Sign in or register for a JobTech account.

Jobs that require osi model skill

IMDA
03Jan
Manager - Application Engineer
IMDA   via JobTech

Manager - Application Engineer

Responsibilities

You will be part of IMDA’s cybersecurity arm that executes ICT initiatives to uplift the cybersecurity posture of the Infocomm and Media (ICM) sectors. You will work closely with the team and be responsible to plan, design, procure, configure and deploy ICT systems for various telecommunications-related cybersecurity projects.

The successful candidate shall be responsible, among others, to:

  • Work with the servers, network infrastructure and user/operations teams to conceptualise, define requirements, procure, manage and deploy the required business application(s).
  • Ensure that business application(s) are compliant with government security policies and guidelines, fulfil all business requirements and are adequately tested, patched, and securely configured before commissioning.
  • Support the conduct of pre-commissioning application/system tests, such as user acceptance testing, performance testing, operations readiness testing, system security acceptance testing, security reviews and/or security audits.
  • Code and configure prototypes for business applications for proof of concepts, where necessary.
  • Develop documentations required for hand-over of the business application(s) to the IMDA user or operations team.
  • Support the operationalisation of the business application(s).
  • Provide consultancy advice and guidance to IMDA teams on related technical areas.
  • Perform other related duties as assigned.

 

Requirements

  • Background in Computer Science / Computing / Information Technology or equivalent
  • Certification in DevSecOps Engineering is preferred.
  • At least 5 years of relevant working experience in developing, deploying and managing ICT applications and systems on various operating platforms (e.g. Windows, Linux), and virtualization platforms (e.g. HyperV, VMware).
  • Proficient with coding and DBMS languages such as C, C++, Java, Python, Go, SQL, etc, and Linux CLI.
  • Understand the threat models and security risks for application systems, and be able to apply DevSecOps in the SDLC of applications developed for various platforms, such as web application, embedded application, mobile application, websites.
  • Familiar with cloud deployment models and application security in cloud environment.
  • Familiar with security best practices such as OWASP Top 10, and security principles for secure application development such as input validation check, data sanitisation, secure session management, AAA, cryptography, etc. Candidates with past trainings in these areas is preferred.
  • Able to write and review codes for security testing.
  • Knowledgeable with computer networking (e.g. TCP/IP, UDP, OSI model, etc).
  • Able to show motivation and initiative, problem-solve, be flexible, and handle multiple projects.
  • Able to work both independently or with multiple teams.
  • Possess strong analytical and organizational skills.
  • Possess good written, communication and presentation skills.
  • Familiarity with government security requirements and/or processes (e.g. procurement) will have an added advantage.

Position will commensurate with experience.

Only short-listed candidates will be notified.

 

Skills
FireEye, Inc.
07Feb
Consulting Sales Engineer
FireEye, Inc.   via Glassdoor

Company Description

FireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,500 customers across 67 countries,    Read more

including more than 50 percent of the Forbes Global 2000.

Job Description

As our Consulting Sales Engineer you will be working in a highly customer facing role, providing pre-sales support and guidance to our customers. Collaborating with field sales and channel sales teams to recommend and develop customer solution. As the Consulting SE, you will work in a consultative fashion and is looked to as an expert in his/her field by the account team, channel partners and customers.

Responsibilities:

What We Will Do For You:

Expose you to some of the most exciting and cutting edge techniques to find evil

Training and continuous coaching and mentoring to grow your technical and professional skills like no one else

Work with a team of brilliant people that you can learn from and build lasting relationships with

Develop an understanding of your aspirations and provide opportunities that we believe will get you there

Inspiration to stretch your performance by allowing you to tackle seemingly impossible problems

Encouragement challenge the status quo, think creatively, and innovate –make us better

An environment of trust and camaraderie, where you can speak freely about your ideas

A platform from which you can make a real impact against the bad guys

Develop an understanding of, and be flexible to, your needs and provide a fantastic benefits package

What You Can Do For Us:

Provide pre-sales assistance for sales opportunities to customers and partners. Including installations, troubleshooting and training of FireEye products

Refine and research technical requirements of the opportunity

Create solutions and articulate the benefits of FireEye products

Work closely with customers in the design and implementation/integration of FireEye products

Understand the customer’s business drivers and how to map these to a customer network platform, including identification of improvement areas in network design

Qualifications

What You Bring With You:

Relevant working experience of 8 years in solution architect

You must have pre sales experience and excellent technical knowledge within networking and/or security

