Jobs for Veterans, Veteran Job Board |

Post Jobs

Job Information

Accenture Cyber Intelligence Operations Analyst in Singapore, Singapore

We Are

Accenture Security helps organizations prepare, protect, detect, respond and recover along all points of the security lifecycle. Cybersecurity challenges are different for every business in every industry. Leveraging our global resources and advanced technologies, we create integrated, turnkey solutions tailored to our clients’ needs across their entire value chain. Whether we’re defending against known cyberattacks, detecting and responding to the unknown, or running an entire security operations center, we will help companies build cyber resilience to grow with confidence. Our team of the security sector’s brightest people use the coolest tech to out-hack the hackers and help clients build resilience from within. We blend risk strategy, digital identity, cyber defense, application security and managed service solutions to rethink the entire security lifecycle.

You Are

A Cyber Intelligence Operations Analyst within Accenture’s Security practice. You will work in a world class group to research and respond to today’s most relevant threats. The responsibilities of this role include researching and reporting on developments in the threat landscape, building network and endpoint detections, and coordinating internal teams to best defend our customers.

The Work (Role Responsibility)

  • Researching, understanding, and developing responses to cyber threats

  • Writing, editing, and publishing technical reports

  • Developing and deploying network and endpoint detections to support a Security Operations Center analysis team

  • Performing data analysis to optimize SOC procedures

  • Prioritize and remediate internal maintenance requests to ensure a well-run global analytics platform

  • Assist in the coordination and implementation of major detection enhancements to SOC analytics

  • Coordinating analysis teams to best educate on and respond to developments in the Threat Landscape

  • Developing policies and procedures for handling security incidents

Here’s What You Need (Basic Qualifications)

  • Minimum 2 years of IT security experience – focused on intrusion detection/network security monitoring and/or working with cyber threat intelligence

  • Minimum 1 year technical writing ability

  • Minimum 2 years researching security threats and developing detection mechanisms to defend against them

  • Minimum 2 years in computer networking fundamentals, including a detailed understanding of TCP/IP and other core Internet protocols.

Bonus Points If (Preferred Skills)

  • The ability to express themselves clearly and demonstrate strong verbal and written communication skills

  • A strong understanding of the information security threat landscape, including detailed technical knowledge about the most prevalent threat groups, malware, attack methods, and vulnerabilities

  • Experience researching complex technical subject matter, and clearly documenting the results/key findings for others to review.

  • Experience working with clients, preferably in an operational environment.

  • One or more of the following certifications is desired: CISSP, GCIA, GCIH, GCFA.

  • Technically inquisitive nature with a fearless approach to defending against the latest and greatest cyber threats

  • Hands-on experience with market-leading security products, including any of the following intrusion detection systems (Snort/SourceFire, IBM Proventia/ISS, McAfee IntruShield) and firewalls (CheckPoint, Cisco PIX)