CrawlJobs Logo

Security Incident Management Analyst

https://www.citi.com/ Logo

Citi

Location Icon

Location:
Singapore , Singapore

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Security Incident Management Analyst is an intermediate level position responsible for driving efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security policy.

Job Responsibility:

  • Work as part of a best in class ‘follow the sun’ security incident response team
  • Lead and manage incident response activities to ensure that requisite triage, containment, and eradication are completed within targeted timeframes
  • Ensure that the security incident record is complete, accurate and fit for purpose
  • Collect and analyze evidence including investigative findings and prepare to coordinate with internal and external compliance and audit personnel
  • Execute incident response meetings and communicate complex security topics
  • exhibit good judgment and discretion when initiating escalations to all levels of the organization
  • Ensure that controls are utilized daily and that non-compliance remediation is addressed by appropriate selection
  • Provide IS consulting services, including interpreting and/or clarifying information security policy, procedures, standards or concepts
  • Assist with defining and implementing information security standards to align procedures and practices in pursuit of compliance with Citigroup standards
  • Validate compliance with information security policies, practices, and procedures, and resolve a variety of information security related issues in coordination with the relevant business(es)
  • Assume both informal and formal mentorship roles within the team, and assist with coaching and training of new team members
  • Act as an authority for cyber security incidents, with the ability to reliably identify and escalate threats with appropriate urgency
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients and assets, by driving compliance with applicable laws, rules and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating, managing and reporting control issues with transparency

Requirements:

  • Relevant professional certifications issued by GIAC, AWS, etc., preferably GCCC, GCIH, CEH, ECSA
  • General Industry knowledge of reporting obligations pertaining to local and national laws and regulatory bodies such as OCC, SEC, ECB, MAS
  • Working knowledge of common security models (Defense-in-Depth) and frameworks (MITRE Attack, Cyber Kill Chain, STIX)
  • Working knowledge of VERIS taxonomy
  • Working knowledge of OSI model
  • Working knowledge of security and/or incident response in cloud environments
  • Working knowledge of software development best practices, including agile methods
  • Familiar with Atlassian tools
  • Previous experience working in highly regulated environment
  • Previous experience in a fusion center and/or exposure to large scale incident response
  • Prior experience with information technology and/or information security in the financial services industry
  • Prior experience with cloud environments (e.g. AWS, GCP, Azure)
  • Working knowledge of how computer applications, systems, and networks are managed and secured
  • Working knowledge of common security threats and vulnerabilities, attack vectors, and adversary tactics, techniques, and procedures (TTP's)
  • Proficient threat intelligence supported by a clear understanding of Cyber Adversarial levels, their motives and capabilities
  • Must have flexibility to work outside of normal business hours when necessary

Nice to have:

  • Bachelor’s degree in Computer Science, Computer Engineering, Information Security, Digital Forensics Sciences, or other IT related field however Master's is preferred
  • 5+ years of professional experience in cybersecurity and/or information security, or demonstrated equivalent capability
  • Previous experience with cyber investigations and/or incident response
  • Working Knowledge of CIS Top 18, NIST 800-53 and NIST 800-61
  • Proven experience of enterprise wide stakeholder interaction and management

Additional Information:

Job Posted:
April 30, 2025

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Security Incident Management Analyst

Senior Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
256000.00 - 342000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • Experience with AWS, GCP, or similar cloud platforms
  • Experience in building and delivering projects from start to finish
  • Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Contributions to the security community or open source projects
  • Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution. Participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • health and wellbeing resources
  • paid volunteer days
  • Fulltime
Read More
Arrow Right

Expert Security Analyst – Incident Coordinator

As an Expert Security Analyst – Incident Coordinator, you will take a leadership...
Location
Location
Netherlands , Veldhoven
Salary
Salary:
Not provided
asml.com Logo
ASML
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s or Master’s in Computer Science, Cybersecurity, or related field
  • 7+ years experience in advanced cybersecurity roles
  • Experience working with stakeholders in a complex organization
  • Proven record of influencing upper management towards security best practices
  • Expertise in Security Monitoring, Log Analysis, and Threat Hunting
  • Deep knowledge of a wide range of domains such as Endpoint, Network, OT, Information and Cloud Security
  • Certifications – CISSP, GCIH, GCFA, CISM preferred
  • A Certificate of Good Conduct “Verklaring Omtrent het Gedrag (VOG)” is required
  • Possess a valid work permit for the Netherlands (preferred)
  • Legally authorized to access controlled technology as defined in the United States Export Administration Regulations
Job Responsibility
Job Responsibility
  • Security Monitoring – Actively monitor security alerts for malicious activity or anomalies, ensuring swift response
  • Incident Handling – Lead investigations into high-profile, complex, or advanced persistent threats (APTs)
  • Threat Hunting – Proactively search for hidden threats and improve detection capabilities
  • Incident Analysis – Correlate data across multiple sources to detect sophisticated attack patterns
  • Detection & Response Optimization – Develop advanced detection techniques and security automation strategies
  • Technology Leadership – Act as an SME for SecOps tools and threat domains
  • Mentorship & Training – Provide guidance and mentorship to analysts at all levels
  • Fulltime
Read More
Arrow Right

Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
184500.00 - 246000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience: 3+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Technical Skills: Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • experience with AWS, GCP, or similar cloud platforms
  • Project Management: Experience in building and delivering projects from start to finish
  • Specialization: Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Community Engagement: Contributions to the security community or open source projects
  • Communication: Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution
  • participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • Health and wellbeing resources
  • paid volunteer days
  • equity
  • bonuses
  • commissions
  • Fulltime
Read More
Arrow Right

Service Delivery Manager - Managed Security

HPE Operations is our innovative IT services organization. It provides the exper...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in managed security services, cybersecurity delivery management, or IT service management
  • Proven track record of managing complex client relationships and delivering managed services
  • Experience working with Security Operations Centers (SOC) or MSSPs is highly desirable
  • Should have managed a team of Cyber Security engineers including SIEM, Vulnerability, IAM, HSM, etc
  • Experience in at least 3 of the below products is desirable: Microsoft Sentinel with Copilot, Microsoft Defender including VA, Thales HSM & Cipher Trust Manager, CyberArk PAM, Nexus Smart ID
Job Responsibility
Job Responsibility
  • Oversee the end-to-end delivery of managed security services, such as threat monitoring, incident response, vulnerability management, endpoint protection, and other cybersecurity services
  • Ensure services are delivered in compliance with Service Level Agreements (SLAs) and established security frameworks (e.g., NIST, ISO 27001)
  • Monitor and measure the performance of managed security services, identifying areas for improvement and ensuring high-quality service delivery
  • Manage and coordinate teams responsible for delivering managed security services, including security analysts, engineers, and consultants
  • Collaborate with internal teams (e.g., SOC, engineering, compliance) to ensure seamless service delivery and resolution of client issues
  • Provide leadership, guidance, and support to team members, fostering a culture of accountability and continuous improvement
What we offer
What we offer
  • Health & Wellbeing
  • Personal & Professional Development
  • Unconditional Inclusion
  • Fulltime
Read More
Arrow Right

Security Analyst

WiseTech Global is a world-leading software company building software for the gl...
Location
Location
United States , Chicago
Salary
Salary:
75000.00 - 95000.00 USD / Year
blumeglobal.com Logo
Blume Global
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Min 6 years' experience in a similar Cyber Security role
  • Working knowledge of security frameworks, policies and standards such as ISO27001, PCI DSS, Essential Eight, NIST CSF, and MITRE ATT&CK and applying them into operational context
  • Experience with cloud-based services and technologies
  • Ability to detect and defend against commonly-used attack tactics, techniques and procedures (TTPs) against known attack surfaces such as identity, email, endpoint, network and cloud
  • Passionate about growth and learning
  • A background prior to security in IT support/infrastructure would be advantageous (e.g. servers, networking protocols, security controls, O365/Azure)
  • First-hand experience with SIEM platforms, enterprise intrusion prevention systems, endpoint detection and response tools, and other security products
  • Able to communicate effectively in verbal and written format with technical and non-technical audiences
  • Ability to effectively plan, schedule and adapt to changing priorities, tasks and requirements to meet deadlines
  • Ability to work under pressure and at times with limited supervision
Job Responsibility
Job Responsibility
  • Analyze, review and respond to security alerts, events including triaging and advising on mitigation activities
  • Investigate security incidents and breaches to identify root causes and recommend improvements
  • Engage in testing and monitoring the performance of systems and services, making sure that security requirements are met
  • Maintain strong working relationships, work collaboratively, and share ideas, knowledge and experience with team members as required
  • Assist in continuously updating the company’s security incident, data breach response and disaster recovery plans
  • Undertake threat detection practices
  • Undertake security hardening support practices with teams
  • Vulnerability management to analyze findings from vulnerability reports, assist with risk assessments on the vulnerabilities and coordinate remediation and patching activities with system owners
  • Taking on a wide variety of security operations tasks on an as needed basis
Read More
Arrow Right

