Business Function Group Technology and Operations (T&O) enables and empowers the bank with an efficient, nimble and resilient infrastructure through a strategic focus on productivity, quality & control, technology, people capability and innovation. In Group T&O, we manage the majority of the Bank's operational processes and inspire to delight our business partners through our multiple banking delivery channels. Job Purpose
To actively search for indicators of advanced threat actors’ presence by analyzing centralised log sources through the security tools based on knowledge of threat trends and its new/existing TTPs (Tactics, Techniques and Procedures); and create security profile to alert on potential security threats before it evolves into an incident.
To work with the security engineering team to continuously increase the breadth and depth of hunting.
To hunt for previously unknown anomaly within the enterprise environment outside the confines of standard log sources by actively designing new methodologies to identify such outliers with proven effectiveness via rigorous regression testing.
To continuously identify false positives through active threat hunting and provide a feedback loop to the security engineer team for fine-tuning alert monitoring rules.
Roles and Responsibilities
Think like an attacker. To build security profile based on how the attacker behaviors.
Always stay ‘curious’ in searching for the presence of threat actor by analyzing centralised log sources through the security tools based on knowledge of threat trends and its new/existing TTPs (Tactics, Techniques and Procedures); and create security profile to alert on potential security threats before it evolves into an incident.
Ability to analyze, normalize and correlate various log sources to identify abnormal and/or malicious behavior through big data analysis
Ability to learn and adapt quickly to changing threat landscape, business models and internal enterprise operations to avoid false positives in the course of threat hunting
Ability to perform digital forensics and/or reverse engineering on malware detected on endpoints and mobile devices; and share the TTPs used by the actor
No security incident due to known TTPs
Reduce mean time to detect towards ‘near real-time’ and automate the response in remediating the threat through orchestration
Ability to track and follow up on the assigned projects
Ability to clearly explain the TTPs (Tactics, Techniques and Procedures) and recommended security controls/processes to the key stakeholders
Education and Relevant Experience
Minimum 10-year experiences in the Cyber security domain
Bachelor’s or Master’s degree in Computer Science or equivalent
Experience in various layered security defense tools like SIEM/UBA, IDS/IPS, sandboxing, Nex-Gen anti-virus, DLP etc.
Experience in development tools (Python, Java/JSP, dotNet) preferred.
Experience in counter threat intelligence and adversary tracking
Professional certification from one of the following will be advantage
GASF: GIAC Advanced Smartphone Forensics
GCDA: GIAC Certified Detection Analyst
GCED: GIAC Certified Enterprise Defender
GCFA: GIAC Certified Forensic Analyst
GCFE: GIAC Certified Forensic Examiner
GCIA: GIAC Certified Intrusion Analyst
GCTI: GIAC Cyber Threat Intelligence
GMON: GIAC Continuous Monitoring Certification
GNFA: GIAC Network Forensic Analyst
GPPA: GIAC Certified Perimeter Protection Analyst
GREM: GIAC Reverse Engineering Malware
GPEN: GIAC Penetration Tester
GXPN: GIAC Exploit Researcher and Advanced Penetration Tester
Offensive Security Certified Pentester (OSCP)
CREST: Registered Threat Intelligence Analyst
CREST: Certified Simulated Attack Manager
CREST: Certified Simulated Attack Specialist
CREST: Certified Threat Intelligence Manager
CREST: Certified Incident Manager
Functional / Technical Competencies
Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
Possess good technical knowledge in various web technologies (Web server, application server, database server, load balancer, Web Application Firewall, Intrusion Detection/Prevention System)
Possess good technical knowledge in how endpoint operates and how to detect malicious activities
Familiar with security vulnerabilities, its identification and its exploitation
In-depth knowledge of TCP/IP networking technology
In-depth knowledge of encryption and authentication methods
In-depth knowledge of how major operating systems operate
Proactive, analytical and independent worker
Proficiency in handling and manipulating large data sets with commercial or customized tools
Must be solutions oriented; ability to work with all levels of management and staff; must have strong organization skills and is performance oriented
Excellent analytical, oral, written and presentation skills
Good understanding of regulatory requirements
Apply Now We offer a competitive salary and benefits package and the professional advantages of a dynamic environment that supports your development and recognises your achievements.
DBS is a leading financial services group in Asia, with over 280 branches across 18 markets. Headquartered and listed in Singapore, DBS has a growing presence in the three key Asian axes of growth: Greater China, Southeast Asia and South Asia. The bank's capital position, as well as "AA-" and "Aa1" credit ratings, is among the highest in Asia-Pacific. DBS has been recognised for its leadership in the region, having been named âAsia's Best Bankâ by The Banker, a member of the Financial Times group, and âBest Bank in Asia-Pacificâ by Global Finance. The bank has also been named âSafest Bank in Asiaâ by Global Finance for seven consecutive years from 2009 to 2015.
Job Description :
To ensure customer service and support all operations. To create customer delight at every interaction.
Interacting with external customers and internal customers and addressing their queries, requests and complaints.
Committed TATs are met consistently
Complaints Management- addressing customer complaints at the branch, system updation, coordination with Sales/HUB/ other functions for resolution.
Refunds processing and dispatch
Undelivered policy documents tracking and management.
Maintenance of all files and registers.
New Business Processing:-
Handling end to end New business processing starting from creation of Client id,Case start up, New business login, Follow up for policy issuance, Quality Check
Follow up with HUB for policy issuance of pending cases