Experience with conducting presentations and demonstrations/POCs

Excellent knowledge and experience with a wide variety of IT technologies and security solutions. Day-to-day operations and interactions will involve the following focus areas:

Network Engineering - the OSI model, IPv4/6, Routing, Switching, DNS, VLANs and Subnetting, Taps, Load Balancers, SNORT, YARA

Network Security - Firewalls, IDS / IPS, HTTP/SSL Proxies, SSL Interceptors, SIEM Products

A minimum of 3 years of hands on experience and certifications on cloud platforms like AWS, Azure, Google etc

Troubleshooting skills and experience

Able to create excellent relationships with your customers and internally across internal teams - Systems Engineering, Marketing, Professional Services etc…

Exemplary communication and interpersonal skills

A willingness to be challenged and a strong desire to learn

Security certifications, CISSP, CISM, Security+, CEH, etc. are a plus

Skills
Ocbc Bank
05Feb
Soc Analyst Tier 1 Support - Group Operations And Technology
Ocbc Bank   via Glassdoor

Responsibilities

SOC Analyst Tier 1 performs 24X7 monitoring using alerts from cyber defence tools such as intrusion detection system alerts, and end-point security monitoring alerts. SOC Analyst determines which security issues may have an impact on the organisation. They provide initial evaluation and escalation of incidents to Tier 2s. SOC Analysts may be tasked to perform initial / basic containment of incidents and deliver reports. Normally has 0 to    Read more

2 or more years of experience in cyber defence or a related field.

Requirements

Knowledge of common network tools (e.g., ping, traceroute, nslookup)

Knowledge of cyber defence policies, procedures, and regulations

Knowledge of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Wide Area Network [WWAN], Wireless Local Area Network [WLAN])

Knowledge of SIEM, Intrusion Detection System (IDS) tools and applications

Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution)

Knowledge of vulnerability assessment tools, including open source tools, and their capabilities

Knowledge of incident response and handling methodologies

Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)

Knowledge of the cyber defence service provider reporting structure and processes within one’s own organization

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)Language/Structured Query Language [PL/SQL]

Ability to interpret and incorporate data from multiple tool sources

Knowledge of file extensions (e.g. .dll, .bat, .zip, .pcap, .gzip)

Knowledge of the common attack vectors on the network layer

Skill in reading and interpreting signatures (e.g., Snort)

Knowledge of web filtering technologies

Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies

Knowledge of host/network access controls (e.g., access control list)

Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Dynamic Host Configuration Protocol [DHCP]) and directory services (e.g., Domain Name System [DNS])

Knowledge of the common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications

Knowledge of Windows command line (e.g., ipconfig, netstat, dir, nbtstat)

Knowledge of Defence-in-depth principles and network security architecture

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open System Interconnection model [OSI], Information Technology Infrastructure Library [ITIL])

Knowledge of signature implementation impact

Skill in recognizing and categorizing types of vulnerabilities and associated attacks

Skill in detecting host and network-based intrusions via intrusion detection technologies

Skills
Info-communications Media Development Authority
03Feb
Manager - Application Engineer
Info-communications Media Development Authority   via JobsCentral

Manager - Application Engineer
Responsibilities
You will be part of IMDA’s cybersecurity arm that executes ICT initiatives to uplift the cybersecurity posture of the Infocomm and Media (ICM) sectors. You will work closely with the team and be responsible to plan, design, procure, configure and deploy ICT systems for various telecommunications-related cybersecurity projects.
The successful candidate shall be responsible, among others, to:

Work with the servers, network infrastructure and user/operations teams to    Read more

conceptualise, define requirements, procure, manage and deploy the required business application(s).
Ensure that business application(s) are compliant with government security policies and guidelines, fulfil all business requirements and are adequately tested, patched, and securely configured before commissioning.
Support the conduct of pre-commissioning application/system tests, such as user acceptance testing, performance testing, operations readiness testing, system security acceptance testing, security reviews and/or security audits.
Code and configure prototypes for business applications for proof of concepts, where necessary.
Develop documentations required for hand-over of the business application(s) to the IMDA user or operations team.
Support the operationalisation of the business application(s).
Provide consultancy advice and guidance to IMDA teams on related technical areas.
Perform other related duties as assigned.