Security Operations Manager

As the Security Operations Manager, you will lead Cyera’s security operations fu...
Location
Location
United States , St. Louis
Salary
Salary:
Not provided
cyera.io Logo
Cyera
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–8 years of progressive experience in security operations, incident response, or threat management roles
  • 2+ years of experience managing or leading a SOC or security operations function
  • Deep technical understanding of modern security tools and technologies (SIEM, EDR, SOAR, IDS/IPS, CSPM, vulnerability scanners)
  • Strong knowledge of cloud security (AWS, Azure, GCP) and modern DevSecOps practices
  • Proven ability to lead cross-functional incident response efforts and drive resolution under pressure
  • Excellent communication, leadership, and stakeholder management skills
  • Solid understanding of compliance frameworks (SOC 2, ISO 27001, NIST, etc.)
Job Responsibility
Job Responsibility
  • Own the Security Operations function, including 24/7 monitoring, detection, triage, and incident response
  • Develop and maintain Cyera’s Security Operations Center (SOC) processes, playbooks, and escalation paths
  • Lead investigations of security alerts and incidents, ensuring timely response, containment, and remediation
  • Manage and continuously improve security tooling (SIEM, EDR, SOAR, vulnerability management, etc.)
  • Build and mentor a high-performing team of security analysts and engineers
  • Partner with Engineering, IT, and Product to embed security into all stages of the development lifecycle
  • Conduct regular threat modeling, risk assessments, and post-incident reviews to identify and mitigate systemic weaknesses
  • Oversee vulnerability management and coordinate patching or mitigations across infrastructure and SaaS environments
  • Collaborate with Compliance to support audit readiness (SOC 2, ISO 27001, GDPR, etc.) and maintain evidence of operational controls
  • Develop and report security KPIs and metrics to leadership and key stakeholders
What we offer
What we offer
  • Ability to work remotely, with office setup reimbursement
  • Competitive salary
  • Unlimited PTO
  • Paid holidays and sick time
  • Health, vision, and dental insurance
  • Life, short and long-term disability insurance
  • Fulltime
Read More
Arrow Right

Security Analyst

The Security Analyst is responsible for assessing security events, findings, ins...
Location
Location
United States
Salary
Salary:
60000.00 USD / Year
digitalmediasolutions.com Logo
Digital Media Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1-2 years of relevant security experience
  • Security+ certification or equivalent knowledge, skills, abilities (KSAs) is recommended
  • Fundamental knowledge and technical experience with AWS is required
  • Familiarity with Security Information and Event Management (SIEM) tools is a plus
  • Demonstrated critical thinking and problem-solving skills
  • Familiar with system troubleshooting practices and methodologies
  • Excellent written, verbal and interpersonal communication skills
  • Ability to work successfully with teams on multiple projects
  • Collaborative approach/attitude
Job Responsibility
Job Responsibility
  • Review, analyze and respond to security events and findings from system and application logging and security tools
  • Conduct initial response and first-level troubleshooting for malware and phishing incidents
  • Conduct basic security/vulnerability assessments to include scanning/auditing resources, analyzing results and creating tickets as needed for responsible teams
  • Assist technology leadership with security incident handling
  • Assist with Security Awareness training
  • Assist in Vendor Risk Assessments
What we offer
What we offer
  • Medical, dental, vision insurance
  • Wellness and mental health benefits
  • Tax-Advantaged health care accounts
  • Financial and income protection benefits (Life insurance, 401(k), short-term disability)
  • Paid time off (PTO), holidays and sick time off
  • Remote worker assistance for wellness and home office
  • Fulltime
Read More
Arrow Right

Principal Incident Response Analyst

At Atlassian, the Principal Incident Response Analyst plays a vital role in main...
Location
Location
United States , San Francisco; Austin; Mountain View; New York
Salary
Salary:
183800.00 - 295200.00 USD / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or a related field
  • At least 5 years of experience in a security incident response role
  • Strong understanding of various security technologies and systems, including firewalls, intrusion detection systems, anti-virus software, and authentication systems
  • Experience building and maintaining tools to assist with incident response and other security tasks
  • Ability to write basic programs in a scripting or programming language
  • Demonstrated ability to coordinate incident response among multiple teams and departments
  • Excellent written and oral communication skills
  • Ability to work under high pressure and fast-paced conditions
  • Experience with cloud technologies including GCP and network protocols
  • Expertise in creating and maintaining incident response playbooks
Job Responsibility
Job Responsibility
  • Lead the region's incident response team to ensure timely and effective response to security incidents
  • Coordinate across various teams within Atlassian during a security incident to facilitate effective communication and response
  • Coach and mentor team members in day-to-day activities
  • Build tools, systems, and programs of work to uplift Atlassian's security posture
  • Create regular training and drills for the incident response team to ensure readiness in the event of a security incident
  • Conduct post-incident analysis to identify areas for improvement in the incident response process
  • Communicate effectively with management and other stakeholders about the status of security incidents and the steps being taken to resolve them
  • Work with other security teams within Atlassian to develop strategies and plans to prevent future security incidents
  • Produce threat intelligence that is specific to Atlassian products and infrastructure
  • Own and manage the delivery of projects that advance the team's incident response capabilities
What we offer
What we offer
  • health coverage
  • paid volunteer days
  • wellness resources
  • Fulltime
Read More
Arrow Right