Job Search and Career Advice Platform
  • Jobs
  • Headhunters
  • Free resume review
  • About Us
EN
4,178

Python jobs in Singapore

Cyber Security Incident Response & Threat Intelligence Analyst

Thomas Miller Group

Greater London
On-site
GBP 55,000 - 85,000
11 days ago
I want to receive the latest job alerts for “Python” jobs

Founding backend Engineer

Startupletter

Greater London
On-site
GBP 70,000 - 90,000
11 days ago

AI Solutions Manager

Data Freelance Hub

Greater London
Hybrid
GBP 70,000 - 90,000
12 days ago

Data Engineer

Two Circles

Greater London
On-site
GBP 60,000 - 80,000
12 days ago

Senior Data Scientist

Lloyds Bank plc

Bristol
Hybrid
GBP 70,000 - 79,000
12 days ago
discover more jobs illustrationDiscover more opportunities than anywhere else. Find more jobs now

Security Engineer, AWS Security

Amazon.com, Inc.

Greater London
On-site
GBP 60,000 - 80,000
12 days ago

Data Analyst

Jones Lang LaSalle Incorporated

Greater London
On-site
GBP 40,000 - 55,000
12 days ago

Principal, Structured Finance Quantitative Specialist

European Bank for Reconstruction and Development

Greater London
Hybrid
GBP 80,000 - 120,000
12 days ago
HeadhuntersConnect with headhunters to apply for similar jobs

Engineering Manager

SR2 Clean Energy

Ipswich
Hybrid
GBP 75,000 - 85,000
12 days ago

Principal Software Engineer

SR2 Clean Energy

Greater London
On-site
GBP 120,000 - 160,000
12 days ago

Data Analyst - Payments & Blockchain

Methodfi

United Kingdom
Remote
GBP 40,000 - 60,000
12 days ago

Technical & Data Analyst

Bupa Insurance Limited

Greater London
Hybrid
GBP 53,000 - 70,000
12 days ago

Senior Java Engineer - Market Data Platform

LGBT Great

Greater London
On-site
GBP 70,000 - 90,000
12 days ago

Principal Credit Risk Analyst Risk & Decision Analytics London

TF Bank Group

Greater London
On-site
GBP 65,000 - 85,000
12 days ago

(Sr.) Economist / Data Scientist - Economic Impact - London

Oxford Economics Group

Greater London
Hybrid
GBP 70,000 - 90,000
12 days ago

Senior Palantir Specialist - Remote UK Contract

Data Freelance Hub

United Kingdom
Remote
GBP 80,000 - 100,000
13 days ago

Multiple Palantir Specialists - Must Hold SC or DV Clearance

Data Freelance Hub

United Kingdom
Remote
GBP 80,000 - 100,000
13 days ago

Full Stack Developer | Data & Analytics | Forensic & Litigation Consulting

FTI Consulting, Inc

Greater London
On-site
GBP 60,000 - 80,000
13 days ago

Data Analyst

Data Freelance Hub

Greater London
On-site
GBP 35,000 - 50,000
13 days ago

BI Analyst

DG International

Tilbury
On-site
GBP 60,000 - 80,000
13 days ago

Analytics Engineer

Synergy Resourcing Solutions Limited

Greater London
Hybrid
GBP 50,000 - 70,000
13 days ago

Automation-Driven Electronics Test Engineer

Sepura plc.

Cambridge
On-site
GBP 40,000 - 60,000
13 days ago

Lecturer in Computing

Regent College London

Greater London
Hybrid
GBP 40,000 - 45,000
13 days ago

Data Product Manager

Viasat, Inc.

