Epicareer Might not Working Properly
Learn More

Security Operations Center(SOC) Anlayst

Salary undisclosed

Apply on


Original
Simplified

Job Title: SOC Analyst

Location: Kuala Lumpur, Malaysia

Employment Type: Full-time

Job Overview:

We are seeking a motivated SOC Analyst to join our Security Operations Center (SOC) in Kuala Lumpur, Malaysia. As a SOC Analyst, you will be responsible for monitoring, analyzing, and responding to security incidents within our IT environment. The ideal candidate will have a strong technical background in cybersecurity and a proactive approach to threat detection and response. This role is crucial for identifying and mitigating potential threats to ensure the security of our systems and data.

Key Responsibilities:

  • Real-Time Monitoring:
  • Monitor security alerts and events using SIEM (Security Information and Event Management) tools to identify potential threats and security incidents.
  • Incident Response:

Respond to security incidents, perform initial analysis, categorize incidents based on severity, and escalate to higher tiers or other teams as needed.

  • Threat Analysis:

Analyze alerts and indicators of compromise (IOCs) to identify patterns and trends, and assess the potential impact on the organization.

  • Investigation and Documentation:

Conduct in-depth investigations of security incidents, document findings, and maintain comprehensive incident reports.

  • Collaborate with Teams:

Work closely with Tier 2/3 analysts, threat intelligence teams, and IT staff to enhance detection capabilities and improve response protocols.

  • Enhance Detection Rules:

Assist in tuning and configuring SIEM rules, filters, and alerts to reduce false positives and improve the accuracy of incident detection.

  • Reporting and Metrics:

Prepare reports and metrics on SOC performance, incident trends, and overall security posture to present to management.

  • Stay Updated:

Keep up-to-date with emerging security threats, vulnerabilities, and best practices in incident response and monitoring.

Required Qualifications:

  • Educational Background:

Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.

  • Experience:

1-2 years of experience in a SOC, NOC, or a similar role focused on security monitoring, incident response, or threat analysis.

  • Technical Skills:
  • Proficiency with SIEM tools (e.g., Splunk, QRadar, ArcSight).
  • Knowledge of network protocols, intrusion detection, and firewalls.
  • Basic understanding of malware analysis, threat intelligence, and vulnerability management.
  • Familiarity with frameworks such as MITRE ATT&CK and industry best practices for incident response.
  • Certifications (Preferred):
  • CompTIA Security+, CEH (Certified Ethical Hacker), or similar certifications are a plus.

Soft Skills:

  • Analytical and Problem-Solving Skills:

Strong ability to analyze, troubleshoot, and resolve security issues.

  • Attention to Detail:

Diligent in monitoring, analyzing, and documenting incidents.

  • Communication:

Clear and effective communication skills to collaborate with various IT and security teams.

  • Team Player:

Ability to work effectively within a team and manage workload in a fast-paced environment.

Interested candidates are invited to send their resume to [email protected]