CrawlJobs Logo

SOC Incident Responder

https://www.citi.com/ Logo

Citi

Location Icon

Location:
Singapore , Singapore

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Info Sec Tech Lead Analyst is a senior level professional position responsible for driving efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security policy.

Job Responsibility:

  • Identify opportunities to automate and standardize information security controls and for the supported groups
  • Resolve any vulnerabilities or issues detected in an application or infrastructure
  • Analyze source code to mitigate identified weaknesses and vulnerabilities within the system
  • Review and validate automated testing results and prioritize actions that resolve issues based on overall risk
  • Scan and analyze applications with automated tools, and perform manual testing if necessary
  • Reduce risk by analyzing the root cause of issues, their impact, and required corrective actions
  • Direct the development and delivery of secure solutions by coordinating with business and technical contacts
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients and assets, by driving compliance with applicable laws, rules and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating, managing and reporting control issues with transparency.

Requirements:

  • 6-10 years of relevant experience
  • Advanced proficiency with Microsoft Office tools and software
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
  • Master’s degree preferred

Additional Information:

Job Posted:
December 29, 2025

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Incident Responder

Principal Cybersecurity Incident Response Analyst

Principal Cybersecurity Incident Response Analyst role at HPE's Cyber Defense Ce...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree (or equivalent work experience) required, preferably in computer science, engineering or related area of study
  • Typically 8+ years of relevant experience
  • SOC team/Incident response/Advanced threat analyst experience is required
  • Proven track record of leading complex cybersecurity initiatives and managing ambiguous incidents
  • Extensive understanding of adversary tactics, techniques, and procedures (TTPs)
  • Extensive Cyber and IT security knowledge
  • Extensive understanding of Cyber and IT security risks, best practices, threats and prevention measures
  • Extensive understanding of SQL and relevant scripting languages
  • Extensive data security system analysis skills
  • Extensive risk assessment and management skills
Job Responsibility
Job Responsibility
  • Lead and coordinate responses to the most severe and complex cybersecurity incidents
  • Guide cross-functional teams through containment, eradication, and recovery
  • Provide executive-level oversight and decision-making during critical incidents
  • Effectively analyze associated logs and respond to high severity incidents
  • Contribute to the company's security response methods
  • Mentor and provide technical guidance to less experienced cybersecurity professionals
  • Stay at the forefront of cybersecurity trends, threats, and technologies
  • Foster a culture of continuous improvement and innovation
  • Provide insight and guidance through after action reviews
What we offer
What we offer
  • Health & Wellbeing benefits
  • Personal & Professional Development programs
  • Unconditional Inclusion environment
  • Comprehensive benefits suite supporting physical, financial and emotional wellbeing
  • Fulltime
Read More
Arrow Right

L2 SOC Analyst

Quzara, a leading Cyber Security Firm, is seeking a highly skilled and experienc...
Location
Location
United States
Salary
Salary:
Not provided
quzara.com Logo
Quzara
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5+ years of experience in a SOC Analyst role at a SOC/MXDR or MSSP with L2 experience
  • Strong understanding of networking technologies
  • Experience with Microsoft security technologies such as Microsoft Sentinel and M365 Defender
  • Strong understanding of security best practices and incident response procedures
  • Experience with deep threat intelligence
  • Strong proficiency with KQL Queries
  • Strong verbal and written communication skills
  • Strong analytical and problem-solving skills
  • Azure experience working with azure security is a must
  • Experience with scripting languages such as Python, PowerShell, and JavaScript
Job Responsibility
Job Responsibility
  • Monitor and analyze security events utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics
  • Utilize deep threat intelligence to identify and investigate potential security threats
  • Respond to and triage security incidents, escalating as necessary
  • Utilize proficiency in KQL Queries to conduct investigations and gain insights into potential security threats
  • Collaborate with other teams to resolve security incidents and improve overall security posture
  • Participate in incident response efforts and assist in forensic investigations, adhering to NIST guidelines
  • Continuously improve security operations through the identification of trends and anomalies
  • Communicate security incidents and findings to stakeholders and management
  • Fulltime
Read More
Arrow Right

