393 Security Operations jobs in Malaysia

Security Operations Center

Kuala Lumpur, Kuala Lumpur MYR120000 - MYR250000 Y BAE Systems

Posted today

Job Viewed

Tap Again To Close

Job Description

Location(s):

BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.

About Us

Our mission at BAE Systems Digital Intelligence is to collect, connect and understand complex data, so that our customers can unlock digital advantage in the most demanding environments.

At our Malaysian Global Delivery Centre, we work with clients from around the world to deliver cyber technical services to support our customers in keeping their systems secure in today's hostile digital world.

We are seeking a highly skilled SOC Consultant to help our clients strengthen their security operations. The ideal candidate will bring hands-on expertise in Security Operations Center (SOC) environments, strong advisory skills, and proven experience in leveraging platforms such as Splunk and other leading security technologies.

This role involves assessing client security postures, recommending improvements to detection and response capabilities, and guiding organisations to build resilient and mature SOC practices.

This position is part of our global Cyber Technical Services team, which includes adjacent areas such as Threat Intelligence and penetration testing.

While exact responsibilities will depend on project demands the below are some example areas:

  • Engage with clients to assess their SOC maturity across technology, process, and people.
  • Provide expert guidance on enhancing incident detection, response, and threat hunting capabilities.
  • Recommend and help implement frameworks (e.g., MITRE ATT&CK, NIST CSF, ISO into SOC operations.
  • Design, configure, and optimise SIEM solutions (Splunk required; others such as QRadar, Elastic, or Sentinel are advantageous).
  • Support integration of threat intelligence platforms, SOAR tools, EDR/XDR solutions, and log management systems.
  • Develop advanced detection rules, dashboards, and use cases to improve visibility and response.
  • Define and improve SOC processes (incident response, threat hunting, escalation workflows).
  • Conduct gap analyses and propose roadmaps for SOC capability maturity.
  • Deliver workshops, training sessions, and knowledge-sharing to client SOC teams.

Candidate Expectations

  • 4–7+ years of experience in cybersecurity, with at least 3 years in SOC operations or consulting.
  • Experience with SIEM tools (Examples: Splunk, QRadar, Elastic, Azure Sentinel, etc.).
  • Familiarity with SOAR platforms (Splunk SOAR, Palo Alto Cortex XSOAR, ServiceNow Security Operations).
  • Understanding of network security, firewalls, IDS/IPS, and endpoint security.
  • Knowledge of AI technologies and their applications for the security field an advantage.
  • Experience with incident response frameworks and threat hunting methodologies.
  • Passion for cybersecurity, continuous learning, and thought leadership.

What We Offer

  • You'll have a dedicated line Manager to help you develop your career and guide you on your journey through BAE Systems Digital Intelligence
  • We will support your personal training and development in the areas of cybersecurity by sponsoring training courses and certification exams
  • Work-life balance is important; you'll get 18 days holiday a year (increases to 21 after 5 years' service)
  • We support hybrid working and give flexibility for team leads to decide on the balance between remote and office-based working
  • Our benefits package includes private family medical cover, maternity (4 months), paternity (2 weeks), study leave & a Optical/Dental/Health screening allowance
  • You'll be part of our annual bonus and share award scheme

Why BAE Systems?

This is a place where you'll be able to make a real difference. You'll be part of an inclusive culture that values diversity of thought, rewards integrity, and merit, and where you'll be empowered to fulfil your potential. We welcome people from all backgrounds and want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments.

Please be aware that many roles at BAE Systems are subject to both security and export control restrictions. These restrictions mean that factors such as your nationality, any nationalities you may have previously held, and your place of birth can restrict the roles you are eligible to perform within the organisation.

This advertiser has chosen not to accept applicants from your region.

Security Operations Center

Kuala Lumpur, Kuala Lumpur MYR80000 - MYR120000 Y Wurth IT Malaysia Sdn. Bhd.

Posted today

Job Viewed

Tap Again To Close

Job Description

About Us

Würth IT, a dynamic and forward-thinking IT organization within the Würth Group, is growing its team in Malaysia. We are looking for dedicated professionals to join us as part of our global network, working together to deliver cutting-edge IT solutions that enhance security, efficiency, and reliability. As a member of the Würth IT team, you'll collaborate with colleagues worldwide, providing specialized support and promoting the innovative IT services we offer. Your work will play a crucial role in strengthening the operations of Würth Group companies across the globe, driving impactful results within a supportive and growth-oriented environment.

