
Crypto • Fintech • Banking
Propine is Asia's first CMS licensed, audited, and insured digital asset custodian designed specifically for institutional clients. It offers enterprise-grade custody solutions, asset tokenization, and trading services for digital assets and fiat, ensuring top-tier investor protection and seamless operation. With a robust and secure infrastructure, Propine aims to facilitate institutions in navigating the evolving crypto economy while maintaining compliance with regulatory standards.
March 29

Crypto • Fintech • Banking
Propine is Asia's first CMS licensed, audited, and insured digital asset custodian designed specifically for institutional clients. It offers enterprise-grade custody solutions, asset tokenization, and trading services for digital assets and fiat, ensuring top-tier investor protection and seamless operation. With a robust and secure infrastructure, Propine aims to facilitate institutions in navigating the evolving crypto economy while maintaining compliance with regulatory standards.
• We seek a highly motivated and skilled Threat and Incident Response Analyst to join our information security team. • The ideal candidate will be a career-driven and passionate security professional. • Responsibilities: Identify and analyze cybersecurity threats impacting the organization's environment. • Responsible for proactively discovering new attacks through advanced security monitoring techniques and tools. • Investigate and respond to identified security incidents using a defined incident response process. • Create playbooks and processes to respond to incidents. • Collaborate with the engineering team to automate response to security incidents. • Identify emerging threats and ensure the detection and response capabilities are updated. • Perform threat modeling across technologies and applications and ensure security controls are in place. • Identify data sources and security monitoring use cases relevant to threat defense requirements. • Operate and Administer SIEM platform. • Utilize security tools like SIEM, EDR, WAF, IDS, Netflow to investigate and respond to threats. • Responsible for assessing, curating, and managing Threat intelligence feeds to enable correlation of security events. • Participates in an on-call rotation for 24x7 support of security operations.
• 5-7 years of work experience in the information security industry focused on security/threat analysis and prevention and detection technologies. • Strong analytical skills and self-motivated to learn and adapt to new technologies and methodologies. • In-depth knowledge of technologies like Unix/Linux, Windows, AD, Databases, Cloud, DevOps. • Experience with endpoint and network security technologies like IDS, IPS, EDR, ATP, Malware defenses. • Experience with SIEM and Log management technologies. • In-depth understanding of Cyber Threat TTP's, Threat Hunt methodologies, and the application of the Mitre Attack framework. • Experience with scripting languages. • Well versed with threat modeling methodologies like STRIDE, PASTA. • Ability to communicate and collaborate effectively with technical and non-technical team members in different geographies and a fast-paced work environment.
Apply Now