Job Search and Career Advice Platform

Enable job alerts via email!

Cybersecurity Incident Response Senior Advisor

Dell

Sepang

On-site

MYR 276,000 - 355,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology firm in Malaysia is seeking a Cybersecurity Incident Response Senior Advisor to handle security incidents and refine response processes. This role requires 3-5 years of experience in cybersecurity, especially in investigations, and a strong understanding of security technologies. The ideal candidate will work globally, perform technical analyses, and be a champion for best security practices. Excellent communication skills in English are necessary for this role.

Qualifications

  • 3-5 years of hands-on experience in systems, network, application, and information security.
  • Ability to conduct cybersecurity investigations and determine root cause.
  • Knowledge of security technologies and platforms including Windows and Linux/Unix.

Responsibilities

  • Manage and prioritize queue assignments for incident response tickets.
  • Perform technical investigations on security incidents.
  • Create After Actions Reports based on lessons learned from incidents.
  • Analyze large data sets and malicious artifacts for trends.
  • Liaison with stakeholders to implement best security practices.

Skills

Cybersecurity investigations
Analytical thinking
Time management
Coordination skills
Communication in English

Tools

SIEM
Packet capture tools
Firewalls/NGFW
EDR
DLP
Scripting languages
Job description
Overview

Cybersecurity Incident Response Senior Advisor -L2 Support. The Dell Security & Resiliency organization manages the security risk across all aspects of Dell’s business. You will have an excellent opportunity to influence the security culture at Dell and further develop your career. Join us as a Cybersecurity Incident Response Analyst, L2 on our Cybersecurity Incident Response team in Cyberjaya, Malaysia to do the best work of your career and make a profound social impact.

What you’ll achieve

As a Cyber Incident Response Analyst L2, this role is responsible for investigating and reporting of security incidents supporting all Dell Business Units. This role requires experience in all phases of Cybersecurity incident response including preparation, analysis, notification, response, recovery, and post-mortem activities. This role interacts with all levels of the organization and is viewed as a subject matter expert on all Incident Response activities.

The focus of the role is primarily responding to security incidents, managing and consistently maturing the security incident response process to meet the needs of Dell, and building the Global Incident Response Team's technical investigative capabilities (process & technology).

Responsibilities
  • Serve as a global escalation point and work with the Incident Response Team members on tickets to manage / prioritize queue assignments
  • Perform technical cyber security investigations on security incidents, root cause analysis, recommend and mitigate the effects caused by an incident
  • Participate in After Actions Reports creation based on Lessons Learned from critical cybersecurity incidents
  • Investigate/analyze large and unstructured data sets, malicious artifacts, and EDR tools to identify trends and anomalies indicative of potential threats
  • Liaison with stakeholders and internal CSIRT teams to serve as a Cyber Security Champion to help implement best security practices and mature the Security Incident Response process to meet the needs of the business.
Qualifications
  • 3-5 years hands-on experience with focus in areas such as systems, network, application, and information security
  • Exceptional ability to conduct cybersecurity investigations, analyze and distill relevant findings and determine root cause
  • Strong knowledge of security and web technologies such as SIEM, full packet capture, Firewall/NGFW, IDS/IPS, EDR, DLP, UEBA, networking protocols, Microsoft Windows and Linux/Unix platforms and tools with related experience in corporate infrastructures
  • Strong technical experience and familiarity of various types and techniques of cyber-attacks, with the incident response and threat hunting lifecycles
  • Excellent analytical thinking, time management and coordination skills and excellent command in English (both written and verbal)
  • Knowledge and experience in: Digital Forensics, reverse malware tools, and scripting languages
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.