The Cybersecurity Analystprotects theuniversitys digital environment by monitoring detecting and responding to threats across on-premises and cloud systems. By ensuring compliance and safeguarding criticaldata this role enables secure uninterrupted operations that support the universitys mission of delivering quality education and research.
Responsibilities
Security Operations & Monitoring
Monitor ICT systems and services for vulnerabilities malware and suspicious activities using advanced tools.
The role involves proactive threat detection triage of security events andleveragingautomation to streamline alert handling.
Continuously review and enhance monitoring processes to strengthen detection capabilities and minimise risk.
Incident Management & Response
Act as the designated point of contact for cybersecurity incidents.
Triage analyse and escalate incidents in line with established policies and procedures.
Track remediation efforts for security gapsaudit findingsandconduct post-incidentreviews implementlessons learned to strengthen response processes.
Vulnerability Management&Risk Management
Design and integrate security systems to reduce exposure to threats.
Perform regular vulnerability scans across critical and high-value assets including applications.
Track remediation progress and providetimelystatus reports to managementand work with developers to remediate application-level vulnerabilities promptly.
Identifyand assess cybersecurity risks including application security risksand coordinate mitigation measures with relevant stakeholders.
Update riskregistersmonthly ensuring new risks are assessed and mitigation plans documented within two weeks of identification.
SecurityReporting Metricsand Continuous Improvement
Collect log and organise cybersecurity events incidents and vulnerability data in a centralised system.
Analyse data toidentifytrends and provide actionable insights for management.
Evaluate the effectiveness of security standards and procedures regularly review post-incident actions and incorporate improvements into processes.
Promote secure development practicessecurity awareness across teamsand encourageparticipation in security initiatives across divisions.
Requirements
Hands-on experience in:
Cloud security (AWS Azure GCP) and hybrid environments
Security monitoring analytics and reporting using SIEM and EDR tools
Vulnerability assessments and management across infrastructure and applications
Network and infrastructure security including firewalls and endpoint protection
Web and application security including OWASP Top 10 and secure coding practices
Advanced knowledge in:
Incident response and escalation including coordination with technical and business stakeholders.
Vulnerability management frameworks and use of MITRE ATT&CK for threat analysis
Able to developand improve of security playbooks post-incident reviews and lessons learned
Preferred experience: Working with development teams to embed security in the software development lifecycle conducting secure code reviews and using automated scanning tools
Desirable Characteristics
Please apply via 26 December 2025.
We thank you for your interest and shortlisted candidates will be notified.
The Singapore campus of James Cook University (registered as James Cook University Pte Ltd in Singapore) is a wholly owned company of James Cook University Australia. The University offers Bachelor & Master Programs in Business Psychology Information Technology & Education at the Singapore campus of James Cook University.
Required Experience:
IC
JCU offers globally-recognised degrees for full/part-time courses. Learn more about our wide range of world-class college degree courses in Singapore here.