Job Search and Career Advice Platform

Enable job alerts via email!

SOC L2 Lead

TechLab Security

Selangor

On-site

MYR 100,000 - 150,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A dynamic cybersecurity firm in Malaysia is seeking an experienced SOC Lead Analyst. You will oversee incident management, enhance detection capabilities, and support a high-performing team. The ideal candidate has at least 5 years in a SOC, with strong knowledge of SIEM tools and excellent analytical skills. Join a friendly work environment that fosters career growth and teamwork. The company offers various benefits, including a medical card and team-building activities.

Benefits

Medical Card
Birthday Leave
Team Building
Sport Activities

Qualifications

  • Minimum 5 years of experience in a SOC environment.
  • At least 1-2 years in a lead or senior analyst role.
  • Capable of scripting or automation (Python, PowerShell, or similar) is a plus.

Responsibilities

  • Lead incident handling and escalation management.
  • Refine SIEM detection rules and collaborate with teams.
  • Support SOC Manager in monitoring operations.
  • Use tools like Sentinel and QRadar for threat hunting.
  • Prepare SOC performance reports and contribute to operational maturity.

Skills

SIEM knowledge
Analytical skills
Problem-solving
Communication
Leadership

Education

Bachelor's degree in Cybersecurity, Computer Science, or a related field

Tools

Microsoft Sentinel
QRadar
Splunk
CrowdStrike
Job description

Are you a motivated problem-solver who loves learning new skills? Join our friendly team and grow your career with real hands‑on experience.

Key Responsibilities:

Incident Handling & Escalation Management

  • Lead and perform triage, containment, and response for complex security incidents.

  • Review and validate escalated events from SOC Level 1 analysts.

  • Provide guidance and mentoring to L1/L2 team members during incident response.

  • Perform forensic analysis, log correlation, and root cause investigation.

Detection Engineering & Optimization

  • Refine and tune SIEM detection rules, use cases, and correlation logic.

  • Collaborate with Threat Intelligence and Vulnerability Management teams to enrich detection logic.

  • Work with security engineers to integrate new data sources into SIEM/XDR.

Team Leadership & Collaboration

  • Support the SOC Manager in monitoring day‑to‑day operations and shift performance.

  • Deliver knowledge transfer and continuous training for SOC analysts.

  • Maintain and improve SOC documentation, SOPs, and incident response playbooks.

Tools, Automation & Threat Hunting

  • Use and oversee tools such as Microsoft Sentinel, QRadar, Splunk, CrowdStrike, etc.

  • Lead proactive threat hunting exercises and coordinate post-incident reviews.

  • Identify and implement automation opportunities in triage and incident workflows.

Reporting & Continuous Improvement

  • Prepare regular SOC performance reports, incident metrics, and SLA compliance dashboards.

  • Contribute to the strategic growth of the SOC and its operational maturity.

Required Qualifications:
Education & Experience
  • Bachelor's degree in Cybersecurity, Computer Science, or a related field.

  • Minimum 5 years of experience in a SOC environment, with at least 1–2 years in a lead or senior analyst role.

Technical Skills
  • Strong knowledge of SIEMs (Sentinel, QRadar, etc.), EDR/XDR, SOAR platforms, and threat intel tools.

  • Familiarity with frameworks such as MITRE ATT&CK, NIST, and the Cyber Kill Chain.

  • Hands‑on experience with IDS/IPS, packet analysis, log aggregation, and malware triage.

  • Capable of scripting or automation (Python, PowerShell, or similar) is a plus.

Soft Skills
  • Excellent analytical and problem‑solving skills.

  • Strong communication and leadership qualities.

  • Ability to operate effectively in a high‑pressure and 24x7 environment.

Preferred Certifications
  • Required: CompTIA CySA+, CEH, or equivalent

  • Preferred: Certifications in SIEM platforms or SOC operations (e.g., Microsoft Sentinel, QRadar, Google Chronical SIEM)

Why join us:

Career growth opportunities

Friendly work environment

Benefits:

Medical Card, Birthday Leave, Team Building, Sport Activities and many more!

We’re a growing team that values teamwork, learning, and respect. If you’re eager to improve and try new things, we’d love to meet you!

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.