PT Nusantara Compnet Integrator
Jakarta Utara
On-site
IDR 200.000.000 - 300.000.000
Full time
Job summary
A leading cybersecurity firm in Jakarta Utara is seeking a Security Analyst (L2) to conduct thorough investigations of incidents and analyze security logs. Candidates should have a Bachelor's degree in Cybersecurity or a related field and at least 2 years of experience in a similar role. Strong skills in log analysis and familiarity with security tools are essential. This position requires shift work and offers opportunities for career advancement in a dynamic environment.
Qualifications
- Minimum 2 years of experience as a Security Analyst (L2).
- Strong skills in log analysis and incident investigation using security tools.
- Certifications preferred: CEH, OSCP, GSOC, CHFI, or related.
Responsibilities
- Conduct in-depth investigations of cybersecurity incidents.
- Analyze logs from various security devices.
- Document incidents and generate threat analysis reports.
- Coordinate with teams for threat responses.
- Willing to work in shift patterns.
Skills
Log analysis
Incident investigation
Cyberattack techniques knowledge
Threat Intelligence Platform experience
Education
Bachelor's degree in Cybersecurity or related field
Tools
Responsibilities
- Conduct in-depth investigations of cybersecurity incidents identified through monitoring systems or escalated by L1 analysts.
- Analyze logs from various security devices (Firewall, IDS/IPS, EDR, Email Security, Internet Security, UBA, TIP) to identify suspicious patterns or activities.
- Document incidents and generate reports detailing threat analysis and security improvement recommendations.
- Coordinate with relevant teams to ensure timely and effective response to identified threats.
- Willing to work in shift patterns.
Qualifications
- Bachelor's degree in Cybersecurity, Information Technology, or a related field.
- Minimum 2 years of experience in Security Analyst (L2) role.
- Strong skills in log analysis and incident investigation using security tools such as SIEM, EDR, XDR, NDR, Firewall.
- In-depth knowledge of cyberattack techniques and the MITRE ATT&CK Framework.
- Experience working with Threat Intelligence Platforms (TIP).
- Certifications (one or more preferred): CEH (Certified Ethical Hacker) or OSCP (Offensive Security Certified Professional) / GIAC Security Operations Certified (GSOC) / CHFI (Computer Hacking Forensic Investigator) / or any other certificate related to Security Analyst and Incident Responder.