Job Description

We are seeking a dedicated Security Operations Center (SOC) Analyst to join our global defense team. In this role, you will lead Tier 1 and Tier 2 analysis of cybersecurity events, including incident management and response activities, to ensure the security and resilience of our operations. This position offers a dynamic and challenging environment that fosters stability, continuous learning, and professional growth - ideal for individuals looking to excel in the evolving field of cybersecurity.

Responsibilities

  • Security Monitoring & Alert Handling: Continuously monitor security alerts, events, and notifications from multiple sources. Quickly identify and classify potential security incidents or vulnerabilities based on established procedures.
  • Incident Triage & Response: Perform first-level analysis of security incidents to determine their scope, urgency, and potential impact. Escalate critical issues, providing detailed and accurate documentation of findings.
  • Documentation & Reporting: Maintain accurate and up-to-date incident records in ticketing systems or knowledge bases. Generate periodic reports on security events, incident trends, and key observations for leadership.
  • Process Adherence & Continuous Improvement: Follow established SOC processes, playbooks, and guidelines to ensure reliability. Suggest improvements or updates to procedures to address evolving threats effectively.
  • Collaboration & Knowledge Sharing:Work closely with other SOC analysts, system administrators, and network engineers to remediate incidents. Share insights from escalations and new threats, strengthening the team's collective defense capabilities.

Qualifications and Skills

  • Bachelor's Degree: Computer Science, Information Technology, or a related field (or equivalent professional experience).
  • Security Operations Experience:At least 2 years in SOC. Proficiency in case and alert investigation is essential.
  • Network Protocols: Understanding of HTTP, DNS, LDAP, FTP, and other core protocols.
  • Log Analysis & Digital Forensics:Strong interest in, and basic knowledge of, log analysis and forensic methodologies.
  • SIEM Proficiency:Hands-on experience with SIEM technology to detect, analyze, and respond to threats.
  • Language Skills:Fluent in English, both written and spoken.
  • Communication & Collaboration:Effective at working in a team environment, sharing insights, and documenting findings.
  • Analytical & Solution-Oriented Approach:Adept at breaking down complex issues, proposing clear solutions, and taking initiative without waiting for direction

Join us in our journey to strengthen the cybersecurity landscape of the Würth Group and be part of a team that values innovation, collaboration, and professional growth.

This advertiser has chosen not to accept applicants from your region.

Security Operations Center

MYR24000 - MYR72000 Y CGP Personnel

Posted today

Job Viewed

Tap Again To Close

Job Description

This role will be a 12 months contract

The SOC analyst is responsible for analysing cybersecurity events and improving threat detection capabilities and procedures. If an event results in a security incident, the analyst will work with the relevant stakeholders to respond and contain the incident.

Responsibilities:

  • Continuously monitor security alerts from various sources (e.g., SIEM, EDR).
  • Analyze and interpret security logs from multiple sources to identify potential threats.
  • Investigate security incidents to determine the root cause, scope, and impact.
  • Collaborate with internal and customer IT and other departments to contain and remediate security incidents.
  • Document and report security incidents, providing detailed analysis and recommendations.
  • Stay updated on the latest cybersecurity threats, vulnerabilities, and attack vectors.
  • Conduct threat hunting activities to proactively identify potential threats within the environment.
  • Provide input and recommendations for improving the organization's security posture.
  • May require working in shifts to provide 24/7 security coverage.
  • May involve periodic on-call duties and the need to respond to security incidents outside of regular working hours.
  • Handle alerts from the NOC tools and emails.

Requirements:

  • Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field.
  • At least 2+ years of experience in IT support role such as Server/Network, Tech Support, Helpdesk, Monitoring or a related field.
  • Strong knowledge of security technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection.
  • Familiarity with incident response processes and methodologies.
  • Understanding of network protocols, operating systems, and security architecture.
  • Experience with specific SIEM platforms such as Splunk, ArcSight, or QRadar.
  • Experience with cloud security and services (e.g., AWS, Azure, Google Cloud).
  • Relevant certifications such as CEH, or GIAC are a plus.
  • Strong analytical and problem-solving skills.
  • Excellent communication and teamwork skills.

