Security Operations Center(SOC) Anlayst
Apply on
Job Title: SOC Analyst
Location: Kuala Lumpur, Malaysia
Employment Type: Full-time
Job Overview:
We are seeking a motivated SOC Analyst to join our Security Operations Center (SOC) in Kuala Lumpur, Malaysia. As a SOC Analyst, you will be responsible for monitoring, analyzing, and responding to security incidents within our IT environment. The ideal candidate will have a strong technical background in cybersecurity and a proactive approach to threat detection and response. This role is crucial for identifying and mitigating potential threats to ensure the security of our systems and data.
Key Responsibilities:
- Real-Time Monitoring:
- Monitor security alerts and events using SIEM (Security Information and Event Management) tools to identify potential threats and security incidents.
- Incident Response:
Respond to security incidents, perform initial analysis, categorize incidents based on severity, and escalate to higher tiers or other teams as needed.
- Threat Analysis:
Analyze alerts and indicators of compromise (IOCs) to identify patterns and trends, and assess the potential impact on the organization.
- Investigation and Documentation:
Conduct in-depth investigations of security incidents, document findings, and maintain comprehensive incident reports.
- Collaborate with Teams:
Work closely with Tier 2/3 analysts, threat intelligence teams, and IT staff to enhance detection capabilities and improve response protocols.
- Enhance Detection Rules:
Assist in tuning and configuring SIEM rules, filters, and alerts to reduce false positives and improve the accuracy of incident detection.
- Reporting and Metrics:
Prepare reports and metrics on SOC performance, incident trends, and overall security posture to present to management.
- Stay Updated:
Keep up-to-date with emerging security threats, vulnerabilities, and best practices in incident response and monitoring.
Required Qualifications:
- Educational Background:
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.
- Experience:
1-2 years of experience in a SOC, NOC, or a similar role focused on security monitoring, incident response, or threat analysis.
- Technical Skills:
- Proficiency with SIEM tools (e.g., Splunk, QRadar, ArcSight).
- Knowledge of network protocols, intrusion detection, and firewalls.
- Basic understanding of malware analysis, threat intelligence, and vulnerability management.
- Familiarity with frameworks such as MITRE ATT&CK and industry best practices for incident response.
- Certifications (Preferred):
- CompTIA Security+, CEH (Certified Ethical Hacker), or similar certifications are a plus.
Soft Skills:
- Analytical and Problem-Solving Skills:
Strong ability to analyze, troubleshoot, and resolve security issues.
- Attention to Detail:
Diligent in monitoring, analyzing, and documenting incidents.
- Communication:
Clear and effective communication skills to collaborate with various IT and security teams.
- Team Player:
Ability to work effectively within a team and manage workload in a fast-paced environment.
Interested candidates are invited to send their resume to [email protected]