Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Key Responsibilities
- Develop and enhance detection logic for identity-based threats across SIEM, UEBA, and XDR platforms using MITRE ATT&CK and ATT&CK for Identity.
- Review and onboard custom application logs into SIEM and data lakes, ensuring proper parsing, normalization, and enrichment.
- Build and manage log ingestion pipelines using Cribl for data transformation, routing, and monitoring use cases.
- Collaborate with IAM, SOC, Threat Intelligence, and application teams to improve detection quality and behavioral analytics.
- Perform log source onboarding, validation, and troubleshooting for transmission or formatting issues.
- Maintain documentation, data dictionaries, parsing logic, and support AAA monitoring for systems like Active Directory, PAM, and SSO.
- Support incident triage related to log collection issues and enhance log visibility, threat hunting workflows, and automation.
Requirement:
- Diploma or Bachelor's degree in Cybersecurity, Information Security, Computer Science, or a related field.
- 1-2 years of hands-on experience in cyber log management, SIEM operations, or security data engineering.
- Proficiency in SIEM tasks such as log parsing, DSM configuration, rule tuning, and AQL queries.
- Experience with Cribl Stream or similar log pipeline tools.
- Familiarity with data lake architectures and security data integration.
- Good understanding of IAM monitoring and AAA logs.
- Experience with log standardization and formats (CEF, JSON, Syslog).
- Knowledge of Linux, network protocols, and syslog.
- Experience with custom log sources, schema mapping, and correlation rules.
- Relevant certifications such as IBM QRadar Specialist, Splunk Core Power User, CompTIA Security+, or GIAC GCIA.
Rupa Kankariya EA License No. 02C3423 Personnel Registration No. R1441955
Please note that your response to this advertisement and communications with us pursuant to this advertisement will constitute informed consent to the collection, use and/or disclosure of personal data by ManpowerGroup Singapore for the purpose of carrying out its business, in compliance with the relevant provisions of the Personal Data Protection Act 2012. To learn more about ManpowerGroup's Global Privacy Policy, please visit https://www.manpower.com.sg/privacy-policy
Key Skills
Ranked by relevanceReady to apply?
Join Manpower Singapore and take your career to the next level!
Application takes less than 5 minutes

