Incident Response Specialist (12-months Contract)

Singapore
$7,000.00 - $11,000.00 Monthly Market Aligned
Default

Sector: 

Technology

Function:

Technology

Contact Name:

Aviral Bhargava

Expiry Date:

06-Dec-2025

Job Ref:

JN -112025-491372

Date Published:

06-Nov-2025

Role Overview:

We are seeking a mid-level cybersecurity professional to join a leading financial services organization’s advanced threat defense team. The role focuses on identifying, analyzing, and mitigating malware threats across multiple platforms, helping to protect the organization and its clients. The ideal candidate will work in a dynamic, high-stakes environment where investigative skills, technical expertise, and collaboration with incident response teams are essential to maintain robust cybersecurity defenses.

Key Responsibilities:

· Respond, triage, and adapt to real-time threats targeting the organization through the lens of malware delivery and execution.

· Perform static, dynamic, and behavioral analysis of malicious software and potential indicators of compromise.

· Maintain detailed documentation regarding analysis findings and producing comprehensive reports encompassing observations, actions taken, and recommendations.

· Identify cyber risks and help develop improvements to controls and detection mechanisms.

· Collaborate with response teams to defend against emerging threats and contribute to Incident Response efforts.

Key Requirements:

· We are looking for mid-level candidates with malware analysis and incident response experience.

· Specific experience with triaging detections, prioritizing threats, performing static and dynamic analysis, identifying security gaps, and implementing preventative measures.

· Candidates should have a very strong investigative mindset with an ability to drive process changes and implement control enhancements.

· Candidates typically should have 3-5 years of relevant experience in one or more threat prevention disciplines focusing on Email, Web, or Endpoint.

Preferred Skillset

· Understanding of browser exploitation techniques

· Familiarity of web based technologies such as Javascript or HTML and how they are commonly abused by various threat actors or techniques.

· Experience with reviewing and analyzing Email Headers.

· Experience with detecting phishing and other common email threats.

SIEM experience with event correlation and searching.

· Experience with dynamic analysis tools such as Process Monitor, FakeDNS, Regshot, or Wireshark.

· Familiarity with use and interpretation of malware analysis results from sandbox technologies.

· Technical experience and ability to operate and maintain a virtualized sandbox environment.

· Familiarity with URL categorization and analysis tools like Fiddler, commercial sandbox, or web proxy technologies.

· Ability to assess files or URLs and extract Indicators of Compromise (IoCs) such as malicious domains, IPs, and file hashes.

· Experience with documentation and ability to clearly articulate thoughts to a wide variety of intended audiences (teammates, technical, non-technical, leadership, etc.).

· Knowledge of Endpoint Detection and Response (EDR) tools

· Knowledge of forensic artifacts such as Browser, Registry, or Event Log artifacts.

Nice to have

· 3+ years of experience conducting end to end Malware analysis specifically around either Email, Web, or Endpoint.

Desired Certifications

· GCIH, GREM, GCFA, GCFE, CFCE, or CISSP

If this role aligns with your experience and career goals, please send your application to AviralBhargava@argyllscott.sg.

Argyll Scott Asia is acting as an Employment Business in relation to this vacancy.

APPLY NOW
APPLY NOW
Interested in this job?
Save Job

Share this job

Sign up for Job alerts

Get similar jobs like these by email

Create As Alert

Similar Jobs

SCHEMA MARKUP ( This text will only show on the editor. )