You may submit your application below or send us an email directly quoting the job title to

We regret to inform that only shortlisted candidates will be informed.

Cornerstone Global Partners (EA License Number: 19C9859) is an affirmative equal-opportunity employer and recruitment firm. We evaluate qualified applicants without regard to race, colour, religion, creed, gender, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class

Timothy Sauh

Cornerstone Global Partners Pte Ltd

EA License: 19C9859

This advertiser has chosen not to accept applicants from your region.

Security Operations Center

Kuala Lumpur, Kuala Lumpur MYR120000 - MYR240000 Y BAE Systems Digital Intelligence

Posted today

Job Viewed

Tap Again To Close

Job Description

Location(s):

BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.

About Us

Our mission at BAE Systems Digital Intelligence is to collect, connect and understand complex data, so that our customers can unlock digital advantage in the most demanding environments.

At our Malaysian Global Delivery Centre, we work with clients from around the world to deliver cyber technical services to support our customers in keeping their systems secure in today's hostile digital world.

We are seeking a highly skilled SOC Consultant to help our clients strengthen their security operations. The ideal candidate will bring hands-on expertise in Security Operations Center (SOC) environments, strong advisory skills, and proven experience in leveraging platforms such as Splunk and other leading security technologies.

This role involves assessing client security postures, recommending improvements to detection and response capabilities, and guiding organisations to build resilient and mature SOC practices.

This position is part of our global Cyber Technical Services team, which includes adjacent areas such as Threat Intelligence and penetration testing.

While exact responsibilities will depend on project demands the below are some example areas:

  • Engage with clients to assess their SOC maturity across technology, process, and people.
  • Provide expert guidance on enhancing incident detection, response, and threat hunting capabilities.
  • Recommend and help implement frameworks (e.g., MITRE ATT&CK, NIST CSF, ISO into SOC operations.
  • Design, configure, and optimise SIEM solutions (Splunk required; others such as QRadar, Elastic, or Sentinel are advantageous).
  • Support integration of threat intelligence platforms, SOAR tools, EDR/XDR solutions, and log management systems.
  • Develop advanced detection rules, dashboards, and use cases to improve visibility and response.
  • Define and improve SOC processes (incident response, threat hunting, escalation workflows).
  • Conduct gap analyses and propose roadmaps for SOC capability maturity.
  • Deliver workshops, training sessions, and knowledge-sharing to client SOC teams.

Candidate Expectations

  • 4–7+ years of experience in cybersecurity, with at least 3 years in SOC operations or consulting.
  • Experience with SIEM tools (Examples: Splunk, QRadar, Elastic, Azure Sentinel, etc.).
  • Familiarity with SOAR platforms (Splunk SOAR, Palo Alto Cortex XSOAR, ServiceNow Security Operations).
  • Understanding of network security, firewalls, IDS/IPS, and endpoint security.
  • Knowledge of AI technologies and their applications for the security field an advantage.
  • Experience with incident response frameworks and threat hunting methodologies.
  • Passion for cybersecurity, continuous learning, and thought leadership.

What We Offer

  • You'll have a dedicated line Manager to help you develop your career and guide you on your journey through BAE Systems Digital Intelligence
  • We will support your personal training and development in the areas of cybersecurity by sponsoring training courses and certification exams
  • Work-life balance is important; you'll get 18 days holiday a year (increases to 21 after 5 years' service)
  • We support hybrid working and give flexibility for team leads to decide on the balance between remote and office-based working
  • Our benefits package includes private family medical cover, maternity (4 months), paternity (2 weeks), study leave & a Optical/Dental/Health screening allowance
  • You'll be part of our annual bonus and share award scheme

Why BAE Systems?

This is a place where you'll be able to make a real difference. You'll be part of an inclusive culture that values diversity of thought, rewards integrity, and merit, and where you'll be empowered to fulfil your potential. We welcome people from all backgrounds and want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments.

Please be aware that many roles at BAE Systems are subject to both security and export control restrictions. These restrictions mean that factors such as your nationality, any nationalities you may have previously held, and your place of birth can restrict the roles you are eligible to perform within the organisation.

This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

Kuala Lumpur, Kuala Lumpur Avensys Consulting

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Global Recruitment Head at Avensys Consulting

Avensys is a reputed global IT professional services company, and our service spectrum includes enterprise solution consulting, business intelligence, business process automation and managed services. And we service a client base across banking and financial services, insurance, information technology, healthcare, retail, and supply chain.

