Tangerang Selatan
On-site
IDR 200.000.000 - 300.000.000
Full time
9 days ago
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
Job summary
A leading company in cybersecurity is seeking a dedicated Cybersecurity Analyst. Responsibilities include monitoring security events, analyzing alerts, and collaborating with teams for incident management. Candidates should have 1–3 years of experience and familiarity with SIEM tools. The role offers a platform for growth in the dynamic field of cybersecurity, focusing on incident responses and threat detection.
Qualifications
- 1–3 years of experience in cybersecurity or IT support.
- Familiarity with SIEM platforms.
- Basic understanding of TCP/IP, firewalls, IDS/IPS.
Responsibilities
- Monitor security events using SIEM platforms.
- Analyze and triage security alerts.
- Conduct investigations of suspicious activities.
Skills
Log analysis
Incident troubleshooting
Threat hunting
Tools
Microsoft Sentinel
Splunk
Wazuh
Google SecOps
What Will You Do
- Monitor security events and alerts using SIEM platforms such as Microsoft Sentinel, Splunk, Wazuh, or Google SecOps.
- Analyze and triage security alerts based on severity and potential impact.
- Conduct initial investigations of suspicious activities and potential security incidents.
- Collaborate with other security teams to escalate and mitigate incidents.
- Document investigation findings and assist in incident reporting.
- Support the development and maintenance of SOC playbooks and response procedures.
- Perform basic threat hunting based on Indicators of Compromise (IoCs).
- Assist in system patching and hardening based on security monitoring insights.
What Will You Need
- 1–3 years of experience in cybersecurity or IT support.
- Familiarity with at least one SIEM platform (Sentinel, Splunk, Wazuh, or Google SecOps).
- Basic understanding of TCP/IP, firewalls, IDS/IPS, and Windows/Linux systems.
- Strong log analysis and incident troubleshooting skills.
- Foundational knowledge of OWASP Top 10 and MITRE ATT&CK framework.
Nice to Have
- Certifications such as CompTIA Security+, SC-200, or CEH.
- Experience with tools like Sysmon, Suricata, or Azure Monitor.
- Basic scripting skills (Python, PowerShell, Bash).
- Exposure to cloud environments (Azure, AWS, GCP).
SOC Operational Focus
- Monitoring & Detection: Utilize SIEM to detect anomalies and potential attacks.
- Incident Response: Manage incidents from detection to resolution.
- Log Analysis: Analyze logs from firewalls, endpoints, servers, and applications.
- Threat Intelligence: Leverage threat intel feeds for contextual analysis.
- Reporting: Prepare daily and weekly security status reports.