Greater London
Hybrid
GBP 55,000 - 75,000
13 days ago

Senior Lecturer in Computing

Regent College London

Greater London
On-site
GBP 42,000 - 50,000
13 days ago

Top job titles:

Data Analysis jobsSupply Chain jobsChemist jobsInterior Design jobsEducation jobsKyc jobsSpeech Therapist jobsNetwork Engineer jobsSocial Media jobsResearch jobs

Top companies:

Jobs at UbsJobs at IbmJobs at NikeJobs at AnzJobs at BpJobs at OracleJobs at RichemontJobs at DatabricksJobs at ServicenowJobs at Cognizant
Cyber Security Incident Response & Threat Intelligence Analyst
Thomas Miller Group
Greater London
On-site
GBP 55,000 - 85,000
Full time
11 days ago

Job summary

A leading international firm in Greater London is looking for a Cyber Security Incident Response & Threat Intelligence Analyst to enhance their security operations. This role will involve responding to cyber incidents, improving detection processes, and collaborating with various IT teams. Ideal candidates will have a Bachelor's in Cyber Security and 3-5 years of experience in SOC operations. Strong skills in vulnerability management tools and incident response are essential, along with familiarity with cloud security monitoring.

Qualifications

  • 3-5 years of experience in SOC Operations or incident response.
  • Hands-on experience responding to security incidents.
  • In-depth knowledge of networking and security principles.

Responsibilities

  • Respond to and investigate cyber security incidents.
  • Continuously improve monitoring systems' detection capabilities.
  • Lead incident response efforts during confirmed incidents.

Skills

Hands-on experience with vulnerability management tools
Familiarity with threat intelligence platforms
Experience with SOC tools such as SIEM
Endpoint Detection and Response tools
Knowledge of operating systems and network protocols
Proficiency in analysing packet captures
Familiarity with scripting languages
Experience with cloud security monitoring

Education

Bachelor’s Degree in Cyber Security, Information Technology, or related field

Tools

SIEM tools
Microsoft Defender for Endpoint
Nessus
Splunk
Job description
Overview

Cyber Security Incident Response & Threat Intelligence Analyst

Team Overview

The Cyber Security Operations Team is responsible for monitoring, detecting, and responding to cyber threats across Thomas Miller's estate. We ensure the protection of digital assets and safeguard confidentiality, integrity and availability of systems. Working in a fast-paced environment, the SOC provides 24/7 vigilance, rapid incident response, vulnerability oversight and actionable threat intelligence to reduce cyber risk.