We are currently looking for SOC Analyst. This is an exciting opportunity to expand your skill set, achieve job satisfaction and work-life balance. More details as below.

Job Description :

The SOC Analyst will monitor and analyze events, identify potential security incidents, and ensure that appropriate actions are taken to protect the security of the organization's systems and data.

Security Operations Center (SOC) Analyst Duties and Responsibilities

  • Monitor security events and logs from a variety of systems and networks
  • Identify potential security incidents and threats
  • Perform analysis and investigations, correlating events and data to detect security incidents
  • Develop and document processes and procedures for responding to security incidents
  • Develop and maintain security incident response plans
  • Provide technical guidance, training, and support to other members of the security team
  • Maintain an up-to-date knowledge of security threats, vulnerabilities, and countermeasures

Security Operations Center (SOC) Analyst Requirements and Qualifications

  • Minimum 1 year of experience in IT security, network security, or a related field
  • Experience in Threat Detection, Vulnerability, Information Security, Linux Hardening, Windows OS Security, Network Security
  • Experience with network, system, and application security
  • Experience with security monitoring, incident response, and threat analysis
  • Knowledge of security best practices and standards
  • Knowledge of security technologies such as firewalls, intrusion detection systems, and anti-virus software
  • Familiarity with scripting and automation tools
  • Excellent problem-solving and analytical skills
  • Excellent communication and interpersonal skills
  • A Bachelor's degree in Computer Science, Information Technology, or a related field

WHAT’S ON OFFER

You will be remunerated with an excellent base salary and entitled to attractive company benefits. Additionally, you will get the opportunity to enjoy a fun and collaborative work environment, alongside a strong career progression.

To submit your application, please apply online or email your UPDATED CV in Microsoft Word format to Your interest will be treated with strict confidentiality.

CONSULTANT DETAILS

Privacy Statement: Data collected will be used for recruitment purposes only. Personal data provided will be used strictly in accordance with the relevant data protection law and Avensys' personal information and privacy policy

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

Kuala Lumpur, Kuala Lumpur Avensys Consulting

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

We are currently looking to hire Security Operations Center Analyst. This is an exciting opportunity to expand your skill set, achieve job satisfaction and work-life balance.

Job Type: 12 Months Renewable contract.

Responsibilities
  • Analyze potential threats, investigate alerts, and coordinate responses to mitigate risks, ensuring the organization’s security posture is maintained
  • Continuously monitor security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), firewalls, and other security tools for suspicious activities or anomalies
  • Analyze security alerts to identify potential threats, such as malware, phishing, or unauthorized access attempts. Use threat intelligence feeds to stay updated on emerging threats and vulnerabilities
  • Incident Response: Investigate and triage security incidents to determine their scope, impact, and root cause. Respond to incidents following established playbooks, escalating critical issues to senior analysts or incident response teams as needed. Contain and mitigate threats, such as isolating compromised systems or blocking malicious IPs
  • Log Analysis and Forensics: Analyze logs from various sources (e.g., servers, endpoints, cloud services) to identify indicators of compromise (IOCs)
  • Perform basic digital forensics to collect and preserve evidence for investigations. Document findings and maintain detailed incident reports for compliance and auditing purposes
  • Threat Hunting: Proactively search for hidden threats or vulnerabilities within the network that may have evaded automated detection
  • Use advanced techniques and tools to identify patterns of malicious behavior
  • Collaboration and Communication: Work closely with other SOC team members, IT staff, and external stakeholders to coordinate incident response and remediation efforts. Communicate findings and recommendations to technical and non-technical audiences, including management
  • Participate in post-incident reviews to improve processes and prevent recurrence
  • Maintenance and Optimization: Tune SIEM rules and alerts to reduce false positives and improve detection accuracy. Update and maintain security tools, ensuring they are configured correctly. Assist in developing and refining SOC processes, procedures, and playbooks
  • Compliance and Reporting: Ensure adherence to regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Generate reports on security incidents, trends, and metrics for management and audits
Requirements
  • Bachelor’s degree in Computer Science/Information Technology
  • Minimum 1 year in SOC / Security
  • Experience in Threat Detection, Vulnerability, Information Security
  • Experience with security monitoring, incident response, and threat analysis
  • Knowledge of security best practices and standards
  • Knowledge of security technologies such as firewalls, intrusion detection systems, and anti-virus software
  • Familiarity with scripting and automation tools
  • Excellent problem-solving and analytical skills
  • Excellent communication and interpersonal skills
  • Training will be provided for candidates with relevant experience
  • Immediate joiners preferred
What’s on offer

