Enable job alerts via email!

Senior Security Analyst (SOC Level 3)

Ensign Infosecurity

Kuala Lumpur

On-site

MYR 80,000 - 120,000

Full time

8 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Kuala Lumpur is seeking a proactive cybersecurity expert to lead high-severity incident response and mentor team members. The ideal candidate holds a Bachelor’s degree and relevant certifications, with 4-6 years of experience in SOC operations and a strong grasp of detection tools. You will be responsible for developing advanced detection use cases and conducting forensic analysis to protect critical systems.

Qualifications

  • 4–6+ years of experience in SOC operations or incident response.
  • Strongly preferred certifications: GIAC, CISSP, OSCP, or equivalent.
  • Excellent analytical and problem-solving skills.

Responsibilities

  • Lead high-severity incident response and containment activities.
  • Conduct in-depth forensic analysis on endpoints, networks, and logs.
  • Develop detection use cases and correlation rules based on threat intelligence.
  • Perform proactive threat hunting using SIEM and EDR.
  • Mentor L1 and L2 analysts with guidance and training.

Skills

SIEM
EDR
Threat intelligence
Forensic tools
Python
PowerShell
Bash

Education

Bachelor's degree in Cybersecurity, IT, or related field
Job description

Lead high-severity incident response and containment activities, coordinating with stakeholders across IT and business units.

Conduct in-depth forensic analysis on endpoints, networks, and logs to determine the root cause and impact of security incidents.

Develop advanced detection use cases and correlation rules based on threat intelligence and TTPs (MITRE ATT&CK, etc.).

Perform proactive threat hunting using SIEM, EDR, and threat intel feeds to uncover undetected threats.

Review and fine-tune alerts, playbooks, and automation workflows to reduce false positives and improve SOC efficiency.

Mentor L1 and L2 analysts, providing guidance, training, and quality review of investigations.

Serve as a technical escalation point for complex security issues and investigations.

Contribute to incident post-mortems and provide recommendations to improve security posture and processes.

Collaborate with red/purple teams and engineering to simulate attacks and validate defense effectiveness.

Requirements
  • Education & Certification: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field.
  • Strongly preferred certifications: GIAC (GCFA, GCIH, GCIA, GDAT), CISSP, OSCP, or equivalent.
  • Experience in SOC operations, incident response, or threat detection, 4–6+ years.
Technical Skills
  • Deep understanding of security monitoring and detection tools (SIEM, EDR, IDS/IPS, SOAR).
  • Hands‑on experience in forensic tools, log analysis, malware analysis, and packet inspection.
  • Solid grasp of attacker TTPs, threat modeling, and behavior analytics.
  • Familiarity with scripting or automation (Python, PowerShell, Bash).
  • Experience with Windows, Linux, and cloud environments (AWS/Azure security monitoring).
Soft Skills
  • Excellent analytical and problem‑solving skills.
  • Ability to lead investigations and influence cross‑functional teams under pressure.
Preferred Experience
  • Experience working in or leading incident response within a 24x7 SOC or MSSP environment.
  • Prior involvement in threat hunting or red/purple team collaboration is a strong plus.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.