Enable job alerts via email!

Security Engineer / SOC Analyst

ABPGroup Pte Ltd

Kuala Lumpur

On-site

MYR 40,000 - 60,000

Full time

7 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Kuala Lumpur is seeking a motivated Cybersecurity Analyst or Associate. The role involves monitoring security events, triaging incidents, and collaborating with senior analysts. Candidates should have a relevant degree and be aware of cybersecurity concepts. This position operates on a 12-hour shift model, including nights. Opportunities for mentorship and growth are provided.

Qualifications

  • 0.5 to 8 years of experience in related fields welcome.
  • Knowledge of network protocols and security alerts is a plus.
  • Must be able to work shifts including overnight hours.

Responsibilities

  • Monitor security events and alerts from various platforms.
  • Perform initial investigations of suspicious activities.
  • Document incident details and maintain logs.

Skills

Monitoring security events
Initial triage and investigation
Documentation of incidents
Knowledge of cybersecurity concepts
Ability to follow workflows

Education

Degree in Cybersecurity, Information Security, Computer Science
Job description

Join a real-world cybersecurity operations team with access to industry-leading tools and processes.

Gain hands‑on experience in cyber threat detection, triage, and investigation.

Be immersed in a supportive environment with mentorship.

The Role

We are looking for a motivated and detail‑oriented Cybersecurity Analyst or Associate to join our security operations team. Applicants with 0.5 to 8 years of experience are welcomed to apply.

In this role, you will develop your investigation skills, understand real‑world threats, and contribute to the organisation's cyber defence in collaboration with team members on detection improvements and playbook development.

If you are passionate about cybersecurity, eager to learn, and ready to grow in a fast‑paced operational environment, apply today with your updated resume indicating your notice period / earliest availability, current and expected salary.

Shift Work: 12‑hour rotational shift model

What you'll do
  • Monitor security events and alerts from SIEM, EDR, and other security platforms.
  • Perform initial triage and investigation of suspicious activities across networks, endpoints, and cloud environments.
  • Escalate validated incidents to senior analysts for deeper investigation.
  • Document incident details and investigation steps in case management systems for incident reporting.
  • Maintain accurate logs and alert configurations.
  • Work in a 12‑hour shift rotation model which includes between midnight and dawn hours after the initial office working hours On‑Job‑Training (OJT) model.
About You
  • Degree qualified & above in Cybersecurity, Information Security, Computer Science, or related disciplines.
  • Awareness of cybersecurity concepts, network protocols, security alerts, and cyber threat landscapes.
  • Ability to follow structured workflows and escalating appropriately.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.