Enable job alerts via email!

SOC Analyst (L2)

PT Nusantara Compnet Integrator

Daerah Khusus Ibukota Jakarta

On-site

USD 18.000 - 25.000

Full time

Yesterday
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in cybersecurity is seeking a 2nd Level Security Analyst to conduct investigations on incidents and analyze logs for suspicious activities. The ideal candidate will have a strong background in cybersecurity, experience in threat intelligence, and relevant certifications. This role requires commitment to ensuring security and effective incident response.

Qualifications

  • Minimum 2 years of experience as a 2nd Level Security Analyst.
  • Strong skills in using security tools.
  • In-depth knowledge of the MITRE ATT&CK Framework.

Responsibilities

  • Conduct investigations of cybersecurity incidents.
  • Analyze logs from security devices.
  • Document incidents and generate detailed reports.

Skills

Log analysis
Incident investigation
Threat intelligence

Education

Bachelor's degree in Cybersecurity
Bachelor's degree in Information Technology
Bachelor's degree in related field

Tools

SIEM
EDR
TIP

Job description

Conduct in-depth investigations of cybersecurity incidents identified through monitoring systems or escalated by L1 analysts.

Analyze logs from various security devices (Firewall, IDS/IPS, EDR, Email Security, Internet Security, UBA, TIP) to identify suspicious patterns or activities.

Document incidents and generate reports detailing threat analysis and security improvement recommendations.

Coordinate with relevant teams to ensure timely and effective response to identified threats.

Willing to work in shift patterns.

Requirements:

Bachelor's degree in Cybersecurity, Information Technology, or a related field.

Minimum 2 years of experience in 2nd Level Security Analyst role.

Strong skills in log analysis and incident investigation using security tools such as SIEM, EDR, XDR, NDR, Firewall.

In-depth knowledge of cyberattack techniques and the MITRE ATT&CK Framework.

Experience working with Threat Intelligence Platforms (TIP).

Certifications (one or more preferred): CEH (Certified Ethical Hacker), OSCP (Offensive Security Certified Professional), GIAC Security Operations Certified (GSOC), CHFI (Computer Hacking Forensic Investigator), or other relevant security certifications.

How many years' experience do you have as a Security Operations Centre Analyst?

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.