Job Search and Career Advice Platform

Enable job alerts via email!

SOC Officer

CrimsonLogic Pte Ltd

Singapore

On-site

SGD 50,000 - 70,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology company in Singapore is seeking a Level 1 Security Analyst to monitor and respond to security incidents in a 24x7 Security Operations Center. The ideal candidate should have at least 2 years of experience in an SOC environment and a diploma in Cybersecurity or IT. Key responsibilities include analyzing security events, documenting investigations, and collaborating with teams for incident management. This role offers opportunities for professional growth in an inclusive workplace.

Qualifications

  • Minimum 2 years working as SOC analyst in an SOC environment.
  • Prior experience in an operations environment as a Tier 1 SOC analyst.

Responsibilities

  • Monitors, analyzes and responds to security events in a timely manner.
  • Using security tools to detect security risks and threats.
  • Follow up on alarms and create tickets.
  • Conduct IOC scan for evidence of compromise.
  • Document all actions taken as part of investigations.
  • Tracking suspicious network, application, and user behavior.
  • Work closely with other teams to support the incident management process.
  • Conduct investigations upon requests for data.

Skills

Good communication skills
Teamwork
Scripting / programming skills
Basic understanding of Networking (OSI model or TCP/IP)
Understanding of Operating systems and web Applications

Education

Diploma or equivalent in Cybersecurity or IT
Job description

Role Purpose(s)

This individual will perform the role of level 1 security analyst in a 24x7 Security Operations Center responsible for monitoring the environment for potential security threats and incidents.

Key Accountabilities
  • Monitors, analyzes and responds to security events in timely manner
Job Responsibilities & Duties
  • Using security tools, perform monitoring and analysis of security events of interest to detect security risks and threats.
  • Follow up on Alarms, create tickets and escalating security incident to Tier 2 SOC analyst and team lead if required.
  • Conduct IOC scan (specialized searches) for evidence of compromise
  • Document all actions taken as part of investigation.
  • Tracking suspicious network, application, and user behavior
  • Work closely with other teams to support the incident management process.
  • Conduct investigation upon requests for data by the customer and/or other teams.
  • Perform shift work
  • Any other duties assigned
Key Job Competencies
  • Good communication skills
  • Teamwork
  • Scripting / programming skills are a plus
Education Requirements
  • Diploma or equivalent in Cybersecurity or IT
Working Experience Requirements
  • Minimum 2 years working as SOC analyst in an SOC environment
Skills Required
  • Prior experience in an operations environment as a Tier 1 SOC analyst
  • Basic understanding of Networking (OSI model or TCP/IP), Operating systems and web Applications

CrimsonLogic is proud to be an equal opportunity employer. We hire talented and passionate people of all backgrounds and create an inclusive workplace for all employees to develop and build their career with us.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.