Enable job alerts via email!

Tier 3 MSSP SOC Analyst (DSC/JH)

-

Singapore

On-site

SGD 80,000 - 120,000

Full time

18 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading security services company is seeking a Tier 3 MSSP SOC Analyst to provide leadership for SOC operations, focusing on advanced threat hunting and incident analysis. This senior role involves overseeing SOC processes, mentored development of team members, and ensuring the effectiveness of security operations for clients.

Qualifications

  • Extensive experience in SOC operations, especially in threat hunting.
  • Strong understanding of SIEMs and security tools.
  • Hands-on experience managing incident response.

Responsibilities

  • Lead and mentor Tier 1 and Tier 2 analysts.
  • Perform advanced threat hunting and incident analysis.
  • Oversee SIEM operations and manage incident responses.

Skills

Leadership
Threat Hunting
Incident Analysis
Communication
Analytical Skills
Problem Solving

Tools

SIEM Platforms
SOAR Platforms
Ticketing Systems

Job description

Job Summary

The Tier 3 MSSP SOC Analyst is a senior-level role that provides leadership for SOC operations. The role includes advanced threat hunting, incident analysis, process optimization, and team mentorship, ensuring the highest level of security operations for MSSP clients.

Responsibilities

Leadership and Oversight

  • Lead Tier 1 and Tier 2 analysts by example and provide technical guidance.
  • Conduct training sessions, provide coaching, and ensure continuous skill development for the team.
  • Plan relevant certifications for Tier 1 and Tier 2 analysts, ensuring proper progression with certifications arranged yearly.

Threat Hunting and Incident Analysis

  • Actively hunt for threats, identify unknown vulnerabilities, and close security gaps within networks.
  • Identify all security attack vectors, classify incidents, and assess their impact.
  • Review all escalations from Tier 1 and Tier 2 analysts, ensuring comprehensive analysis and daily updates to the SOC Manager and Head of SOC.
  • Proactively update documentation, processes, workflows, and other operational aspects for continuous improvement.

SIEM/SOAR/Ticketing and Incident Response

  • Oversee and optimize SIEM operations, ensuring effective log correlation and alert management.
  • Manage SOAR platform implementations to automate incident response workflows and reduce manual intervention.
  • Supervise ticketing systems to ensure proper incident tracking, escalation, and resolution documentation.
  • Lead complex incident response activities, coordinating with internal teams and external stakeholders.

False Positive Management

  • Work closely with Tier 2 analysts to gather feedback and evidence on false positives.
  • Collaborate with the Threat Detection Team to reduce false positives across all customers.
  • Ensure consistent application of false positive reduction measures for all MSSP clients.

Threat Intelligence

  • Disseminate threat intelligence news and updates to all security analysts, ensuring the team remains informed about emerging threats and attack techniques.

Operational Excellence

  • Maintain oversight of SOC processes to ensure compliance and operational effectiveness.
  • Plan and implement improvements to SOC operations, focusing on proactive threat detection and response.
  • Monitor and "police" SOC workflows, providing tracking and daily updates to SOC leadership.


Requirements

Essential Experience and Skills

  • Extensive experience in SOC operations, including threat hunting and advanced incident analysis.
  • Strong understanding of SIEMs, threat intelligence platforms, and security tools.
  • Hands-on experience with SIEM/SOAR platforms and ticketing systems for incident response management.
  • Leadership experience with a track record of mentoring and developing security teams.
  • Excellent communication, documentation, and organizational skills.
  • Ability to handle high-pressure situations and critical security incidents effectively.
  • A collaborative mindset to work effectively with other SOC tiers and managers.
  • Strong analytical and problem-solving skills to address complex security challenges.


Preferred Technology Experience

  • GoogleSecOps (Google Security Operations) platform experience highly preferred.
  • Fortinet security solutions experience preferred.
  • Cloudflare security services experience preferred.


Work Location: Ang Mo Kio
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.