Pantai, Negeri Sembilan, Malaysia
SOC Analyst (Tier 12)
Job Description:
Job description:
Role summary
Monitor, triage, and investigate security alerts. Execute playbooks, reduce false positives, and escalate incidents.
Key responsibilities
- Monitor SIEM alerts and triage events per SOPs and SLAs
- Perform basic threat hunting and tune detections with the senior team
- Collect and preserve logs, artifacts, and evidence for investigations
- Create tickets, document incidents, and propose control improvements
- Coordinate with IT and engineering during containment and recovery
Minimum qualifications
- 1 to 3 years in SOC, blue team, or IT security operations
- Familiar with SIEM and EDR tools, basic networking, Windows and Linux basics
- Understanding of MITRE ATT&CK, phishing analysis, and common TTPs
- Strong written communications and shift readiness
Preferred
- Scripting for automation in Python or PowerShell
- Certifications: Security+, CySA+, Microsoft SC-200, AZ-500 or equivalent
Tools
- Microsoft Sentinel or Splunk, Defender or CrowdStrike, Zeek or Suricata, SOAR
KPIs
- Mean time to detect and respond, true positive rate, alert fatigue reduction
Screening questions
- Walk through your triage of a suspicious PowerShell event
- How would you reduce false positives from a noisy rule
Job Type: Full-time
Work Location: On the road