Enable job alerts via email!

L1 Cyber Security SOC Analyst

Borr Drilling

Singapore

On-site

SGD 50,000 - 70,000

Full time

9 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in the cybersecurity sector is looking for an L1 Security Operations Center Analyst to join their 24/7 team in Singapore. In this role, you will conduct real-time monitoring and threat detection, respond to incidents, and document findings. Ideal candidates will have a foundational knowledge in network security and cybersecurity protocols, willing to work 12-hour shifts, and have strong analytical skills.

Qualifications

  • More than one year in security monitoring or more than 2 years in IT support/networking with security exposure.
  • Hands-on experience with SIEM/XDR platforms.
  • Understanding of networking protocols and cloud security fundamentals.

Responsibilities

  • Monitor SIEM/XDR tools for security alerts across networks, endpoints, and cloud environments.
  • Perform initial investigation and classification of security events.
  • Document incidents in ticketing systems with timelines and actions taken.

Skills

log analysis
threat detection
incident response
network security
analytical thinking
attention to detail
effective communication

Education

Diploma/Bachelor's in Cybersecurity
Computer Science
IT

Tools

SIEM
XDR
Splunk
Azure Sentinel
Jira
ServiceNow
EDR

Job description

Job Overview

We are seeking for a vigilant L1 Security Operations Center (SOC) Analyst to join our 24/7 cybersecurity team.

Operating on 12-hour rotational shifts, you will perform real-time monitoring, threat detection, and initial incident response using SIEM/XDR platforms.

The role requires foundational knowledge of network security, log analysis, and attack vectors to defend against threats while escalating complex incidents to senior analysts.

This position is critical for maintaining our security posture across global digital assets.


Duties and Responsibilities

Continuous Monitoring & Detection:

  • Monitor SIEM/XDR tools (e.g., Splunk, Sentinel, QRadar) for security alerts across networks, endpoints, and cloud environments.
  • Analyze logs from firewalls, IDS/IPS, EDR, and other security tools to identify malicious activity.

Incident Triage & Response:

  • Perform initial investigation and classification of security events (malware, phishing, DDoS).
  • Execute predefined playbooks for containment (e.g., isolate hosts, block IPs).
  • Escalate confirmed incidents to L2/L3 analysts with detailed documentation.

Threat Intelligence Utilization:

  • Apply threat intelligence feeds (e.g., MITRE ATT&CK) to contextualize alerts.
  • Monitor dark web/IoC sources for emerging threats relevant to the organization.

Reporting & Documentation:

  • Document incidents in ticketing systems (e.g., Jira, ServiceNow) with timelines, actions taken, and evidence.
  • Generate daily shift reports highlighting threat trends, false positives, and system health.

Tool Maintenance & Optimization:

  • Tune SIEM rules to reduce false positives and improve detection accuracy.
Validate security tool configurations (e.g., firewall policies, EDR rules).

Requirements

Education:

  • Diploma/Bachelor’s in Cybersecurity, IT, Computer Science, or related field.

Experience & Skills:

  • More than one year in security monitoring or more than 2 years in IT support/networking with security exposure.

Hands-on experience with:

  • SIEM/XDR platforms (Splunk, Azure Sentinel, etc.)
  • Security tools (EDR, firewalls, IDS/IPS, email security)
  • OS security (Windows/Linux log analysis)

Understanding of:

  • Networking (TCP/IP, DNS, VPN, HTTP/S)
  • Common attack vectors (phishing, malware, brute force)
  • Cloud security fundamentals (AWS/Azure/GCP)

Technical Certifications (Preferred):

  • CompTIA Security+, CySA+, CEH, or equivalent entry-level security certs
  • Vendor certifications (e.g., Splunk Core User, Microsoft SC-200)

Shift Requirements:

  • Willingness to work 12-hour rotational shifts (day/night), including weekends/public holidays.
  • Ability to maintain focus during high-pressure overnight shifts.

Soft Skills:

  • Strong analytical thinking and attention to detail.
  • Effective communication for cross-team escalation.
  • Adaptability in fast-paced threat environments.
  • Basic knowledge of ITIL/incident management processes.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.