Threat Analyst

Posted:
4/21/2024, 5:00:00 PM

Experience Level(s):
Mid Level ⋅ Senior

Field(s):
IT & Security

Ensign is hiring !

Evaluates, tests, monitors and maintains information systems (IS) and cyber security policies, procedures and systems I Creates, implements and oversees identity management systems to meet specific security needs and complex compliance standards | Ensures that IS and cyber security plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security | Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security | Develops techniques and procedures for conducting IS, cyber security and access and identity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks |
Has in-depth knowledge in own discipline and basic knowledge of related disciplines. Solves complex problems; takes a new perspective on existing solutions. Works independently; receives minimal guidance. May lead projects or project steps within a broader project or have accountability for ongoing activities or objectives. Acts as a resource for colleagues with less experience. Uses best practices and knowledge of internal or external business issues to improve products/services or processes. Typically resolves complex problems or problems where precedent may not exist. Often leads the work of small project teams; may formally train junior staff .

Ensign Infosecurity Pte. Ltd

Website: https://ensigninfosecurity.com/

Headquarter Location: Singapore, Central Region, Singapore

Employee Count: 501-1000

Year Founded: 2018

IPO Status: Private

Industries: Cloud Security ⋅ Consulting ⋅ Cyber Security ⋅ Identity Management ⋅ Information and Communications Technology (ICT) ⋅ Information Technology ⋅ Internet ⋅ Network Security ⋅ Penetration Testing ⋅ Professional Services