Roles & Responsibilities
We are seeking a Senior Cybersecurity Incident Responder to on a long-term engagement. The successful candidate will play a key role in incident triage, response, and investigation , operating at Level 2 to Level 3 (L2–L3) within the Security Operations Center (SOC).
This is a 12-month extendable contract with strong potential for renewal based on performance as the project is on a long-term basis.
This position is ideal for an experienced security analyst with strong technical skills and hands-on experience using CrowdStrike , conducting log analysis , and managing real-world incident investigations.
Key Responsibilities
- Perform advanced incident triage, response and investigation of security alerts from various sources
- Lead or support L2–L3 incident response efforts , including containment, eradication, and recovery
- Respond to user incident reports and evaluates the type and severity of security events.
- Execute initial triage of incidents to rule out false positives
- Analyze logs from firewalls, intrusion prevention systems (IPS), proxies , and other security platforms
- Use CrowdStrike EDR to identify and respond to threats across endpoints
- Collaborate with SOC, threat intel, and infrastructure teams for coordinated response
- Document findings and create incident reports, timelines, and root cause analysis
- Contribute to playbook updates and process improvements based on lessons learned
- Participate in threat hunting and detection rule tuning as needed
- Perform real-time analysis and trending of security log data from various security devices and systems.
- Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules
- Identify recurring security issues and risks and develops mitigation plans and recommends process improvements
Requirements
5+ years of experience in Cybersecurity Incident Response / SOC operationsExperience in advanced incident triage, response and investigation of security alerts from various sourcesHands-on experience with : CrowdStrike or similar EDR platforms
Log analysis from firewall, IPS, proxy, and endpoint systems
SIEM tools for alert triage and investigations
Deep understanding of attack vectors, malware behavior, and threat actor TTPs (MITRE ATT&CK)Familiarity with incident management frameworks (e.g., NIST, SANS)Excellent analytical, documentation, and communication skillsAbility to work independently and under pressure in fast-paced environmentsRelevant certifications a plus : GCIH, GCFA, CEH, or equivalentArgyll Scott Consulting Pte Ltd
Tell employers what skills you have
Security Architecture
CEH
Accident and Incident Response Management
Security Operations
Incident Response
Forensic Analysis
Investigation
Automation Tools
Information Assurance
IPS
RabbitMQ
Building Automation
Security Strategy
Advocacy
Prevention
Ruby on Rails
Incident Management
Proxy
Security Incident Response
Firewalls