At a Glance
- Tasks: Lead cybersecurity operations and incident response for high-stakes security incidents.
- Company: Join a leading agency transforming public sector digital initiatives.
- Benefits: Enjoy robust learning opportunities, competitive salary, and a purposeful career.
- Why this job: Make a real impact in cybersecurity while developing your skills in a dynamic environment.
- Qualifications: 8-10 years in Cybersecurity Operations with strong incident response experience.
- Other info: Be part of a culture that values resilience and continuous improvement.
The predicted salary is between 48000 - 72000 £ per year.
Overview: The client is a leading agency driving their clients' initiatives and public sector digital transformation. As the Centre of Excellence for Infocomm Technology and Smart Systems (ICT & SS), the client develops capabilities in Data Science & Artificial Intelligence, Application Development, Smart City Technology, Digital Infrastructure, and Cybersecurity. The client offers the successful candidate a purposeful career to make lives better, empowering people to master their craft through robust learning and development opportunities all year round.
The applicant must have the following prerequisites:
- Responsibilities
- Incident Management & Response Standardisation
- Unified Playbooks: Establish and maintain company-wide Incident Response (IR) playbooks for diverse threat scenarios (e.g., Ransomware, Data Exfiltration, Cloud breaches).
- Crisis Leadership: Provide direct guidance and technical oversight to agencies during High and Critical severity incidents, ensuring timely reporting and effective containment.
- Incident Governance: Work with clients to establish clear command structures and roles, empowering leaders to make difficult, high-stakes decisions during a crisis.
- Advanced Exercises: Design and oversee high-quality Tabletop Exercises (TTX) for various stakeholders. Evaluate external vendors to ensure these exercises are realistic, comprehensive, and push the firm’s limits.
- Chaos Testing: Drive the adoption of chaos testing across agencies to validate the adequacy of resiliency plans and identify hidden failure points in critical systems.
- Capability Building: Continuously assess the operational readiness of the Ministry Family and lead initiatives to bridge identified gaps in incident management.
- Centralised Monitoring: Ensure all Ministry systems are effectively onboarded to central monitoring services. Work with system owners on overcoming challenges encountered during onboarding.
- Asset Visibility: Partner with clients to maintain a robust and updated IT asset inventory, ensuring that "you cannot protect what you do not know."
- Custom Threat Scenarios: Provide expert guidance for clients with unique threat use cases or specialised systems (e.g., OT/ICS) that fall outside standard monitoring coverage, helping them build bespoke detection capabilities.
- Full-Spectrum SOPs: Establish Standard Operating Procedures for vulnerability management across on-premises, cloud (GCC), and OT environments. Ensure that there are proper procedures for managing unpatched vulnerabilities.
- Attack Surface Scanning: Ensure agencies deploy adequate internal and external scanning tools. Oversee the workflow for finding prioritisation and validate that patches are applied and effective.
- Resilience Culture: Educate agency stakeholders on the critical importance of Response and Business Continuity Planning (BCP).
- Stakeholder Inculcation: Foster a mindset of "assumed breach," ensuring project owners and agency leaders understand their roles in threat monitoring and incident management.
- Years of Experience: 8 to 10 years of deep experience in Cybersecurity Operations, SOC Management, or Incident Response.
- Crisis Management: Proven track record of leading or providing technical oversight in high-pressure, high-severity security incidents.
- Domain Expertise: Experience managing security operations across complex hybrid environments (On-premise, Cloud, and OT).
- Incident Response & Forensics: Mastery of IR methodologies and a strong understanding of digital forensics and malware analysis.
- Threat Intelligence & TTPs: Deep knowledge of the threat landscape and the ability to map monitoring use cases to the MITRE ATT&CK framework.
- Vulnerability & Exploitation Research: Deep understanding of the CVE (Common Vulnerabilities and Exposures) system and CVSS scoring. Knowledge of exploitation techniques and the mechanics of how vulnerabilities are weaponised by threat actors. Ability to assess the "exploitability" of a vulnerability within the specific context of the client’s environment to prioritise remediation.
- Detection Technologies: Proficiency in SIEM, SOAR, XDR, and EDR technologies. Ability to evaluate the relevancy of existing monitoring tools against evolving threats.
- Cloud Operations: Strong understanding of monitoring and responding to incidents within clients' domain.
- Certifications: Professional certifications such as GCIH (GIAC Certified Incident Handler), GCFA (GIAC Certified Forensic Analyst), CHFI, or CISSP are highly desirable.
- Command & Control: Ability to remain calm and provide clear, authoritative guidance during high-stakes security crises.
- Diplomacy & Education: Skill in translating operational needs into strategic priorities for clients.
- Strategic Foresight: A strong interest in emerging security technologies and the ability to proactively adapt monitoring strategies to counter new actor TTPs.
Senior Cybersecurity Operations Specialist employer: JOHN ETHANS INTERNATIONAL PTE. LTD.
Contact Detail:
JOHN ETHANS INTERNATIONAL PTE. LTD. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Cybersecurity Operations Specialist
✨Tip Number 1
Network like a pro! Attend industry events, webinars, and meetups to connect with folks in the cybersecurity field. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a personal project or contribute to open-source initiatives that showcase your expertise in incident response or vulnerability management. This not only builds your portfolio but also demonstrates your passion for the field.
✨Tip Number 3
Prepare for interviews by brushing up on common cybersecurity scenarios and how you would handle them. Be ready to discuss your experience with crisis management and operational readiness, as these are key areas for the role.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take the initiative to engage directly with us.
We think you need these skills to ace Senior Cybersecurity Operations Specialist
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior Cybersecurity Operations Specialist role. Highlight your experience in incident management and response, as well as any relevant certifications. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a perfect fit for our team. Don’t forget to mention specific experiences that relate to the job description.
Showcase Your Technical Skills: We love seeing candidates who can demonstrate their technical prowess. Be sure to include any relevant tools or technologies you've worked with, especially those mentioned in the job description like SIEM or EDR. This will help us understand your hands-on experience.
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It helps us keep track of your application and ensures you don’t miss out on any important updates. Plus, it’s super easy!
How to prepare for a job interview at JOHN ETHANS INTERNATIONAL PTE. LTD.
✨Know Your Incident Response Playbooks
Familiarise yourself with various incident response scenarios, especially those mentioned in the job description like ransomware and data exfiltration. Be ready to discuss how you would establish and maintain unified playbooks for these threats.
✨Showcase Your Crisis Management Skills
Prepare examples from your past experiences where you provided technical oversight during high-pressure incidents. Highlight your ability to lead teams and make critical decisions under stress, as this is crucial for the role.
✨Demonstrate Your Technical Expertise
Brush up on your knowledge of SIEM, SOAR, and EDR technologies. Be prepared to discuss how you've used these tools in previous roles and how they relate to the evolving threat landscape.
✨Emphasise Continuous Learning and Adaptability
The client values a culture of resilience and education. Share how you stay updated on emerging security technologies and how you’ve adapted your strategies in response to new threats. This shows your commitment to professional growth.