Share this Job

Singapore, SG

Cyber Security Analyst

About the Role


Are you a seasoned security analyst or engineer and are interested in building something from the ground up? Do you want to broaden into detection content creation, hunting, or threat intel? We want to talk to you! We are looking for a Cyber Security Incident Responder within the Monitoring & Response team with a focus on deep dive analysis and ownership of major incidents and crafting detection content.  You will prioritize and triage events, tune detection content and playbooks, perform incident response, , as well as owning and managing major security incidents. You will be actively collaborating with customers throughout the organization to understand their environment and applications thus helping with in-depth analysis and documentation of incidents. We encourage you to build on your experiences and grow more technical through research, public engagements, or become a leader if you so choose.


About the Team


The Swiss Re Cyber Defense Monitoring & Response team's mission is to monitor, detect, disrupt, remediate, and strengthen the cyber security stance of the IT environment and the organization as a whole. We protect our employees and customers and are committed to doing so while delivering exceptional customer service. We are a new team that is being purpose built from its inception to lead, own, and inspire change while maturing the cyber security posture of Swiss Re.


About You


  • A minimum of 5 years of experience working in cyber security as an analyst or incident responder, preferably in a SOC or CSIRT
  • In depth understanding of the current threat landscape, offensive tooling, and OWASP and MITRE ATT&CK techniques
  • Experience or development in Python, PowerShell, R, or Kusto would be helpful
  • Experience in analyzing various events including but not limited to web traffic, underlying network protocols, malware, lateral movement TTP's, or Microsoft and Linux security events
  • Monitoring and understanding of the current threat landscape
  • Logfile correlation and analysis
  • Experience with developing hypothesis driven threat hunts
  • System and Memory Analysis
  • Malware and exploit analysis or reverse engineering
  • Chain of custody and forensic acquisitions
  • Major Incident response or breach investigation management experience
  • Microsoft Azure or Amazon AWS experience would be advantageous
  • An investigative mindset; must be curious with strong analytical skills
  • Technical writing skills with the ability to present to a non-technical audience
  • Excellent writing skills with English being a must


About Swiss Re


Swiss Re is one of the world’s leading providers of reinsurance, insurance and other forms of insurance-based risk transfer, working to make the world more resilient. We anticipate and manage a wide variety of risks, from natural catastrophes and climate change to cybercrime. We cover both Property & Casualty and Life & Health. Combining experience with creative thinking and cutting-edge expertise, we create new opportunities and solutions for our clients. This is possible thanks to the collaboration of more than 14,000 employees across the world.

Our success depends on our ability to build an inclusive culture encouraging fresh perspectives and innovative thinking. We embrace a workplace where everyone has equal opportunities to thrive and develop professionally regardless of their age, gender, race, ethnicity, gender identity and/or expression, sexual orientation, physical or mental ability, skillset, thought or other characteristics. In our inclusive and flexible environment everyone can bring their authentic selves to work and their passion for sustainability.



Reference Code: 123947 



Job Segment: Research