Operations Security Consultant

The Operations Security Consultant is responsible for the end-to-end management ...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8 to 12 years experience
  • B.E./ B.Tech./ MCA degree
  • Hands-on expertise with QRadar SIEM, SOC operations, and incident response
  • Proficiency in security frameworks: NIST CSF, CIS Controls, DORA, GDPR
  • Experience with vulnerability management, threat hunting, and risk assessment methodologies
  • Familiarity with automation, SOAR solutions, and operational workflow optimization
  • Strong experience on at least one technical environment: Cloud (AWS/Azure), Mainframe, Datawarehouse, Database, O365
  • CISSP or CISM certification preferred
Job Responsibility
Job Responsibility
  • Oversee Daily security operations and maintain operational excellence
  • Manage 24/7 monitoring, triage, investigation, and resolution of security incidents via SIEM (QRadar)
  • Coordinate incident management efforts across internal teams and external stakeholders
  • Develop, fine-tune, and manage security detection rules, use cases, and threat intelligence integration
  • Implement continuous improvement processes using KPIs, operational reviews, and performance metrics
  • Manage Lead SOC analysts, threat hunters, and incident responders
  • Facilitate collaboration across engineering, compliance, and client teams
  • Ensure compliance with ISO 27001, NIST CSF, CIS Controls, DORA, GDPR, and client-specific standards
  • Lead preparation of audits, client reports, and executive dashboards
  • Maintain risk treatment plans aligned with ISO 27001 standards
What we offer
What we offer
  • Commitment to fighting against all forms of discrimination
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

Senior Endpoint Security Engineer

The Endpoint Security Engineer will design and support solutions that support th...
Location
Location
United States , Seattle; Bellevue
Salary
Salary:
135000.00 - 180000.00 USD / Year
truveta.com Logo
Truveta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of hands-on experience in an endpoint security, cybersecurity engineering, or similar role
  • Deep understanding of modern operating systems (Windows, macOS) and their architecture, configuration and deployment in a large enterprise environment
  • Strong hands-on experience on Azure Cloud PC, VM, Azure Firewall and Azure Networking
  • Strong hands-on experience on Microsoft Intune and JAMF administration, such as device enrollment, OS upgrade/patch, configuration, profile
  • Define and assign compliance/security policies to ensure corporation devices meet organizational security standards
  • Strong hands-on experience on applications control, deployment, patch and upgrade
  • Proven experience with industry-leading EPM platforms such as CyberArk and BeyondTrust to control user privileged access and provide advanced threat protection and vulnerability management
  • Solid understanding of TCP/IP IPv4/v6, experience of office network (Routing / Switching / WAN, Wi-Fi & Security) management and network security concepts
  • Strong knowledge of cybersecurity frameworks (e.g., NIST, MITRE), threat intelligence, and incident response methodologies
  • Experiences with SOC 2 Type 2, HITRUST, and ISO compliance frameworks. Interact with the compliance team to ensure the company compliant and remediate gaps during compliance finding and controls
Job Responsibility
Job Responsibility
  • Device Management: Define, implement and maintain endpoint hardening baselines for Windows, macOS, and Linux systems with MDM such as Microsoft Intune, and JAMF
  • Policy & Hardening: Develop and enforce security policies, standards, and procedures for all endpoint devices. Implement system hardening configurations based on industry best practices
  • Deploy & Manage Security Tools: Implement, configure, and maintain endpoint security solutions, including Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), antivirus/anti-malware software, and host-based firewalls
  • Incident Response: Collaborate with IT and Security team to respond to endpoint-related incidents. Triage, remediate, and contain security incidents and threats on endpoints. Perform forensic analysis when necessary
  • Vulnerability Management: Manage the endpoint vulnerability lifecycle, from discovery and assessment to remediation, using scanning tools and patch management systems
  • Patch Management: Design and oversee the deployment of updates, security patches for operating system and applications
  • Automation & Scripting: Develop scripts and automation (e.g., using Python, PowerShell) to streamline security operations, automate repetitive tasks, and improve response times
  • AI Protection: Secure endpoints used for AI development, including devices accessing model weights, training data, and production inference systems, implementing guardrails on AI tool usage (e.g., prompt injection prevention in local LLM dev tools, restricted plugins/add-ons)
  • Data Loss Prevention: Enforce data loss prevention (DLP) and encryption policies on devices used to handle sensitive AI training datasets, including PHI/PII and proprietary corporation data
  • On-call: Ability to participate in On-call rotation
What we offer
What we offer
  • Interesting and meaningful work for every career stage
  • Great benefits package
  • Comprehensive benefits with strong medical, dental and vision insurance plans
  • 401K plan
  • Professional development & training opportunities for continuous learning
  • Work/life autonomy via flexible work hours and flexible paid time off
  • Generous parental leave
  • Regular team activities (virtual and in-person)
  • Additional compensation such as incentive pay and stock options (for certain roles)
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

