Job Search and Career Advice Platform

Enable job alerts via email!

Security Analyst L2

Logicalis

Kuala Lumpur

On-site

MYR 60,000 - 90,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology company in Kuala Lumpur is seeking a skilled SOC Analyst to provide level two support, handle security incidents, and prepare monthly reports. The ideal candidate will have at least 3 years of experience in SOC environments and a Bachelor’s degree in a relevant field. Proficiency in SIEM platforms and incident response technologies is essential. This role offers opportunities for professional development within a dynamic team and emphasizes collaboration to minimize impacts on customers.

Qualifications

  • Minimum 3 years of experience in SOC and MSS environments.
  • Good understanding of Windows and Linux environments.
  • Knowledge of basic network concepts with exposure to cloud technologies.

Responsibilities

  • Handle security incidents and provide L2 support.
  • Prepare monthly SOC reports for customers.
  • Enable L1 Security Analysts with SOC playbooks.

Skills

Incident analysis using SIEM platforms
Hands-on experience with EDR technologies
Knowledge of shell scripting
Excellent troubleshooting skills

Education

Bachelor’s degree in Computer Science/IT/Information security
Cybersecurity industry certification (CEH or CHFI)

Tools

Microsoft Sentinel
IBM QRadar
Microsoft Defender
CrowdStrike
Cisco firewall
Palo Alto firewall
Checkpoint firewall
Fortinet firewall
Job description

As Architects of Change, Logicalis’ focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.

We strengthen our purpose: to design, support and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.

Accountabilities:
  • Work in a 24x7 shift environment to handle security incidents and provide level two (L2) support during analysis & investigations to identify the root cause.
  • Provide detailed remediation recommendations to customers for the incidents within agreed SLAs and, if required, assist them during remediation implementation.
  • Execute SOC playbooks and knowledge base to minimize the security incident impact, and perform detailed investigation on the infected assets.
  • Escalate critical incidents to 3rd level support team for further analysis & investigations, demonstrating excellent collaboration skills for timely resolution to minimize impact to customers.
  • Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers.
  • Prepare SOC monthly reports, customized based on business requirements, and present them to customers during monthly meetings, highlighting risks and mitigation plans.
  • Enable regional L1 Security Analysts to deliver seamless L1 support by developing SOC playbooks and a sufficient knowledge base.
The Individual and their Experience:
  • Candidate should have at least 3 years of experience working in SOC and MSS environments, with a Bachelor’s degree in Computer Science/IT/Information security.
  • Excellent hands‑on experience in incident analysis using SIEM platforms such as Microsoft Sentinel, IBM QRadar.
  • Hands‑on experience with any Endpoint Protection (EPP) or Endpoint Detection and Response (EDR) technologies; preferred if Microsoft Defender or CrowdStrike.
  • Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
  • Good understanding of Windows, Linux environments and basic Linux commands; proven Unix (Solaris, Linux, BSD) experience.
  • Knowledge of any shell scripting language, and ability to automate mundane operational tasks.
  • Candidate should have at least one cybersecurity industry certification such as CEH or CHFI.
  • Good understanding of basic network concepts and advantage if exposure to cloud technologies.
  • Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL standards.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.