • Continuously monitor SIEM systems, SOAR, EDR, and threat intelligence platforms to detect and respond to threats.
  • Leverage on threat intelligence feeds and perform active threat hunting to proactively identify potential risks and compromise indicators
  • Creation of dashboards, reports, custom queries to monitor security events
  • Coordinate regular vulnerability scans, penetration testing and patch management activities
  • Partner with Developer Teams and DevOps to embed security controls into CI/CD pipelines
  • Support security audits, risk assessments and regulatory reviews, including engagement with external partners, vendors and law enforcement for incident handling and intelligence sharing
  • Provide security consultancy and advisory services to other departments when needed
  • Adhere to change management process where applicable
  • Create and maintain detailed documentation of security runbooks, Standard Operating Procedures (SOPs), configurations, incident response playbooks, escalation procedures and communication workflows
  • Collaborate with other departments, IT teams and vendors to implement and manage security solutions
  • Drive continuous improvement in security operations, fostering a culture of innovation and ongoing professional development within the team

Requirements

  • Knowledge of security regulations, baselines and benchmarks: CIS Benchmarks, Microsoft Security Baselines, NIST, ISO 27001 Guidelines, MAS TRM, GDPR, PDPA, etc
  • Proficient in SIEM platforms (i.e., SPLUNK, QRadar or equivalent), configure and manage log collection, parsing, correlation rules and alerts
  • Proficient with endpoint protection platforms (e.g., SentinelOne, Microsoft Defender, or equivalent)
  • Ability to deploy, configure, manage endpoint agents across multiple OS (Windows, macOS, Linux)
  • Proficient with vulnerability assessment tools (e.g., Tenable Nessus, Defender or equivalent)
  • Ability to identify missing patches, misconfigurations, outdated software
  • Perform risk assessment, scoring (CVE/CVSS) and prioritization of vulnerabilities based on severity and impact
  • Understand the vulnerability management lifecycle
  • Experience with EDR features: Real-time threat detection, behavioral analytics, threat hunting capabilities, Incident Response workflows
  • Knowledge of malware types: virus, trojans, ransomware, spyware, rootkits, worms, etc
  • Knowledge of malware behaviors, phishing, ransomware, lateral movement, privilege escalation, MITRE ATT&CK framework, OWASP Top 10 and threat hunting methodologies
  • Experience in investigating indicators of compromise (IoCs) and indicators of attack (IoAs), and use of Sandboxing tools and techniques
  • Scripting and automation: Automating baseline scanning, patching, and remediation tasks using PS, Python, Bash, SCCM, Intune or equivalent
  • Networking and System knowledge: networks fundamentals (TCP/IP, DNS, DHCP and ports/protocols), OS internals, firewall configurations, application whitelisting, device hardening
  • Knowledge of Data Loss Prevention concepts, policies and Data classification frameworks
  • Familiar with penetration testing methodologies
  • Vendor Management: Liaise effectively with vendors to deliver quality and timely services and solutions
  • Knowledge Base: Consistent and timely update of documentation for internal and external use
  • IT certifications: CCNA, Security+, CySA+, GIAC GCIA/GCIH, or equivalent
  • Adaptable who will stay current with rapidly evolving security technologies and best practices
  • Possess problem-solving and analytical skills with the ability to analyze complex issues and develop effective solutions
  • Strong communicator who can explain technical information to both technical and non-technical audiences
  • 4-6 years' experience in SOC, security operations, or IT security role

Benefits

The Environment We Offer

As a growing firm with a tightly-knit team, we respect and listen to all our employees. You will get the chance to make an impact by having your voice heard by everyone, including the management.

Our employees enjoy a high level of autonomy at work. We focus on substance, not form - as long as you can perform, you will be recognized and rewarded. We are also dedicated to supporting our staff and ensuring they develop holistically to maximize their potential in the long- term.

We also provide flexible working arrangement as required and a casual and fun environment to boot!

Key Skills

Ranked by relevance