As a Security Operations Analyst within our Information Security Team you will p...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
https://www.tui.com Logo
TUI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrable deep experience of design and build of systems integration, ideally in a security operations environment
  • strong technical and IT operations background, with strong experience
  • experience of working with Splunk or similar SIEM platforms, Service Desk systems and security monitoring tools desirable with experience in designing and developing these platforms
  • familiarity and experience with Windows, macOS, Linux, and Unix operating systems
  • computer networking and cloud technology fundamentals
  • understanding of Active Directory, LDAP, IDaaS (AAD)
  • rudimentary security knowledge and awareness of firewalls, proxies, antivirus, and IPS/IDS concepts
  • experience scripting in Python or PowerShell
  • experience using Microsoft Excel and Word
  • excellent written and verbal communication skills
Job Responsibility
Job Responsibility
  • Promote a security first culture at TUI
  • work with resolver teams to ensure that information security events and incidents are automatically generated, appropriately addressed and closed in local ticketing systems and ensure reporting on key performance indicators and service levels
  • adopt a pragmatic and ‘can-do’ attitude in everything you do, partnering with your colleagues across the TUI businesses and IT functions worldwide
  • build strong working relationships and influence others to do the right thing to Protect our Smile
  • monitor for alerts from security tools, including, but not limited to, security analytics platforms, automation tools, ticket management systems, user-reported alerts, and others
  • triage security alerts, including initial analysis to determine the validity of alerts and gather additional context
  • use network and host security tooling to perform additional investigation
  • work the full incident lifecycle from detection, investigation, response, to remediation for security alerts
  • contribute to the further development, maintenance, and standardization of SOC processes, policies, and procedures
  • work with other IT/security teams to identify areas for improvement around detection, investigation, and response
What we offer
What we offer
  • Attractive remuneration, bonus opportunity, exclusive travel perks & discounts, extensive health & wellbeing support, and more
  • flexible working: Work is something you do, not somewhere you go. We encourage a healthy work-life balance and offer hybrid or remote working models
  • opportunities to upskill, reskill and grow your career
  • access the TUI Tech Learning Hub to level-up and reach your ambitions
  • participate in our tech communities and collaborate on global projects and teams
  • get involved with incredible local charity and sustainability initiatives like the TUI Care Foundation and the Sustainable Tech Community.
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

As a Security Operations Analyst within our Information Security Team you will p...
Location
Location
Portugal , Lisbon; Oporto; Barcelona; Madrid; Flexible
Salary
Salary:
Not provided
https://www.tui.com Logo
TUI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrable deep experience of design and build of systems integration, ideally in a security operations environment
  • Strong technical and IT operations background
  • Experience of working with Splunk or similar SIEM platforms, Service Desk systems and security monitoring tools
  • Familiarity and experience with Windows, macOS, Linux, and Unix operating systems
  • Computer networking and cloud technology fundamentals
  • Understanding of Active Directory, LDAP, IDaaS (AAD)
  • Rudimentary security knowledge and awareness of firewalls, proxies, antivirus, and IPS/IDS concepts
  • Experience scripting in Python or PowerShell
  • Experience using Microsoft Excel and Word
  • Excellent written and verbal communication skills
Job Responsibility
Job Responsibility
  • Monitor for alerts from security tools
  • Triage security alerts
  • Use network and host security tooling to perform additional investigation
  • Work the full incident lifecycle from detection, investigation, response, to remediation for security alerts
  • Contribute to the further development, maintenance, and standardization of SOC processes, policies, and procedures
  • Work with other IT/security teams to identify areas for improvement around detection, investigation, and response
  • Research common and topical commodity and APT-based malware tactics and techniques in preparation for future attacks
  • Provide feedback on detection rules to help tune security tools and minimize false positives
  • Participate in SOC working groups and sub-teams to help generate and execute on new ideas for content, technology advancements, and proactive defence improvement projects
What we offer
What we offer
  • Attractive remuneration
  • Bonus opportunity
  • Exclusive travel perks & discounts
  • Extensive health & wellbeing support
  • Flexible working
  • Opportunities to upskill, reskill and grow your career
  • Access the TUI Tech Learning Hub
  • Participate in tech communities and collaborate on global projects and teams
  • Get involved with local charity and sustainability initiatives
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Operations Consultant

