Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security (SOC)

eTeam

Kuala Lumpur

On-site

MYR 150,000 - 200,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm is seeking a candidate with expertise in Cyber Security Incident Lifecycle and SOC operations. Ideal candidates should have hands-on experience in security monitoring, detection, and incident response, alongside knowledge of common log management solutions like LogRhythm and Elastic ELK/SIEM. Relevant certifications in the field are preferred, and a strong educational background is essential. This role offers an opportunity to enhance your skills in a dynamic environment.

Qualifications

  • Knowledge about the Cyber Security Incident Lifecycle / Process and corresponding standards.
  • Understanding of common triage activities and initial log analysis.
  • Direct experience in security monitoring and incident response.

Skills

Knowledge about the Cyber Security Incident Lifecycle
Understanding of cyber-attack lifecycle
Experience in SOC/CERT work
Basic understanding of threat intelligence lifecycle
Hands-on attitude with scripting

Education

Strong educational background in network protocols
Certifications (GCIA, GCIH, GCFA, GREM, GCTI)

Tools

LogRhythm
Elastic ELK/SIEM
Job description
Qualifications
  • Knowledge about the (Cyber) Security Incident Lifecycle / Process and corresponding standards
  • Understanding of cyber-attack lifecycle (kill-chain etc.) and how to counter each phase
  • Understanding of common log management solutions and SIEM platforms, .In particular LogRhythm and Elastic ELK/SIEM.
  • Understanding of common triage activities and initial log (network and host) analysis
  • Basic understanding of the threat intelligence lifecycle and how IoCs are used to detect threats.
  • Direct experience in the line of SOC/ CDC/ CERT work (e.g., security monitoring and detection, incident response, network event analysis, threat analysis, threat intelligence or malware analysis)
  • Ideally, hold one of the following certifications: GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Reverse Engineering Malware (GREM), GIAC Cyber Threat Intelligence (GCTI) or other comparable certification
  • Strong educational background in network protocols, operating systems and application architectures.
  • Hands-on attitude, including automation and tooling of regular tasks using scripting languages
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.