Job Search and Career Advice Platform

Enable job alerts via email!

SOC L2 Analyst

TechLab Security

Selangor

Hybrid

MYR 50,000 - 70,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm located in Malaysia is seeking a motivated individual for a role focused on Security Operations and Incident Response. Ideal candidates will have a background in cybersecurity and will actively monitor and analyze security incidents to mitigate risks. Responsibilities include collaboration with various teams to enhance cyber defenses and continuous improvement of security strategies. The role offers growth opportunities in a friendly and supportive work environment.

Benefits

Medical Card
Birthday Leave
Team Building
Sport Activities

Qualifications

  • 1-2 years of experience in cybersecurity operations and incident response.
  • Knowledge of CTI frameworks like MITRE ATT&CK and Kill Chain.
  • Understanding of incident response processes and methodologies.

Responsibilities

  • Monitor SIEM alerts for suspicious activity.
  • Analyze escalated incidents to determine severity.
  • Assist in developing security use cases and detection rules.

Skills

Analytical skills
Problem-solving abilities
Effective communication
Collaboration

Education

Bachelor’s degree in Cybersecurity, Computer Science, or related field

Tools

Sentinel
QRadar
ThreatConnect
Job description

Are you a motivated problem-solver who loves learning new skills? Join our friendly team and grow your career with real hands-on experience.

Key Responsibilities
  • Security Operations and Incident Response
    • Monitor SIEM alerts and logs to identify suspicious activity and potential security incidents.
    • Analyze incidents escalated by SOC Level 1 analysts and determine severity and next steps.
    • Respond to security incidents, including malware infections, unauthorized access attempts, and data breaches.
    • Conduct root cause analysis and implement measures to prevent recurrence.
    • Perform proactive threat hunting to detect undetected threats within the environment.
    • Document and escalate incidents as necessary to SOC Level 3 or management teams.
  • Collaboration and Support
    • Work with SOC, Incident Response, and Vulnerability Management teams to provide contextual threat insights.
    • Assist in developing security use cases and refining detection rules in SIEM platforms.
    • Generate and present reports for IT administrators, business managers, and security leaders.
    • Create and maintain documentation for knowledge transfer within the team.
  • Automation and Optimization
    • Utilize CTI tools (e.g., SOCRadar, ThreatConnect, Recorded Future) and SIEM platforms (e.g., Sentinel, QRadar).
    • Explore automation opportunities in incident triage and intelligence gathering processes.
    • Build and maintain incident response automation workflows to streamline operations.
  • Audit, Evaluation, and Continuous Improvement
    • Conduct regular security assessments and audits to identify vulnerabilities.
    • Perform monthly and quarterly reviews of security use cases, incidents, and team performance.
    • Track and report on SOC performance against SLAs and incident quality metrics.
    • Contribute to the continuous improvement of SOC services and security strategies.
  • Availability & Proactive Incident Support
    • Available beyond regular office hours during high-priority incidents or critical escalations.
    • Willing to work in rotation shifts.
    • Proactively contributes to tasks beyond assigned responsibilities when needed to ensure team success and incident resolution.
Required Qualifications
  • Educational Background
    • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field.
    • Equivalent professional experience may be considered in place of formal education.
  • Technical Proficiency
    • Experience with SIEM platforms (e.g., Sentinel, QRadar) and endpoint security tools (e.g., XDR, EDR).
    • Knowledge of CTI frameworks (MITRE ATT&CK, Diamond Model, Kill Chain) and tools (e.g., ThreatConnect, Recorded Future, GroubIB, Cyble Vision).
    • Familiarity with IDS/IPS, sandboxing, and network traffic analysis.
    • Basic understanding of incident response processes and methodologies.
  • Soft Skills
    • Strong analytical and problem-solving abilities.
    • Effective communication skills for both technical and non-technical audiences.
    • Ability to work collaboratively and independently in a fast-paced environment.
    • Proactive mindset with a strong desire to learn and grow.
  • Certifications (Preferred)
    • CompTIA Cybersecurity Analyst (CySA+), Certified Ethical Hacker (CEHv2), or similar.
    • Certifications in SIEM platforms or SOC operations (e.g., Microsoft Sentinel, QRadar, Google Chronicle SIEM).
Why join us
  • Career growth opportunities
  • Friendly work environment
Benefits
  • Medical Card
  • Birthday Leave
  • Team Building
  • Sport Activities
  • Many more!

We’re a growing team that values teamwork, learning, and respect. If you’re eager to improve and try new things, we’d love to meet you!

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.