Enable job alerts via email!

L1 Cyber Security SOC Analyst

YY SMART TECH PTE. LTD.

Singapore

On-site

SGD 40,000 - 70,000

Full time

9 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in cybersecurity seeks an L1 Security Operations Center Analyst to monitor and respond to security incidents. This role involves using advanced SIEM tools to protect digital assets through real-time threat detection and incident response strategies. Candidates should possess a relevant degree and hands-on experience in security monitoring, while strong analytical and communication skills are essential for success in this fast-paced environment.

Qualifications

  • More than one year in security monitoring or 2+ years in IT support/networking.
  • Hands-on experience with SIEM/XDR platforms like Splunk.
  • Technical certifications like CompTIA Security+, CySA+ are preferred.

Responsibilities

  • Monitor security alerts using SIEM/XDR tools across networks and endpoints.
  • Perform initial investigation and escalate confirmed incidents.
  • Document incidents in ticketing systems and generate daily reports.

Skills

Log analysis
Threat detection
Incident response
Analytical thinking
Attention to detail
Communication

Education

Diploma/Bachelor’s in Cybersecurity
IT or Computer Science

Tools

SIEM/XDR platforms
Security tools (EDR, firewalls, IDS/IPS)
Jira
ServiceNow

Job description

Job Overview

We are seeking for a vigilant L1 Security Operations Center (SOC) Analyst to join our 24/7 cybersecurity team.

Operating on 12-hour rotational shifts, you will perform real-time monitoring, threat detection, and initial incident response using SIEM/XDR platforms.

The role requires foundational knowledge of network security, log analysis, and attack vectors to defend against threats while escalating complex incidents to senior analysts.

This position is critical for maintaining our security posture across global digital assets.

Duties and Responsibilities

Continuous Monitoring & Detection:

  1. Monitor SIEM/XDR tools (e.g., Splunk, Sentinel, QRadar) for security alerts across networks, endpoints, and cloud environments.
  2. Analyze logs from firewalls, IDS/IPS, EDR, and other security tools to identify malicious activity.

Incident Triage & Response:

  1. Perform initial investigation and classification of security events (malware, phishing, DDoS).
  2. Execute predefined playbooks for containment (e.g., isolate hosts, block IPs).
  3. Escalate confirmed incidents to L2/L3 analysts with detailed documentation.

Threat Intelligence Utilization:

  1. Apply threat intelligence feeds (e.g., MITRE ATT&CK) to contextualize alerts.
  2. Monitor dark web/IoC sources for emerging threats relevant to the organization.

Reporting & Documentation:

  1. Document incidents in ticketing systems (e.g., Jira, ServiceNow) with timelines, actions taken, and evidence.
  2. Generate daily shift reports highlighting threat trends, false positives, and system health.

Tool Maintenance & Optimization:

  1. Tune SIEM rules to reduce false positives and improve detection accuracy.
  2. Validate security tool configurations (e.g., firewall policies, EDR rules).

Requirements

Education:

  • Diploma/Bachelor’s in Cybersecurity, IT, Computer Science, or related field.

Experience & Skills:

  • More than one year in security monitoring or more than 2 years in IT support/networking with security exposure.

Hands-on experience with:

  1. SIEM/XDR platforms (Splunk, Azure Sentinel, etc.)
  2. Security tools (EDR, firewalls, IDS/IPS, email security)
  3. OS security (Windows/Linux log analysis)

Understanding of:

  1. Networking (TCP/IP, DNS, VPN, HTTP/S)
  2. Common attack vectors (phishing, malware, brute force)
  3. Cloud security fundamentals (AWS/Azure/GCP)

Technical Certifications (Preferred):

  1. CompTIA Security+, CySA+, CEH, or equivalent entry-level security certs
  2. Vendor certifications (e.g., Splunk Core User, Microsoft SC-200)

Shift Requirements:

  1. Willingness to work 12-hour rotational shifts (day/night), including weekends/public holidays.
  2. Ability to maintain focus during high-pressure overnight shifts.

Soft Skills:

  1. Strong analytical thinking and attention to detail.
  2. Effective communication for cross-team escalation.
  3. Adaptability in fast-paced threat environments.
  4. Basic knowledge of ITIL/incident management processes.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.