Job Search and Career Advice Platform

Enable job alerts via email!

Senior Incident Response Specialist, Cyber Security

Cygnify Pte Ltd

Kuala Lumpur

On-site

MYR 100,000 - 150,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm in Kuala Lumpur is looking for a Senior Analyst – Cyber Security Incident Response to oversee incidents from detection to closure. You'll engage in monitoring, deeply analyze security alerts, and work with various teams to ensure effective incident response. Ideal candidates have strong experience in incident response and familiarity with SIEM tools. This role is pivotal in enhancing cyber resilience and addressing security challenges.

Qualifications

  • Experience in cybersecurity incident response.
  • Strong analytical skills for incident triage and investigation.
  • Familiarity with SIEM platforms like Elastic Stack.

Responsibilities

  • Monitor and analyze cybersecurity incidents through SOC.
  • Conduct incident triage and investigation.
  • Collaborate with internal teams for incident resolution.
Job description
Role Mission

The Senior Analyst – Cyber Security Incident Response is responsible for monitoring, detecting, and analyzing cybersecurity incidents through the Security Operations Centre (SOC) platform. The role supports the end-to-end incident lifecycle — including triage, investigation, containment, and closure — ensuring timely response to security events and maintaining cyber resilience. This role acts as the Level 2 (L2) Incident Responder, bridging SOC analysts and Incident Response management by performing deep technical analysis and coordinating with internal teams for resolution.

Accountabilities
  • Perform end-to-end incident triage and investigation of security alerts escalated from L1 SOC analysts.
  • Ensure timely incident analysis, containment, and escalation aligned with MTTD and MTTR goals.
  • Support the SIEM platform (Elastic Stack) by fine-tuning existing rules and suggesting new detections.
  • Conduct log analysis and correlation across multiple data sources (network, endpoint, and cloud).
  • Create and maintain incident documentation, reports, and lessons learned.
  • Support incident response playbook execution during containment and recovery phases.
  • Collaborate with IT, network, and application teams for incident remediation and root cause analysis.
  • Provide insights for use case improvements and participate in use case validation and testing.
  • Escalate confirmed incidents to CSIRT / Assistant Manager – Incident Response for further action.
  • Participate in post-incident reviews, contributing to process and detection improvements.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.