You will be remunerated with an excellent base salary and entitled to attractive company benefits. Additionally, you will get the opportunity to enjoy a fun and collaborative work environment, alongside a strong career progression

How to apply

To submit your application, please apply online or email your UPDATED CV in Microsoft Word format to Your interest will be treated with strict confidentiality.

Equal employment opportunity

Privacy Statement: Data collected will be used for recruitment purposes only. Personal data provided will be used strictly in accordance with the relevant data protection law and Avensys' privacy policy.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

Selangor, Selangor MYR90000 - MYR120000 Y Strato Solutions Malaysia

Posted today

Job Viewed

Tap Again To Close

Job Description

Experience: 4–6 years

Duration: 6 months (Contract)

Location: On-site @ Kwasa Damansara

Industry: Fund Management & Retirement

Key Responsibilities:

  • Rule writing for threat detection and alerting.
  • SIEM automation to streamline incident response workflows.
  • Management and maintenance of asset listings within the SIEM platform.
  • Fine-tuning of false positives to improve alert accuracy.
  • Implementation of data filtering techniques for relevant log ingestion.
  • Application of data masking to protect sensitive information during analysis.

Requirements:

  • Experience in managing or implementing SOC environments, including onboarding log sources and defining operating models.
  • Involvement in SIEM migration and deployment projects, including tuning rules and filters to reduce false positives.
  • Hands-on experience in Level 1 and Level 2 SOC roles.
  • Any related security certification
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security operations Jobs in Malaysia !

Security Operations Center Analyst

Kuala Lumpur, Kuala Lumpur MYR40000 - MYR120000 Y Neuron Solutions Sdn Bhd

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsibilities:

  • Monitor security systems and tools for alerts and anomalies.
  • Follow established procedures to respond to security incidents, including gathering information and coordinating with relevant teams.
  • Follow established incident response procedures and escalate critical incidents as needed.
  • Analyze security logs and identify patterns or suspicious activities.
  • Update incident management ticketing systems with accurate and timely information.
  • Contribute to the development and improvement of security processes and procedures.
  • Provide support to other SOC team members as required.
  • Required to work in a shift rotation including weekends and holidays.
  • Maintain detailed, written documentation of security incidents, investigations, and response actions.

Work Experience and Knowledge Requirement:

  • Experience with Microsoft Azure Sentinel.
  • 1 - 2 years of experience in Security Operations Center (SOC) environment.
  • Experience with security information and event management (SIEM) tools intrusion detection systems, firewalls, etc.
  • Knowledge of common security threats and vulnerabilities.
  • Familiarity with incident response methodologies.
  • Scripting or programming skills (e.g., Python, PowerShell).
  • Basic understanding of networking, operating systems such as Microsoft Windows and Linux, and security concepts.
  • Knowledge of TCP/IP, firewalls, routers, switches
  • Strong analytical and problem-solving skills.
  • Attention to detail and ability to work effectively under pressure.
  • Ability to work in a fast-paced, 24/7 environment.
  • Strong written and verbal communication skills in English
  • Experience in operating system hardening to reduce attack surfaces.

Desired Skill:

  • Knowledge of security standards and regulations (e.g., ISO 27001, ITIL, GDPR, CCPA).
  • Certifications in cybersecurity (e.g., Security+, Network+, CompTIA CySA+).
  • Experience with using Kali Linux

Education Requirement:

  • · Bachelor's degree in computer science, information technology, cybersecurity, or a related field.
This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

MYR60000 - MYR120000 Y CyberOwl

Posted today

Job Viewed

Tap Again To Close

Job Description

We're CyberOwl, a dynamic start-up that operates globally with colleagues based in the UK, Greece, Singapore, Malaysia, Poland and the Philippines. CyberOwl helps maritime and CNI asset operators gain visibility, cybersecurity, and compliance of systems on their distributed, remote assets. We work with ship owners and managers where our technologies provide near-real-time visibility of the onboard IT and OT assets and their communication patterns, raises early warning of cyber-attacks, suspicious behaviours and monitors for non-compliance. We complement this with a managed service (SOC) and specific cybersecurity advisory services to further support the asset operator.

