Enable job alerts via email!

Tier 3 MSSP SOC Analyst (DSC/JH)

ST ENGINEERING INFO-SECURITY PTE. LTD.

Singapore

On-site

SGD 70,000 - 110,000

Full time

24 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading company in security operations is seeking a Tier 3 MSSP SOC Analyst for its Ang Mo Kio office. This senior-level role encompasses leadership in SOC operations, advanced threat hunting, and incident analysis, ensuring top-tier security for clients. Candidates should bring extensive SOC experience, hands-on skills with SIEM and SOAR platforms, and a proven ability to mentor and guide junior analysts. Join a dynamic team and contribute to the enhancement of security operations across various clients!

Qualifications

  • Extensive experience in SOC operations, focusing on threat hunting and incident analysis.
  • Hands-on experience with SIEM/SOAR and ticketing for incident management.
  • Strong analytical skills to address complex security challenges.

Responsibilities

  • Lead Tier 1 and Tier 2 analysts, providing guidance and mentorship.
  • Conduct threat hunting and ensure comprehensive incident analysis.
  • Oversee SIEM operations and manage incident response activities.

Skills

Threat hunting
Incident analysis
Leadership
Communication
Analytical skills

Tools

SIEM
SOAR
Ticketing systems
GoogleSecOps
Fortinet security solutions
Cloudflare security services

Job description

Job Summary

The Tier 3 MSSP SOC Analyst is a senior-level role that provides leadership for SOC operations. The role includes advanced threat hunting, incident analysis, process optimization, and team mentorship, ensuring the highest level of security operations for MSSP clients.

Responsibilities
Leadership and Oversight
  • Lead Tier 1 and Tier 2 analysts by example and provide technical guidance.
  • Conduct training sessions, provide coaching, and ensure continuous skill development for the team.
  • Plan relevant certifications for Tier 1 and Tier 2 analysts, ensuring proper progression with certifications arranged yearly.
Threat Hunting and Incident Analysis
  • Actively hunt for threats, identify unknown vulnerabilities, and close security gaps within networks.
  • Identify all security attack vectors, classify incidents, and assess their impact.
  • Review all escalations from Tier 1 and Tier 2 analysts, ensuring comprehensive analysis and daily updates to the SOC Manager and Head of SOC.
  • Proactively update documentation, processes, workflows, and other operational aspects for continuous improvement.
SIEM/SOAR/Ticketing and Incident Response
  • Oversee and optimize SIEM operations, ensuring effective log correlation and alert management.
  • Manage SOAR platform implementations to automate incident response workflows and reduce manual intervention.
  • Supervise ticketing systems to ensure proper incident tracking, escalation, and resolution documentation.
  • Lead complex incident response activities, coordinating with internal teams and external stakeholders.
False Positive Management
  • Work closely with Tier 2 analysts to gather feedback and evidence on false positives.
  • Collaborate with the Threat Detection Team to reduce false positives across all customers.
  • Ensure consistent application of false positive reduction measures for all MSSP clients.
Threat Intelligence
  • Disseminate threat intelligence news and updates to all security analysts, ensuring the team remains informed about emerging threats and attack techniques.
Operational Excellence
  • Maintain oversight of SOC processes to ensure compliance and operational effectiveness.
  • Plan and implement improvements to SOC operations, focusing on proactive threat detection and response.
  • Monitor and "police" SOC workflows, providing tracking and daily updates to SOC leadership.
Requirements
Essential Experience and Skills
  • Extensive experience in SOC operations, including threat hunting and advanced incident analysis.
  • Strong understanding of SIEMs, threat intelligence platforms, and security tools.
  • Hands-on experience with SIEM/SOAR platforms and ticketing systems for incident response management.
  • Leadership experience with a track record of mentoring and developing security teams.
  • Excellent communication, documentation, and organizational skills.
  • Ability to handle high-pressure situations and critical security incidents effectively.
  • A collaborative mindset to work effectively with other SOC tiers and managers.
  • Strong analytical and problem-solving skills to address complex security challenges.
Preferred Technology Experience
  • GoogleSecOps (Google Security Operations) platform experience highly preferred.
  • Fortinet security solutions experience preferred.
  • Cloudflare security services experience preferred.

Work Location: Ang Mo Kio

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.