AIA Digital+ is a Technology, Digital and Analytics innovation hub dedicated to powering AIA to be more efficient, connected and innovative as it fulfils its Purpose to help millions of people across Asia-Pacific live Healthier, Longer, Better Lives. If you are hungry and driven to play an active role in shaping a better tomorrow, we want to hear from you. Because the work we do at AIA Digital+ makes a difference in the lives of millions of people, every day. We will equip you with the critical skills, tools and technology, and endless opportunities to learn, contribute and thrive in a dynamic and exciting environment. If you want to shape a brighter future at AIA Digital+, please read on. About the Role The role of the candidate is to be a part of the GIS Cybersecurity team to function as a part of the Cyber Security Incident Response and Monitoring Team CSIRT). The candidate would be required to ensure that all threats/risks that could impact or have a potential impact on the AIA environment are responded, managed and handled in a timely and complete manner. Lead Incident Response (IR) engagements and guide local business units through a variety of incidents (i.e., breaches, malware/virus outbreaks, security incidents, and forensics investigations). Support service providers performing Cyber Security monitoring, to enhance their monitoring, triage investigation processes capabilities prior to escalation. Leverage detection and response solutions in place, to further assess any escalated potential incidents. Manage and coordinate potential incidents escalations, for investigation, along with any required internal or external stakeholders. Communication and coordination of Cyber Security Incident response actions with Business Units. Management of Cyber Security Incidents for the Group, within SLA. Partnering with key service providers to support security investigations. Analysis of Cyber Security threat intelligence, ensuring that AIA Group prevention, detection and response capabilities setup is maximized against those new threats. In depth analysis of malware or other potential malicious processes or software identified in the organization. Coordination of Cyber Security testing activities and providing advice on remediation. Develop, document, and maintain SOPs and knowledge base for cyber security services including incident response, intelligence analysis, evidence acquisition, forensics recovery, and others. Continuous knowledge improvement in tools and best practices in Cyber Security threat monitoring and incident response. Prepare, write, and present reports and briefings. Job Requirements : Degree in Computer Science or related discipline. 5+ years\' experience working hands-on technical role in Cyber Security Monitoring and Incident Response (SOC & IR). Ability to learn and apply Containment, Mitigation, and Remediation concepts based on TTP\'s. Good experience and knowledge on cybersecurity incident response/ ethical hacking / forensic analysis & SIEM solutions. Adequate experience in handling Phishing, DLP, Malware, Web & network attack incidents and understanding of remediation methods for specific incidents. Experience conducting log and activity review, along with stream or packet capture, in support of intrusion analysis. Ability to handle stressful situations and think on the feet and strong decision making. Excellent written and verbal communication skills and ability to escalate timely to management. Experienced in multicultural virtual team management and coordination. Desirable: ECCouncil Computer Hacking Forensics Investigator (CHFI), Technical certifications: GIAC Certified Incident Handler (GCIH), GIAC Reverse Engineering Malware (GREM), GIAC Certified Forensic Analyst (GCFA).
foundit
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.