Enable job alerts via email!

Security Analyst L2

Logicalis Group (DE)

Kuala Lumpur

On-site

MYR 60,000 - 80,000

Full time

30+ days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A dynamic IT solutions provider in Kuala Lumpur is seeking a Security Analyst L2. The role requires a candidate with at least 3 years of experience in Security Operations Center (SOC) environments. In this position, you will handle security incidents, provide second-level support, and facilitate investigations. Proficiency in incident analysis using SIEM platforms like Microsoft Sentinel and knowledge of Endpoint Protection technologies are essential. The position offers opportunities for impactful work in digital transformation.

Qualifications

  • Minimum 3 years of SOC and MSS experience required.
  • Hands-on experience with SIEM platforms necessary.
  • Cybersecurity certification such as CEH or CHFI preferred.

Responsibilities

  • Handle security incidents and provide L2 support.
  • Execute SOC playbooks and conduct investigations.
  • Prepare monthly security reports for customers.

Skills

Incident analysis
SIEM platforms
Endpoint Protection technologies
Firewall technologies
Networking concepts
Shell scripting

Education

Bachelor’s degree in Computer Science/IT/Information security

Tools

Microsoft Sentinel
IBM QRadar
Microsoft Defender
CrowdStrike
Job description
Security Analyst L2 in Kuala Lumpur at Logicalis

As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.

We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.

Accountabilities:

  • Work in 24x7 shift environment to handle security incidents and provide level two (L2) support during analysis & investigations to identify the root cause.
  • Provide detailed remediation recommendation to customers for the incidents within agreed SLAs, and if required assist them during remediation implementation.
  • Execute SOC playbooks, knowledge base to minimize the security incident impact and perform detailed investigation on the infected assets.
  • Escalate critical incidents to 3rd level support team, for further analysis & investigations, and demonstrate excellent collaboration skills for timely resolution to minimize impact to customers.
  • Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers.
  • Prepare SOC monthly reports, which includes customization based on business requirements and present them to customers during monthly meetings, highlighting risks and mitigation plans.
  • Enable regional L1 Security Analysts to deliver seamless L1 support by developing SOC playbooks, relevant and sufficient knowledge base.

The Individual and their Experience:

  • Candidate should have at least 3 years of experience working in SOC and MSS environments, with a Bachelor’s degree in Computer Science/IT/Information security.
  • Excellent hands-on experience on incident analysis using SIEM platforms such as Microsoft Sentinel, IBM QRadar.
  • Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if Microsoft Defender, CrowdStrike.
  • Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
  • Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with a proven Unix (Solaris, Linux, BSD) experience.
  • Knowledge on any shell scripting language, and to apply them to automate mundane operations tasks.
  • Candidate should have at least one cybersecurity industry certification such as CEH, CHFI.
  • Good understanding of basic network concepts and advantage if exposure to cloud technologies.
  • Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL standards

If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.