My client based in Dublin are currently on the lookout for a Senior Cybersecurit...
Location
Location
Ireland , Dublin 2
Salary
Salary:
Not provided
solasit.ie Logo
Solas IT Recruitment
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, Cyber Security, or a related field
  • 7+ years of professional experience in information security, including in security operations or SOC roles
  • Proven experience implementing and monitoring security controls across multiple environments
  • Security incident management processes and methodologies
  • Vulnerability management and penetration testing tools
  • SIEM platforms (e.g., Microsoft Sentinel, Splunk or QRadar)
  • Endpoint detection and response (EDR) such as Windows Defender and Vulnerability Management Tools such as Qualys, Nessus, Rapid7 etc.
  • Threat intelligence platforms and threat hunting techniques
  • Microsoft security technologies (e.g., MS Defender XDR, Defender for Cloud, Entra, Purview and Intune)
  • Azure Cloud security experience
Job Responsibility
Job Responsibility
  • Security Monitoring & Incident Response: Monitor, detect, and triage security alerts received from Microsoft Security Tools, SIEM Solution and other security tools
  • Investigate and respond to cybersecurity incidents, including root cause analysis and post-incident reporting
  • Lead containment, eradication, and recovery efforts during security breaches
  • Participate in threat hunting and threat intelligence analysis
  • Provide out-of-hours support during critical incident response when required
  • Vulnerability & Risk Management: Execute and enhance the vulnerability management program: scanning, assessment, prioritization, and remediation tracking
  • Collaborate with IT and business units to implement secure configurations and remediate vulnerabilities
  • Contribute to enterprise risk assessments and security roadmaps
  • Security Engineering & Architecture: Contribute to the design and enhancement of security architectures specifically within Microsoft Azure environments, ensuring robust protection across cloud deployments
  • Support implementation of enterprise-wide security frameworks, policies, and reference architectures (e.g., ISO 27001, IEC62443)
Read More
Arrow Right

Security Operations Analyst

Location
Location
India , Bengaluru
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of experience in a Security Operations Center, incident response team, or cyber defense role
  • Hands-on experience with SIEM/SOAR platforms (e.g., Splunk, XSOAR and XSIAM) and endpoint detection solutions (e.g., CrowdStrike, SentinelOne)
  • Deep understanding of cybersecurity fundamentals, threat detection techniques, and attack frameworks such as MITRE ATT&CK
  • Comfortable analyzing logs and events from various systems including network devices, endpoints, cloud environments, and identity providers
  • Familiarity with scripting or automation (e.g., Python, PowerShell) to enhance investigation and response workflows is a plus
  • Experience with workflow and ticketing tools like ServiceNow or Jira for incident documentation and coordination
  • Strong written and verbal communication skills — able to clearly document findings, articulate risk, and support incident coordination across teams
  • Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or Cybersecurity Engineering are a plus
  • One or more relevant certifications such as: CompTIA: Network+, Security+, CySA+, PenTest+, Cloud+ and Cloud Security: AWS Security Specialty, Google Professional Cloud Security Engineer and Microsoft Azure Security Engineer Associate are plus
Job Responsibility
Job Responsibility
  • Perform real-time security event monitoring, triage, and analysis across multiple platforms, using SIEM and EDR tools
  • Analyze log and telemetry data from diverse sources (e.g., firewalls, endpoint protection, IDS/IPS, application logs) to detect and respond to potential threats
  • Investigate and respond to security incidents, performing root cause analysis and supporting containment, eradication, and recovery efforts across endpoints, servers, cloud, and network environments
  • Conduct proactive threat hunting using behavioral analytics, threat intelligence, and hypothesis-driven queries to detect stealthy or novel attack techniques
  • Support the SOC's daily operational cadence, including participating in shift handoffs, reviewing detection effectiveness, and maintaining situational awareness of the global threat landscape
  • Contribute to the development and refinement of incident response processes, detection rules, and SOC playbooks
  • Collaborate with threat intelligence, engineering, and infrastructure teams to develop detection use cases and improve overall SOC effectiveness
  • Help shape SOC dashboards, reports, and playbooks that enhance visibility and response across business units and geographies
What we offer
What we offer
  • Discretionary bonus
  • Provident fund contributions
  • 1+5 medical insurance + top up options and access to Practo online Doctor consultation App
  • Employee assistance program
  • 3X CTC Life Assurance
  • 3X CTC Personal accident insurance
  • childcare services
  • 20 days holiday + statutory holidays
  • Gym reimbursement up to INR1150 per month
  • wellbeing program with the chance to earn up to $93 per annum
Read More
Arrow Right
Welcome to CrawlJobs.com
Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.