My client, a top-tier local service provider, seeks for multiple SOC Analysts/ Engineers. Suitable candidate is responsible to monitor IT security events and investigate security incidents. This role bridges the gap between users and IT and cybersecuirty teams to inplement relevant measures.
Requirements:
- Degree holder in Computer Science, Information Technology, Information System or related disciplines.
- 1-3 years of experience in a SOC, cybersecurity, or IT security role.
- Understanding of network protocols, TCP/IP, and security architectures.
- Knowledge of malware analysis, digital forensics, and incident response frameworks (NIST, MITRE ATT&CK).
- Hands-on experience with SIEM tools (e.g., Splunk, IBM QRadar, LogRhythm, QAX).
- Familiarity with EDR/XDR solutions, firewalls, IDS/IPS, and threat intelligence platforms.
- Proficiency in scripting (Python, PowerShell, Bash) is a plus.
- Holder of one or more of the following certifications is a plus: CISSP, CISP, OSCP, CEH, GSEC, GCIH.
Please note that only shortlisted candidates will be notified. All information gathered will be treated in strict confidentiality and solely used for recruitment purpose.