Skip navigation EPAM

Systems Engineer (Data Security) Singapore

  • hot

Systems Engineer (Data Security) Description

Job #: 86422
EPAM is a leading global provider of digital platform engineering and development services. We are committed to having a positive impact on our customers, our employees, and our communities. We embrace a dynamic and inclusive culture. Here you will collaborate with multi-national teams, contribute to a myriad of innovative projects that deliver the most creative and cutting-edge solutions, and have an opportunity to continuously learn and grow. No matter where you are located, you will join a dedicated, creative, and diverse community that will help you discover your fullest potential.

DESCRIPTION


We are looking for a motivated Systems Engineer (Data Security) in Singapore to make the team stronger.

Responsibilities

  • Provide intelligence support to all teams across the Cyber Defense and Strategy function
  • Take lead in producing tactical, operational and/or strategic cyber threat intelligence assessments
  • Leverage your experience with intelligence operations to help shape the team’s strategy and continuous improvement
  • Perform all-source cyber intelligence collection and analysis
  • Consume and evaluate threat intel to understand the evolving threat landscape, adversarial tactics, techniques, and procedures (TTPs), and areas of concern/targeting that could potentially impact our environment
  • Respond to requests for ad-hoc reporting and research topics from management as required

Requirements

  • Degree in Computer Science, Computer Engineering or equivalent
  • 3 years of experience in a threat intelligence role or conducting structured analysis in an intelligence role or similar
  • Demonstrated knowledge of global cyber threats, threat actors and the tactics, techniques and procedures (TTPs) used by cyber adversaries, particularly as they relate to the financial sector
  • Able to explain the various motivations underpinning why nation-state, criminal, and ideologically motivated hackers conduct cyber operations
  • Able to explain why adversaries would use virtual private servers (VPSes), proxies, or anonymization services such as Tor during operations
  • Familiarity with nation-state and cybercriminal groups historical targeting
  • Able to explain the differences between zero-day and n-day vulnerabilities
  • Experience with analytical tradecraft, as well as knowledge of analytic frameworks, such as analysis of competing hypotheses (ACH), what-if analysis, alternative futures analysis, intelligence preparation of the operating environment (IPOE), etc
  • Knowledge of qualitative or quantitative analysis frameworks and techniques
  • Experience with models for threat analysis, such as the Diamond Model, Cyber Kill Chain and MITRE ATT&CK framework
  • Significant experience in intelligence report production
  • Able to manage competing priorities and work effectively under pressure

We offer

  • Friendly team and enjoyable working environment
  • Work-life balance and flexible schedule
  • Online training library, mentoring, career development and potential partial grant of certification
  • Unlimited access to LinkedIn learning solutions
  • Referral bonuses
  • Compensation for sick leave and paid time off
  • Opportunities for self-realization

Witaj. W czym możemy pomóc?

NASZE LOKALIZACJE