Back to jobs Featured

SOC Analyst

Job description

Job description

  • Regional exposure
  • Great career development
  • Attractive benefits


  • Conducting incident response operations according to documented procedures and industry practices
  • Perform monitoring and data correlation to events
  • Able to use multiple tools such as system event logs, SIEM, IPS/IDS logs, network traffic, anti-virus console and more
  • Review, investigate and respond to security alerts
  • Track security incident investigations to resolution and more

What you'll need to succeed:

  • A Bachelor's Degree in Computer Science or related technology field
  • Minimum 2 years plus in offering security consulting, implementation or managed security
  • More than 2 years of experience in SOC or cybersecurity incident response
  • Experienced with one or more SIEM solutions and not limited to LogLogic, Splunk, Radar, McAfee etc.
  • Well versed in security incident response and investigation, root cause analysis and troubleshooting
  • Excellent communication in English

To apply, please click "APPLY NOW" or email Sandra at quoting reference number AGP 264102. Data provided is for recruitment purposes only. *LI-IT

Due to the volume of applications received, we regret to inform you that only shortlisted candidates will be notified.

JTK Number: JTKSM 995 | Company Registration Number: 201301019088 (1048918-T)

If this job isn't quite right for you, but you know someone who would be great at this role, why not take advantage of our referral scheme? We offer MYR500 in shopping vouchers for every referred candidate who we place in a role. Terms & Conditions Apply.