Job Summary
As a Cybersecurity Analyst (L2/L3), you will be responsible for the following:
- Develop incident response workflow that can be automated
- Perform security monitoring gap analysis and build corresponding process/framework for continuous evaluation as well as increase detection coverage
- Provide support to the Security Operations Center’s L1/L2 Analysts during incident response, event monitoring and threat hunting activities
- Cyber threat analysis support, research, and recommending appropriate remediation and mitigation
- Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security
- Perform real-time monitoring and analysis of security events from multiple sources
- Triage security events to determine priority and severity
- Proactively review customers environments searching for suspicious behavior across network, host and logs data.
- Assist in the development of analytic signatures to identify suspicious and malicious behavior
Requirements:
- Min 5 years experience in SIEM and/or response to information security threats or incidents
- Experience in Azure Sentinel, QRadar or Splunk
- Deep understanding of following areas: Email security (including Document analysis), digital media forensics, monitoring and detection, incident response, vulnerability assessment, penetration testing, cyber intelligence analysis, and Web Application Firewall (WAF)
- This is permanent headcount; the role is based in KL
If this sounds like the role for you, please submit your resume to sewyee.gan@techstaffing.my, stating the job title. We regret that only shortlisted candidates will be notified, but we look forward to connecting if another opportunity arises