Expoint – all jobs in one place
The point where experts and best companies meet
Limitless High-tech career opportunities - Expoint

Intercontinental Exchange - ICE Analyst Cybersecurity DFIR 
Singapore, Singapore 
901518312

21.09.2025
Job Description


Job Purpose

The ICE Cybersecurity Digital Forensics and Incident Response (DFIR) team is responsible for defending critical financial infrastructure from Global Cyber threats. This role is suited for both entry-level analysts and experienced engineers, with responsibilities and growth opportunities tailored to each level. You will work alongside experienced professionals to investigate security events, analyze data, and contribute to protection of ICE’s digital assets.

Responsibilities

  • Email Threat Analysis: Review and triage user reported emails to identify phishing attempts, malware delivery, and other malicious content. Take appropriate containment actions and support eradication efforts to prevent recurrence.
  • Data Loss Prevention: Analyze DLP alerts to detect potential data exfiltration or policy violations.
  • Operations: Handle stakeholder requests and enquiries related to cybersecurity operations. Address security concerns by providing guidance, resolving access or policy-related issues, and coordinating with internal teams to ensure timely and secure solutions.
  • Incident Detection and Response: Detect, document, investigate, and resolve security incidents in an efficient manner.
  • Intrusion Detection & Alert Tuning: Monitor security tools and telemetry for signs of compromise. Contribute to tuning detection rules to reduce false positives and improve alert fidelity.
  • Behavioral Analysis: Develop and implement criteria to detect anomalous user behavior that may indicate insider threats or policy violations.

Desirable Knowledge and Experience

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, related technical field, or equivalent practical experience.
  • Exposure to software development environments or financial services is a plus.
  • Hands-on experience with enterprise security tools including SIEM (e.g., Splunk, QRadar), IDS/IPS, forensic suites (e.g. EnCase, Volatility, Autopsy, X-Ways, Magnet Axiom), and malware analysis platforms.
  • Proficient in at least one scripting language (e.g. Python, Bash, PowerShell, JavaScript, etc.)
  • Experience in cloud and container security, including incident response in AWS, Azure, and hybrid environments.
  • Familiarity with MITRE ATT&CK framework and threat intelligence platforms.
  • Demonstrated ability to communicate complex technical findings to both technical and non-technical audiences.
  • Relevant certifications such as GIAC GCFA, GCIA, GCIH, CISSP, or OSCP.