Enable job alerts via email!

SOC Level 1 Analyst

Nawatech

Tangerang Selatan

On-site

IDR 200.000.000 - 300.000.000

Full time

9 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in cybersecurity is seeking a dedicated Cybersecurity Analyst. Responsibilities include monitoring security events, analyzing alerts, and collaborating with teams for incident management. Candidates should have 1–3 years of experience and familiarity with SIEM tools. The role offers a platform for growth in the dynamic field of cybersecurity, focusing on incident responses and threat detection.

Qualifications

  • 1–3 years of experience in cybersecurity or IT support.
  • Familiarity with SIEM platforms.
  • Basic understanding of TCP/IP, firewalls, IDS/IPS.

Responsibilities

  • Monitor security events using SIEM platforms.
  • Analyze and triage security alerts.
  • Conduct investigations of suspicious activities.

Skills

Log analysis
Incident troubleshooting
Threat hunting

Tools

Microsoft Sentinel
Splunk
Wazuh
Google SecOps

Job description

What Will You Do

  • Monitor security events and alerts using SIEM platforms such as Microsoft Sentinel, Splunk, Wazuh, or Google SecOps.
  • Analyze and triage security alerts based on severity and potential impact.
  • Conduct initial investigations of suspicious activities and potential security incidents.
  • Collaborate with other security teams to escalate and mitigate incidents.
  • Document investigation findings and assist in incident reporting.
  • Support the development and maintenance of SOC playbooks and response procedures.
  • Perform basic threat hunting based on Indicators of Compromise (IoCs).
  • Assist in system patching and hardening based on security monitoring insights.

What Will You Need

  • 1–3 years of experience in cybersecurity or IT support.
  • Familiarity with at least one SIEM platform (Sentinel, Splunk, Wazuh, or Google SecOps).
  • Basic understanding of TCP/IP, firewalls, IDS/IPS, and Windows/Linux systems.
  • Strong log analysis and incident troubleshooting skills.
  • Foundational knowledge of OWASP Top 10 and MITRE ATT&CK framework.

Nice to Have

  • Certifications such as CompTIA Security+, SC-200, or CEH.
  • Experience with tools like Sysmon, Suricata, or Azure Monitor.
  • Basic scripting skills (Python, PowerShell, Bash).
  • Exposure to cloud environments (Azure, AWS, GCP).

SOC Operational Focus

  • Monitoring & Detection: Utilize SIEM to detect anomalies and potential attacks.
  • Incident Response: Manage incidents from detection to resolution.
  • Log Analysis: Analyze logs from firewalls, endpoints, servers, and applications.
  • Threat Intelligence: Leverage threat intel feeds for contextual analysis.
  • Reporting: Prepare daily and weekly security status reports.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.