Search by job, company or skills

Jardine Service Centre

Cyberthreat Analyst

3-5 Years
new job description bg glownew job description bg glownew job description bg svg
  • Posted 8 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

About Jardine Service Centre (JSC)

Jardine Service Centre is an organization fully owned by Jardine Matheson in Hong Kong which is a diversified Asian-based group with unsurpassed experience in the region, having been founded in China in 1832. JSC is responsible for providing back-office support to business units of Jardine Matheson (JML) by administrating transactional and rule-based activities including Finance, HR, IT and Procurement. We aim to deliver world-class services to our customers in a cost-efficient manner via process standardization, application of state-of-the-art technologies and process simplification.

As part of Jardine Service Centre, we are looking at establishing application support teams for a number of our target systems such as Microsoft Dynamics D365, Tagetik, ServiceNow, Workday, Peoplesoft and Salesforce. Our aim is to provide better technical support, enhancements and to take advantage of the SaaS product roadmaps and upgrades. We are looking for someone to structure and plan this exciting plan.

Responsibilities:

  • Hunter is responsible for proactive monitoring the security logs to identify, isolate, and detect the threats.
  • This includes monitoring network activity, analyzing security logs and alerts, and conducting proactive threat hunting to identify any potential threats that may have bypassed traditional security defenses.
  • Work closely with other members of the security team to develop and implement effective security strategies, share information and best practices, and respond to security incidents.
  • Staying current with the latest cyber threats, researching and analyzing new attack methods, and sharing insights with the security team to inform security strategy.
  • Collects and analyzes threat intelligence data to understand the tactics, techniques, and procedures used by attackers and to proactively identify potential threats.
  • Threat Intelligence is responsible for analyzing and detecting cyber threats that affect business operations using threat intelligence. Monitor the Indicators of Compromise (IOC) and remediate the cyber threats.
  • Analyze, and disseminate threat intelligence information from multiple sources such as open-source intelligence (OSINT), commercial threat intelligence providers, and internal threat intelligence.
  • Work closely with other security teams to identify potential threats and vulnerabilities and to develop strategies to mitigate them.
  • threat intelligence feeds and systems to detect, classify and respond to security incidents in a timely and effective manner.
  • the threat landscape and analyze emerging threats, trends and patterns to stay ahead of the threat actors.
  • Maintain threat intelligence reports, dashboards, and other information dissemination methods to provide stakeholders with up-to-date threat intelligence.
  • Work with other organizations and security experts to share information and best practices related to threat intelligence.
  • up to date with the latest technologies, tools, and methodologies in the threat intelligence field.
  • incident response activities and provide support during security incidents.
  • evaluate and improve the threat intelligence platform, processes, and procedures to ensure that they remain effective and efficient.
  • as a remote first-responder on reported critical and emergency cyber incidents or data breach.
  • coordinate, and verify reported incident.
  • Assist business to collect data, analyze, investigate cyber incidents with other cyber security team members.
  • If the reported incident needs to activate cyber insurance vendor. (Note: Scope is limited to triage and investigation of small-scale incidents and any high severity or complex incidents will be escalated to external forensics providers.)
  • report generation.

Qualifications:

  • Bachelor's Degree in an IT/Computer related course.
  • At least 3 years of working experience in cybersecurity focus on threat hunting and threat intelligence.
  • Highly conversant in English language.
  • Critical thinking skills with strong attention to detail and follow up
  • Background in IT technologies, processes, and security operations.
  • Collaborative, responsible and has personal accountability.
  • Able to work with a team and individually with minimal guidance.
  • Resourceful, curious to learn and can adapt on emerging security technologies and platforms.
  • Working experience in a shared services center.
  • Knowledge of various guides and security frameworks. (NIST, MITRE, CIS, ISO 27001, CVE, etc)
  • Knowledge in IOCs, OWASP and types of attacks, malwares, threat actor and vulnerability.
  • Knowledge in different security monitoring platforms and cloud technologies.
  • Experienced working in a global or regional environment.
  • At least One (1) Industry related IT certifications.

We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

At JSC, you can play a role in our business success. We understand that key to our success is our people, which is our foundation and priority. We invest in our people to ensure we have the right talent with the leadership and strategic skills the company needs for the future.

We are an equal opportunity employer and do not discriminate on the grounds of sex, race, disability, family status or any other factors.

Come and explore with us!

More Info

Job Type:
Industry:
Function:
Employment Type:

Job ID: 135989291