 
Requirements

Background in Computer Science / Computing / Information Technology or equivalent
Certification in DevSecOps Engineering is preferred.
At least 5 years of relevant working experience in developing, deploying and managing ICT applications and systems on various operating platforms (e.g. Windows, Linux), and virtualization platforms (e.g. HyperV, VMware).
Proficient with coding and DBMS languages such as C, C++, Java, Python, Go, SQL, etc, and Linux CLI.
Understand the threat models and security risks for application systems, and be able to apply DevSecOps in the SDLC of applications developed for various platforms, such as web application, embedded application, mobile application, websites.
Familiar with cloud deployment models and application security in cloud environment.
Familiar with security best practices such as OWASP Top 10, and security principles for secure application development such as input validation check, data sanitisation, secure session management, AAA, cryptography, etc. Candidates with past trainings in these areas is preferred.
Able to write and review codes for security testing.
Knowledgeable with computer networking (e.g. TCP/IP, UDP, OSI model, etc).
Able to show motivation and initiative, problem-solve, be flexible, and handle multiple projects.
Able to work both independently or with multiple teams.
Possess strong analytical and organizational skills.
Possess good written, communication and presentation skills.
Familiarity with government security requirements and/or processes (e.g. procurement) will have an added advantage.

Position will commensurate with experience.
Only short-listed candidates will be notified.

Skills
Citibank N.A.
29Jan
Red Team Analyst - Info Sec Tech Lead Analyst
Citibank N.A.   via Citibank N.A.



This position requires at least 3-7 years working experience and at least a Bachelor's Degree. A basic understanding of web application and infrastructure security is a must.

Duties will include

•Providing vulnerability assessment and penetration testing services to Citi businesses globally through a comprehensive testing process

•Identifying weaknesses and vulnerabilities within the system and proposing countermeasures.

•Testing of the overall security of critical infrastructure components and applications to ensure    Read more

they comply with internal policies, security architecture best practices, and industry standards

•Scanning and discovering rouge hosts, networks, and devices

•Scanning and discovering vulnerable systems and applications

•Reporting information security vulnerabilities to businesses and vendors

•Subject matter expert in offensive information security including databases, networking, operating systems, applications, and programming.

The candidate is expected to already be familiar with the majority of the below tools:

•Experience in Web development and programming languages i/e Java/J2EE (Servlets/JSPs, STRUTS, Spring Flow, JavaServer Faces, Hibernate, JDBC, Enterprise Java Beans)

•Vulnerability Assessment tools, e.g. Nessus, Qualys, etc

•Penetration testing (application and/or infrastructure)

•Identifying, researching, validating, and exploiting various different known and unknown security vulnerabilities on server and client side

•Exploitation frameworks, e.g. Metasploit, CANVAS, Core Impact

•Social Engineering campaigns, e.g. email phishing, phone calls, SET

•Deep understanding of OSI model

•Security devices, e.g. Firewalls, VPN, AAA systems

•OS Security, e.g. Unix, Linux, Windows, Cisco, etc

•Understanding of common protocols, e.g. LDAP, SMTP, DNS, Routing Protocols

•Web application infrastructure, e.g. Application Servers, Web Servers, Databases

•Web development and programming languages i.e. Python, Perl, Ruby, Java, and/or .Net

•Reporting information security vulnerabilities to businesses

The following requirements are a plus as we are willing to invest in training and development in the security and vulnerability space:

•Conducting application vulnerabilities assessments and articulating security issues to technical and non-technical audience

•Knowledge of tools and processes used to expose common vulnerabilities and implement countermeasures

•Experience using open source and vendor vulnerability assessment tools

•Background in a similar role

•Understanding enterprise networks

In this role you will get a chance to work in a unique environment with diverse technology implementations. Personal development is important, all of our analysts acquire and maintain industry-accredited security certifications (the candidate must have or be willing to obtain the following ones) – GIAC, GXPN, GDAT, GWAPT, GPEN, GCIH, OSCP, OSCE, CREST, GMOB and CEH.

#LI-SG

-------------------------------------------------Grade :All Job Level - All Job FunctionsAll Job Level - All Job Functions - SG

------------------------------------------------------Time Type :

------------------------------------------------------

Citi is an equal opportunity and affirmative action employer.

Minority/Female/Veteran/Individuals with Disabilities/Sexual Orientation/Gender Identity.

Citigroup Inc. and its subsidiaries ('Citi”) invite all qualified interested applicants to apply for career opportunities. If you are a person with a disability and need a reasonable accommodation to use our search tools and/or apply for a career opportunity CLICK HERE.

To view the 'EEO is the Law' poster CLICK HERE. To view the EEO is the Law Supplement CLICK HERE.

To view the EEO Policy Statement CLICK HERE.

To view the Pay Transparency Posting CLICK HERE.

Skills