Enable job alerts via email!

IT Security Operation Center (SOC) - L2 (IT Consulting)

Luminare Consulting

Daerah Khusus Ibukota Jakarta

On-site

IDR 100.000.000 - 200.000.000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An innovative IT consulting firm is seeking a skilled IT Security Operation Center (SOC) Analyst to join their dynamic team. This role involves performing in-depth investigations of security incidents, monitoring real-time alerts, and collaborating with cross-functional teams to enhance security measures. As a vital part of the SOC, you will manage security tools, document incidents, and stay updated on the latest cybersecurity trends. The ideal candidate will have a strong background in cyber security, incident management, and effective communication skills. Join this forward-thinking company and make a significant impact in the field of IT security.

Qualifications

  • Minimum 2 years of experience in Cyber security/SOC.
  • Proficient in Incident Management and Response.

Responsibilities

  • Perform in-depth investigations of security incidents and develop incident reports.
  • Monitor and respond to real-time security alerts.

Skills

Incident Management
Cyber Security
Threat Detection
Security Monitoring
Communication Skills

Education

Bachelor's Degree in Cyber Security or related field

Tools

SIEM Tools
Packet Analysis Tools
Service Now Ticketing Toolset
Antivirus Software

Job description

IT Security Operation Center (SOC) - L2 (IT Consulting)

We are assisting one of our clients, an IT Consulting company, and they are currently looking for IT Security Operation Center (SOC) - L2.

Job Descriptions:

  1. Incident Response and Investigation:
    • Perform in-depth investigations of security incidents, analysing security alerts, and developing incident reports.
    • Analyse security events from various sources, including SIEM (Security Information and Event Management) tools, intrusion detection systems, firewalls, and antivirus software.
  2. Threat Detection and Analysis:
    • Identify and classify security threats based on their severity and potential impact on the organization.
    • Monitor and respond to real-time security alerts, escalating incidents to higher-level analysts or management as necessary.
  3. Security Tool Management:
    • Manage and fine-tune security monitoring tools to enhance detection capabilities.
    • Assist in creating and updating playbooks for incident response and threat hunting.
  4. Collaboration and Communication:
    • Work with cross-functional teams, including IT, development, and compliance, to ensure a cohesive approach to security.
    • Communicate findings, risks, and recommendations to stakeholders clearly and effectively.
  5. Documentation and Reporting:
    • Maintain detailed documentation of security incidents, responses, and the overall security posture of the organization.
    • Contribute to regular security reports and metrics for management reviews.
    • Stay updated on the latest cybersecurity trends, threats, and best practices.
    • Participate in training and professional development opportunities to enhance skill sets and knowledge.

Requirements:

  1. Minimum 2 years of experience in Cyber security/SOC
  2. Proficient in Incident Management and Response
  3. In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management, etc.
  4. Responsible for working in a 24x7 Security Operation Centre (SOC) environment.
  5. Provide analysis and trending of security log data from a large number of heterogeneous security devices
  6. Analyze and respond to previously undisclosed software and hardware vulnerabilities
  7. Investigate, document, and report on information security issues and emerging trends
  8. Integrate and share information with other analysts and other teams.
  9. Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix.
  10. Have experience operating SIEM Dashboard, Use Case, and Policy related to alert/issue/vulnerability and other security issues.
  11. Have experience creating knowledge base/Playbook/Guideline for investigation processes and every SOC process activity.
  12. Communicate effectively with customers.
  13. Knowledge about various tools like SIEM, Packet Analysis, HIPS/NIPS, Service Now Ticketing Toolset, Web Security, AV, UBEA, Advanced SOC.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.