Incident Response Specialist (12-months Contract)
Sector:
Technology
Function:
Contact Name:
Aviral Bhargava
Expiry Date:
06-Dec-2025
Job Ref:
Date Published:
06-Nov-2025
Role Overview:
We are seeking a mid-level cybersecurity professional to join a leading financial services organization’s advanced threat defense team. The role focuses on identifying, analyzing, and mitigating malware threats across multiple platforms, helping to protect the organization and its clients. The ideal candidate will work in a dynamic, high-stakes environment where investigative skills, technical expertise, and collaboration with incident response teams are essential to maintain robust cybersecurity defenses.
Key Responsibilities:
· Respond, triage, and adapt to real-time threats targeting the organization through the lens of malware delivery and execution.
· Perform static, dynamic, and behavioral analysis of malicious software and potential indicators of compromise.
· Maintain detailed documentation regarding analysis findings and producing comprehensive reports encompassing observations, actions taken, and recommendations.
· Identify cyber risks and help develop improvements to controls and detection mechanisms.
· Collaborate with response teams to defend against emerging threats and contribute to Incident Response efforts.
Key Requirements:
· We are looking for mid-level candidates with malware analysis and incident response experience.
· Specific experience with triaging detections, prioritizing threats, performing static and dynamic analysis, identifying security gaps, and implementing preventative measures.
· Candidates should have a very strong investigative mindset with an ability to drive process changes and implement control enhancements.
· Candidates typically should have 3-5 years of relevant experience in one or more threat prevention disciplines focusing on Email, Web, or Endpoint.
Preferred Skillset
· Understanding of browser exploitation techniques
· Familiarity of web based technologies such as Javascript or HTML and how they are commonly abused by various threat actors or techniques.
· Experience with reviewing and analyzing Email Headers.
· Experience with detecting phishing and other common email threats.
SIEM experience with event correlation and searching.
· Experience with dynamic analysis tools such as Process Monitor, FakeDNS, Regshot, or Wireshark.
· Familiarity with use and interpretation of malware analysis results from sandbox technologies.
· Technical experience and ability to operate and maintain a virtualized sandbox environment.
· Familiarity with URL categorization and analysis tools like Fiddler, commercial sandbox, or web proxy technologies.
· Ability to assess files or URLs and extract Indicators of Compromise (IoCs) such as malicious domains, IPs, and file hashes.
· Experience with documentation and ability to clearly articulate thoughts to a wide variety of intended audiences (teammates, technical, non-technical, leadership, etc.).
· Knowledge of Endpoint Detection and Response (EDR) tools
· Knowledge of forensic artifacts such as Browser, Registry, or Event Log artifacts.
Nice to have
· 3+ years of experience conducting end to end Malware analysis specifically around either Email, Web, or Endpoint.
Desired Certifications
· GCIH, GREM, GCFA, GCFE, CFCE, or CISSP
If this role aligns with your experience and career goals, please send your application to AviralBhargava@argyllscott.sg.
Argyll Scott Asia is acting as an Employment Business in relation to this vacancy.
Share this job
Sign up for Job alerts
Get similar jobs like these by email