Security Operations Centre Analyst
RM 4,000 - RM 4,999 / Per Mon
Apply on
Availability Status
This job is expected to be in high demand and may close soon. We’ll remove this job ad once it's closed.
Original
Simplified
Position: SOC Analyst Overview:The SOC Analyst will be pivotal in safeguarding the organization’s IT infrastructure through proactive monitoring, detection, and response to security incidents. This role demands a keen understanding of threat landscapes, advanced security tools, and methodologies to uphold data integrity and confidentiality. Key Responsibilities: -Continuous monitoring of security event logs and alerts using SIEM tools to identify potential threats. -Perform deep-dive analysis of security incidents, applying forensic techniques to determine the scope and impact. -Execute incident response procedures to mitigate and contain security breaches swiftly and effectively. -Collaborate closely with cross-functional teams to escalate and remediate security events. -Develop and maintain comprehensive documentation, including incident reports and operational procedures. -Leverage threat intelligence sources to enrich detection capabilities and preempt emerging threats. -Participate actively in tabletop exercises and simulations to refine incident response tactics. -Ensure adherence to regulatory requirements and internal security policies. -Contribute to the enhancement and tuning of security monitoring tools and technologies. Required Skills: -Proficiency in network security concepts, including TCP/IP protocols, firewall management, and intrusion detection/prevention systems (IDS/IPS). -Hands-on experience with leading SIEM platforms (e.g., Splunk, QRadar) and familiarity with security orchestration, automation, and response (SOAR) tools. -Advanced knowledge of malware analysis, root cause analysis, and digital forensics methodologies. -Strong analytical skills to assess logs, network traffic, and system events for indicators of compromise (IOCs). -Deep understanding of cyber threats, attack vectors, and threat actor techniques. -Excellent communication skills for articulating technical details and recommendations to diverse audiences. Qualifications: -Bachelor’s degree in cybersecurity, computer science, or a related field; or equivalent work experience. -Relevant certifications such as CISSP, GIAC, or OSCP are highly valued. -Proven experience in a Security Operations Center (SOC) environment, handling incident response and security monitoring.
Similar Jobs