Job Search and Career Advice Platform

Enable job alerts via email!

SOC L2 Analyst

Tech Staffing

Kuala Lumpur

On-site

MYR 80,000 - 120,000

Full time

4 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A technology recruitment firm is seeking a candidate for a role in Kuala Lumpur focusing on developing incident response workflows, performing security monitoring, and providing support to analysts. Candidates should have a minimum of 4 years experience in SIEM and a strong understanding of cyber threat analysis. The role requires expertise in tools like Azure Sentinel, QRadar, and Splunk, as well as skills in email security and digital forensics.

Qualifications

  • Minimum 4 years experience in SIEM and/or response to information security threats or incidents.
  • Deep understanding of email security, digital media forensics, and cyber intelligence.

Responsibilities

  • Develop incident response workflow that can be automated.
  • Perform security monitoring gap analysis and build corresponding process.
  • Provide support to the Security Operations Center's L1 Analysts during incident response.
  • Perform analysis of log files from various sources to identify threats.
  • Monitor and analyze security events from multiple sources.

Skills

Experience in SIEM
Azure Sentinel
QRadar
Splunk
Email security
Digital media forensics
Incident response
Vulnerability assessment
Penetration testing
Cyber intelligence analysis
Web Application Firewall (WAF)
Job description
Responsibilities
  • Develop incident response workflow that can be automated.
  • Perform security monitoring gap analysis and build corresponding process/framework for continuous evaluation as well as increase detection coverage.
  • Provide support to the Security Operations Center's L1 Analysts during incident response, event monitoring and threat hunting activities.
  • Cyber threat analysis support, research, and recommending appropriate remediation and mitigation.
  • Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system logs) to identify possible threats to network security.
  • Perform real-time monitoring and analysis of security events from multiple sources.
  • Triage security events to determine priority and severity.
  • Proactively review customers' environments searching for suspicious behavior across network, host and logs data.
  • Assist in the development of analytic signatures to identify suspicious and malicious behavior.
Requirements
  • Minimum 4 years experience in SIEM and/or response to information security threats or incidents.
  • Experience in Azure Sentinel, QRadar or Splunk.
  • Deep understanding of following areas: Email security (including document analysis), digital media forensics, monitoring and detection, incident response, vulnerability assessment, penetration testing, cyber intelligence analysis, and Web Application Firewall (WAF).
  • Permanent headcount, role is based in Kuala Lumpur (KL).
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.