Role and Responsibilities
  • Respond to and investigate cyber security incidents, including malware outbreaks, phishing attempts, insider threats, and handle digital forensics.
  • Continuously improve our monitoring systems\' detection and response capabilities as well as processes, procedures, and playbooks.
  • Lead incident response efforts when dealing with confirmed security incidents.
  • Automate analysis and response steps to reduce manual toil.
  • Help prioritise the creation of new SOC use cases to ensure optimum ROI for engineering effort.
  • Monitor security alerts and suspicious activities from a variety of SOC tools.
  • Utilise Microsoft security tools such as Microsoft Defender for Endpoint, Microsoft 365 Defender, and Azure Security Centre to detect, respond to, and mitigate security incidents.
  • Perform root cause analysis to determine how breaches or incidents occurred and implement long term prevention strategies.
  • Collaborate with other IT and security teams to address vulnerabilities and strengthen security posture.
  • Conduct post-incident analysis to identify areas for improvement and lessons learned.
  • Maintain detailed records of security incidents, including incident timelines, analysis, and resolutions.
  • Plan and execute monitoring system architectural changes.
  • Communicate effectively at multiple levels of sensitivity, and with multiple audiences.
  • Recognise, adopt and install best practices in security engineering across development, cryptography, network security, security operations, incident response, and security intelligence.
  • Gather, analyse and disseminate threat intelligence from internal and external sources. Provide intelligence-driven recommendations for improved SOC detection and controls.
Technical Skills
  • Hands-on experience with vulnerability management tools (e.g., Nessus, Qualys, Rapid7).
  • Familiarity with threat intelligence platforms (e.g., Recorded Future, ThreatConnect, Mandiant).
  • Experience with SOC tools such as SIEM (e.g., Splunk, IBM QRadar, ArcSight, Rapid7).
  • Endpoint Detection and Response (EDR) tools (e.g., CrowdStrike, Carbon Black, SentinelOne).
  • IDS/IPS capabilities and familiarity with network monitoring tools.
  • Vulnerability Management tools (e.g., Nessus, Qualys, Rapid7).
  • Threat Intelligence Platforms (e.g., Recorded Future, ThreatConnect).
  • Firewalls and Network Monitoring tools (e.g., Palo Alto, Cisco ASA, Checkpoint).
  • Security Orchestration, Automation and Response (SOAR) platforms (e.g., Demisto, Phantom).
  • Web Gateway and Web Proxy tools (e.g., Blue Coat, Zscaler, Forcepoint, Palo Alto).
  • Strong knowledge of operating systems (Windows, Linux) and network protocols.
  • Proficiency in analysing packet captures (Wireshark, tcpdump).
  • Familiarity with scripting languages such as Python, Bash, or PowerShell.
  • Experience with cloud security monitoring (AWS, Azure, GCP).
  • Knowledge of incident management frameworks like NIST, MITRE ATT&CK.
Qualifications
  • Bachelor’s Degree in Cyber Security, Information Technology, or a related field.
  • 3-5 years of experience in SOC Operations, incident response, threat intelligence, or similar roles within a SOC environment.
  • Hands-on experience responding to security incidents using SIEM and EDR tools.
  • In-depth knowledge of networking, security principles, and threat detection methodologies.
  • Demonstrated ability to handle complex incident investigations and document findings effectively.
  • Practical experience in network- and host-based digital forensics across multiple operating systems.
  • In-depth experience working with a variety of monitoring tools, including SIEM, endpoint security, intrusion detection/prevention, packet analysis, CASB, and SOAR.
  • Knowledge of open security testing standards and projects, including OWASP and the MITRE ATT&CK matrix.
  • Strong organizational skills and attention to detail.
  • Excellent written communication skills, with a focus on translating technically complex issues into simple, easy-to-understand concepts.
Preferred Qualifications
  • Industry certifications such as CISSP, GIAC (GCIH, GCIH), GCTI.
  • Experience with forensic investigations, malware analysis and reverse engineering.
  • Familiarity with regulatory frameworks (e.g., GDPR, PCI DSS) and their impact on incident response procedures.
  • Experience with advanced persistent threat (APT) detection and mitigation.
  • Ability to work in a 24/7 on-call incident response environment.
  • Excellent communication skills, with the ability to clearly document incidents and provide post-incident reports to non-technical stakeholders.
  • Experience leading the deployment of a major SIEM platform (Splunk, QRadar, Sentinel, ArcSight, etc.) and/or EDR platform (CrowdStrike, Defender for Endpoint, Cybereason, etc.).
  • 5+ years of experience in cyber security and adjacent fields such as systems engineering, network management, cloud security, and/or application security.
  • 2+ years in a security engineering position.
  • 2+ years of scripting/coding experience with one or more languages.
  • Relevant industry certifications, a degree in cyber security or adjacent fields, or cyber security boot camps.
  • Experience in Python, PowerShell, Bash.
  • Experience with an Infrastructure as Code tool like Terraform.
  • Familiarity with cloud platforms like AWS, Azure, GCP.
  • 1
  • ...
  • 50
  • 51
  • 52
  • ...
  • 168

* The salary benchmark is based on the target salaries of market leaders in their relevant sectors. It is intended to serve as a guide to help Premium Members assess open positions and to help in salary negotiations. The salary benchmark is not provided directly by the company, which could be significantly higher or lower.

Job Search and Career Advice Platform

Empoweringjob seekers

Tools
  • Jobs
  • Resume review
  • Headhunters
  • Browse jobs
Company
  • About us
  • Careers at JobLeads
  • Site notice
  • Press
  • Reviews
Support
  • Help
  • Partner integration
  • ATS Partners
Social
  • JobLeads Blog
  • YouTube
  • LinkedIn
  • Instagram
  • Facebook
  • Privacy Policy
  • Terms of Use

© JobLeads 2007 - 2026 | All rights reserved