Enable job alerts via email!

Security Operations L1

YODA TECH PTE. LTD.

Singapore

On-site

SGD 40,000 - 60,000

Full time

29 days ago

Job summary

A cybersecurity firm in Singapore seeks a proactive SOC L1 Engineer to monitor and respond to security alerts and incidents. The ideal candidate will have a Bachelor’s degree in Computer Science or a related field, along with 1–2 years of experience in IT security or SOC operations. This full-time role offers opportunities for growth within the cybersecurity domain and requires analytical skills and attention to detail.

Benefits

Health insurance
Training and security certifications

Qualifications

  • 1–2 years of experience in IT Security, Network Monitoring, or SOC operations.
  • Basic understanding of cybersecurity concepts like malware and phishing.
  • Ability to work in a 24x7 rotational shift environment.

Responsibilities

  • Monitor and analyze security alerts from various security tools.
  • Perform initial triage of incidents and classify severity.
  • Support incident response activities under senior SOC analysts.

Skills

Analytical skills
Attention to detail
Strong communication skills

Education

Bachelor’s degree in Computer Science or Information Security

Tools

SIEM platforms (e.g., Splunk)
Network Monitoring tools
Job description
About the Role

We are seeking a proactive and detail-oriented SOC (Security Operations Center) L1 Engineer to join our cybersecurity team. As the first line of defense, you will be responsible for monitoring, detecting, and responding to security alerts and incidents in real time. This role requires strong analytical skills, attention to detail, and a passion for cybersecurity operations.

Key Responsibilities
  • Monitor and analyze security alerts from SIEM, IDS/IPS, firewalls, endpoint protection, and other security tools.
  • Perform initial triage of incidents, classify severity, and escalate as needed to L2/L3 SOC teams.
  • Document incidents, actions taken, and maintain accurate security logs.
  • Support incident response activities under the guidance of senior SOC analysts.
  • Conduct basic threat analysis to identify false positives and genuine threats.
  • Ensure adherence to SOC processes, runbooks, and escalation workflows.
  • Assist in maintaining shift reports and knowledge base documentation.
  • Stay updated on emerging cyber threats, attack vectors, and vulnerabilities.
Required Skills & Qualifications
  • Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
  • 1–2 years of experience in IT Security, Network Monitoring, or SOC operations.
  • Basic understanding of cybersecurity concepts (malware, phishing, DDoS, vulnerabilities, exploits).
  • Familiarity with SIEM platforms (e.g., Splunk, QRadar, ArcSight, Sentinel, etc.).
  • Knowledge of TCP/IP, DNS, HTTP, VPN, and firewall concepts.
  • Strong analytical, problem-solving, and communication skills.
  • Ability to work in a 24x7 rotational shift environment.
Preferred Qualifications (Good to Have)
  • Security certifications such as CompTIA Security+, CEH, CCNA Security, or Splunk Fundamentals.
  • Exposure to incident response, log analysis, and malware analysis.
  • Hands-on lab/project experience in cybersecurity monitoring tools.
What We Offer
  • Opportunity to grow within the cybersecurity domain and transition to L2/L3 roles.
  • Access to continuous training and security certifications.
  • Work in a dynamic, high-tech environment with leading-edge tools and processes.

Job Type: Full-time

Benefits:

  • Health insurance

Experience:

  • SOC (Security Operations Center): 1 year (Required)
  • SIEM: 1 year (Required)

Work Location: In person

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.