(A)Soc Security Analyst T1

Details of the offer

About the job (A)SOC Security Analyst T1Headcount: 8
6 Months contract (Renewal of the contract is subject to performance)
Location: KL Sentral.
Open race, open gender
Job Purpose:
Perform initial triage, investigation, and escalations.
Investigate alerts and provide details for incident response teams to defend its assets with clear vision and situational awareness in a persistent, dynamic, and highly complex threat environment.
Key Responsibilities:
24*7*365 triage, analysis, and response to notable events & security alerts (including reported incidents via email or phone).
Monitor on-boarded events and logs from critical applications, critical servers, and databases (per asset priority framework), network-based intrusion detection systems, endpoints, email, firewall, and proxy servers, for potential security incidents and threats.
Assess the security impact of security alerts and traffic anomalies to identify malicious activities and take mitigation actions or escalate to senior members of the team as appropriate.
Leverage fundamental understanding of Operating Systems (Windows, Unix/Linux, and OSX) in support of identifying security incidents and to have a proper overview of risk profile.
Execute analysis of email-based threats to include understanding of email communications, platforms, headers, transactions, and identification of malicious tactics, techniques, and procedures.
Utilize and adhere to defined workflow and processes driving the Threat Monitoring and escalation/handoff actions.
Analyze potential cyber threats from a variety of intakes taking appropriate response actions to include threat containment and/or escalations.
Process tactical mitigations based on results of analysis and determination of threat validity.
Follow escalation and handoff procedures to team members and leadership based on defined threat and priority determination.
Utilize a variety of security tools and technologies to analyze potential threats to determine impact, scope, and recovery.
Leverage network security tools and capabilities to support Cyber Threat Monitoring activities.
Document results of cyber threat analysis effectively and prepare comprehensive handoff and/or escalation for Incident Responses or other teams within the SOC.
Job Specification:
Qualification: Bachelor's Degree or Professional Qualification in the relevant discipline (IT / Computer Science).
Professional Qualification and/or Regulatory, Licensing: Security certifications e.g., CISSP, EC-Council, SANS, etc.
are preferred.#J-18808-Ljbffr


Nominal Salary: To be agreed

Source: Whatjobs_Ppc

Requirements

Client Intelligence Data & Analytics

Job Summary Support the Capital Markets client franchise by providing accurate client reporting. Support various client data initiatives such as resource uti...


Royal Bank Of Canada> - Malasia

Published 15 days ago

Java Developer

Job Summary Join the RBC foreign exchange (FX) electronic trading IT team during an exciting time of growth as we evolve our in-house software to enhance our...


Royal Bank Of Canada> - Malasia

Published 15 days ago

Senior Staff Specialist Data Management

In your new role you will: Cross-site leading role on enabling and sustain Equipment basic data with latest defined coupling Lead team and actively maintain,...


Infineon Technologies - Malasia

Published 15 days ago

Application Support Analyst

Job Summary Coordinates production support activities for all major systems and related subsystems to ensure the integrity of computer generated data. Applie...


Royal Bank Of Canada> - Malasia

Published 15 days ago

Built at: 2025-01-18T11:53:37.742Z