Enable job alerts via email!

SOC Analyst

Careerally Pte Ltd

Singapore

On-site

SGD 40,000 - 80,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a proactive SOC Analyst to join their dynamic team in a 24/7 Security Operations Center. This role involves monitoring, detecting, and responding to security threats, ensuring the safety and integrity of systems. You will analyze security events, conduct threat hunting, and develop scripts to automate processes. Ideal candidates will possess a strong foundation in cybersecurity principles, incident response methodologies, and a knack for problem-solving. If you thrive in a fast-paced environment and are passionate about cybersecurity, this opportunity is perfect for you!

Qualifications

  • 1+ years as SOC Analyst with experience in SIEM and EDR tools.
  • Strong knowledge of cybersecurity principles and incident response.

Responsibilities

  • Monitor and analyze system activities to identify malicious activity.
  • Investigate security incidents and document responses for future reference.

Skills

Cybersecurity Principles
Incident Response Methodologies
Network Protocols
Problem-Solving Skills
Analytical Skills
Communication Skills

Education

Diploma in Cybersecurity
Bachelor's degree in Cybersecurity
Degree in Information Technology

Tools

SIEM Tools
EDR Tools
Python
PowerShell

Job description

The SOC Analyst will be responsible for monitoring, detecting, and responding to security threats and incidents in a 24/7 Security Operations Center.

Responsibilities:

  1. Continuously monitor and analyze system activities and security alerts from SIEM and EDR tools to identify malicious activity.
  2. Analyze security events to identify and respond to potential threats and vulnerabilities in real-time.
  3. Investigate security incidents, determining the scope and impact, and take appropriate action to mitigate risks.
  4. Document all incidents and responses, maintaining clear records for future reference and analysis.
  5. Conduct threat hunting activities to identify indicators of compromise (IOCs) and unusual patterns of activity.
  6. Stay current on emerging threats and vulnerabilities, adapting monitoring strategies as needed.
  7. Develop scripts and optimize SIEM rules to automate triage and analysis.
  8. Participate in post-incident reviews to evaluate response effectiveness and recommend improvements.

Requirements:

  1. Diploma or Bachelor's degree in Cybersecurity, Information Technology, or related field.
  2. 1+ years of experience as SOC Analyst, with familiarity in SIEM and EDR tools.
  3. Strong knowledge of cybersecurity principles, incident response methodologies, and network protocols.
  4. Proficiency in network communications, log analysis, scripting (Python, PowerShell, etc.).
  5. Excellent problem-solving, analytical, and communication skills.
  6. Willing to work in a 24/7 shift environment.
  7. Able to work 12-hour shifts, including nights, weekends, and holidays as needed.
  8. Ability to work independently and as part of a team in a fast-paced environment.

Interested applicants, please submit an updated resume in MS format via the Apply button.

Position and remuneration will be commensurate with skills and experience.
We regret that only short-listed candidates will be contacted.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.