Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- 2-5 years of hands-on experience in Incident Response, SOC, or Blue Team operations.
- Strong understanding of cyber-attack techniques, threat actor behavior, and the incident response lifecycle.
- Proven experience working with SIEM tools (e.g., Splunk, QRadar, Sentinel, ELK) for real-time alert monitoring and investigations.
- Hands-on experience with EDR/XDR platforms (e.g., Microsoft Defender, CrowdStrike, Carbon Black).
- Solid knowledge of network fundamentals and security controls (TCP/IP, DNS, HTTP/S, firewalls).
- Experience investigating phishing campaigns, malware activity, suspicious processes, and compromised user accounts.
- Strong familiarity with the MITRE ATT&CK framework from a defensive / detection perspective.
- GCIH (GIAC Certified Incident Handler) certification is a plus
- Ability to clearly document incidents and communicate response actions to technical and business stakeholders.
Key Skills
Ranked by relevanceReady to apply?
Join Optimum Solutions Pte Ltd and take your career to the next level!
Application takes less than 5 minutes

