Job Search and Career Advice Platform

Enable job alerts via email!

Senior SOC Analyst

ST ENGINEERING INFO-SECURITY PTE. LTD

Singapore

On-site

SGD 50,000 - 75,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Singapore is looking for a Cyber SOC Security Analyst to be the first line of defense in their Security Operations Center. The role involves continuous security monitoring, incident analysis, and detailed documentation of security alerts. Candidates should have prior experience in a SOC or security operations environment, possess strong analytical skills, and be able to articulate investigations clearly. The position requires willingness to work in a 24/7 rotating shift environment.

Qualifications

  • Minimum 1–2 years of experience in a SOC, MSSP, or security operations environment.
  • Strong ability to document investigations clearly and logically.
  • Demonstrated analytical thinking to explain relevance of events.
  • Familiarity with security technologies such as SIEMs, IDS/IPS, and firewalls.
  • Comfortable handling multiple alerts in a fast-paced environment.
  • Willingness to work rotating shifts.

Responsibilities

  • Perform continuous monitoring of logs and alerts across SIEM platforms.
  • Conduct structured triage and investigation of security alerts.
  • Produce clear incident assessments within incident tickets.
  • Escalate incidents to Senior Cyber Security Analyst with technical context.
  • Work closely with SOC team for effective incident handling.
Job description
Job Summary

The Cyber SOC Security Analyst serves as the first line of analytical defense in a Managed Security Services Provider (MSSP) environment.

This role focuses on continuous monitoring, structured investigation, and high-quality documentation of security alerts and incidents.

As a Senior SOC Analyst, you are expected to think analytically, form clear assessments, and provide meaningful context during escalation not merely route alerts. The role requires prior SOC or security operations experience and a strong ability to articulate findings clearly in written form.

Key Responsibilities
1. Security Monitoring & Detection
  • Perform continuous monitoring of logs, alerts, link utilization, and system availability across multiple SIEM platforms and security tools.

  • Identify potential security incidents using predefined detection logic, correlation rules, and threat indicators.

  • Validate alerts for relevance and accuracy before proceeding with investigation.

2. Incident Analysis & Triage
  • Conduct structured triage and investigation of security alerts to determine:

    • Nature of the activity

    • Potential impact

    • Urgency and escalation requirement

  • Perform contextual checks (e.g. asset relevance, timing, recurrence, known behaviour patterns).

  • Clearly differentiate between false positives, informational events, and actionable incidents.

3. Documentation & Assessment (Core Expectation)
  • Produce clear, structured, and defensible incident assessments within incident tickets.

  • Documentation must explain:

    • What happened

    • What was observed

    • What checks were performed

    • Why escalation is or is not required

  • Avoid generic or copy-pasted content; each assessment must reflect the current investigation and context.

  • Maintain accurate timelines, evidence references, and analyst reasoning to support downstream analysis.

4. Escalation & Communication
  • Escalate incidents to Senior Cyber Security Analyst with sufficient technical and analytical context, enabling efficient handover.

  • Use standard escalation templates as a base, but customise content based on findings, rather than reusing past emails.

  • Handle customer calls and incident notifications professionally, calmly, and accurately.

5. Collaboration & Continuous Improvement
  • Work closely with Senior Cyber Security Analyst, SOC Leads, and SOC Managers to support effective incident handling.

  • Provide feedback on alert quality, false positives, and investigation gaps to support detection improvement.

  • Participate in reviews and discussions to improve analyst workflows and investigation quality.

Role Boundaries (Important)
  • Cyber security analysts are responsible for escalating, and assisting to facilitate remediation or system configuration changes.

  • All actions must follow defined SOC playbooks, escalation paths, and approval processes.

Requirements
Mandatory
  • Prior experience in a SOC, MSSP, or security operations environment (minimum 1–2 years preferred).

  • Strong ability to document investigations clearly and logically.

  • Demonstrated analytical thinking — able to explain why something matters, not just what triggered.

  • Familiarity with security technologies such as SIEMs, IDS/IPS, firewalls, endpoint protection, and antivirus tools.

  • Comfortable handling multiple alerts and tasks in a fast-paced 24/7 SOC environment.

  • Willingness to work rotating shifts.

Preferred
  • Experience working across multiple customer environments or SIEM platforms.

  • Exposure to MSSP-style operations, ticketing systems, and customer communications.

  • Ability to challenge unclear alerts and seek clarification instead of blindly escalating.

Personal Attributes
  • Detail-oriented and disciplined in documentation.

  • Calm and methodical under pressure.

  • Collaborative and open to feedback.

  • Curious mindset with a commitment to continuous learning.

Location
  • Ang Mo Kio

  • 24/7 rotating shift environment

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.