Job Search and Career Advice Platform

Enable job alerts via email!

SOC Threat Analyst

PT. PELINDUNG TEKNOLOGI UTAMA

Jakarta Utara

On-site

IDR 200.000.000 - 300.000.000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A growing technology firm in Jakarta Utara is seeking a SOC Analyst to monitor, detect, and respond to security incidents. This role involves continuous monitoring of security alerts, investigating incidents, and collaborating with team members. Candidates should have a diploma or degree in Cybersecurity or IT, preferably with SIEM experience. Strong analytical skills and ability to work under pressure are crucial. The position requires working 12-hour shifts and offers a dynamic work environment.

Qualifications

  • A diploma or bachelor's degree in Cybersecurity, Information Technology, or related field is required.
  • Experience with various SIEM platforms is preferred.
  • Strong analytical and critical thinking skills are necessary.

Responsibilities

  • Continuously monitor security alerts from various sources.
  • Investigate and respond to security incidents.
  • Collaborate with team members on complex cases.

Skills

Understanding of networking protocols
Experience with SIEM platforms
Incident investigation and analysis
Good communication skills
Ability to work in a fast-paced environment

Education

Diploma or Bachelor's degree in Cybersecurity or related field

Tools

SIEM tools (e.g., Splunk, ArcSight, QRadar)
Job description

Our Company is growing rapidly, and we are looking for highly motivated individuals to work in a SOC environment leveraging SIEMs and security tools to assist in detecting potential security threats. The SOC analyst role is to monitor, detect and respond to security incidents. The role involves triaging, analyzing alerts, determining the criticality of the incidents, and escalating them accordingly.

Key responsibilities
  • Continuously monitor security alerts from various sources such as firewalls, intrusion detection/prevention systems (IDS/IPS), Security Information and Event Management (SIEM) tools, and other security infrastructure.
  • Respond to and investigate security incidents.
  • Collaborate with senior SOC analyst on complex incidents and provide appropriate recommendation for remediation.
  • Escalate incidents and concerns to higher-tier analysts or specialized security teams when necessary.
  • Conduct detailed analysis of security events, logs, and alerts to determine the severity and root cause of incidents.
  • Provide and maintain detailed records of incidents, actions taken, and outcomes for internal tracking and post-incident analysis.
  • Gather and analyze threat intelligence to stay up to date on emerging cybersecurity risks and vulnerabilities.
  • Collaborate with IT, network, and infrastructure teams to ensure appropriate measures are taken to prevent or mitigate future incidents.
  • Assist in the tuning and optimization of security tools, systems, and processes to improve detection capabilities.
  • Participate in regular team meetings, training sessions, and knowledge-sharing activities to improve team performance and security posture.
Education

Diploma or Bachelor’s degree in Cybersecurity, Information Technology, or related field, or equivalent work experience.

Certifications (preferred but not required)
  • CompTIA Security+
  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)
  • or similar certifications.
Skills
  • Strong understanding of networking protocols and concepts (TCP/IP, DNS, HTTP/S, etc.).
  • Experience with SIEM platforms (e.g., Splunk, ArcSight, QRadar, or similar tools) would be preferable.
  • Ability to investigate and analyze security incidents with attention to detail.
  • Good communication skills for documenting and reporting incidents.
  • Ability to work in a fast-paced, high-pressure environment.
Technical Knowledge
  • Knowledge of common attack vectors, including but not limited to malware, phishing, DDoS, and APTs (Advanced Persistent Threats).
  • Knowledge in various cyber defense methodology and frameworks (i.e., Mitre ATT&CK, etc).
  • Familiarity with operating systems (Windows, Linux) and networking devices (routers, switches, firewalls).
Other skills
  • Critical thinking and problem-solving abilities.
  • Ability to prioritize and manage multiple tasks effectively.
  • Strong teamwork and collaboration skills.
Working hours

The working hours will change as we grow. Currently we are looking for individuals who are able to work on 12 hour shift.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.