Our team is 50+ Owls strong and always growing. We're experiencing another significant growth phase. We're recognised as market innovators - we have a bias for action, and our team prides itself on their ability to plan, execute, and iterate at a rapid pace. We value the ability to challenge each other, hold each other to account, develop each other personally and professionally, and celebrate each other's successes.

Our culture is at the heart of everything that we do and we live by our values; BE OWLS. We celebrate diversity with 13 nationalities, 17 languages, many more dialects, and lots of owls. We are spread across 2 continents and 6 countries.

The Role:

We're looking for a mid to senior Level 1 (L1) SOC analyst who has previous experience of working in a customer facing SOC team, and wishes to join a fast paced startup environment where they can showcase their expertise whilst helping the team provide outstanding customer service. Ideally you will have honed your skills in an industrial controls / OT, IOT environment.

What You Will Do:

  • Monitor security logs and network traffic to identify and report on suspicious or malicious activity on customer networks and assets.
  • Conduct in-depth analysis of security alerts using proprietary and third-party tools, correlating data to assess impact and determine root cause.
  • Collaborate with the Customer Success Manager to present security metrics, incident summaries and insights to customers in an insightful way and as part of regular online meetings.
  • Craft slides and visual presentation materials for use in customer meetings that explain the evolving threat landscape, past incidents and key metrics in simple to understand language for non technical users.
  • Produce detailed security reports or advisories tailored to various stakeholder audiences as part of CyberOwls value added service.
  • Keep up-to-date on emerging threats and develop new detection capabilities, sharing your knowledge with the SOC team and customers.
  • Partner with developers to refine and expand threat detection capabilities through enhanced rule sets, signatures, and behavioral analytics.
  • Contribute to R&D initiatives focused on advancing SOC automation, including playbooks, orchestration, and machine learning integration.
  • Collaborate with UI/UX teams to optimise product features and workflows. Capable of leading product demonstrations for both technical and non-technical stakeholders.
  • Create and maintain a log of best practice.
  • Assist in the development and delivery of coaching and mentoring for less experienced SOC analysts.
  • Provide the SOC team leader with support and deputise for them in their absence.

Essential Skills:

  • A thorough understanding and theoretical knowledge of Cybersecurity and the evolving threat landscape.

  • Demonstrable experience of having worked in an external customer facing SOC serving the needs of international customers.

  • The ability to take complex cybersecurity information and convey it in everyday language to customers, users and stakeholders who don't come from a Cyber / IT background.

  • A self starter who can work autonomously with little supervision, but also collaboratively as part of a wider team when required.

  • Has experience of using and tuning SIEM tools.

  • Can prioritise and work under pressure without losing sight of the end goal.

  • Has the ability to think creatively to solve problems and propose solutions.

  • Is able to critically think, evaluate and prioritise.

  • Can act as the escalation point for less experienced SOC analysts.

Desirable:

  • Ideally previous experience of using Kabana and Elastic
  • Practical experience or knowledge of OT security
  • Previous team leadership experience
  • Has coached or mentored less experienced team members

Equality Diversity & Inclusion:

CyberOwl is an equal opportunities employer and welcomes applications from all suitably qualified persons, regardless of their race, sex, disability, religion/belief, sexual orientation, gender, marriage/civil partnerships, pregnancy, maternity, or age.

Applicants may request reasonable adjustments to facilitate their application and the selection process.

Data Protection:

When you apply for a job, the personal data contained in your application will be collected by CyberOwl Limited ("Controller"), which is registered at 5th Floor Vivo Building, 30 Stamford Street, London, England, SE1 9LQ and can be contacted by emailing Your personal data will be processed for the purposes of managing CyberOwl's recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of Regulation (EU) 2016/679 (General Data Protection Regulation) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment.

Your personal data will be retained by CyberOwl Limited for as long as CyberOwl determines it is necessary to evaluate your application for employment. Under the GDPR, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have the right to data portability. In addition, you may lodge a complaint with an EU supervisory authority.

We regret that we are unable to reply to all job applications.

Fraud Warning:

Please be aware that
CyberOwl will never request payment of any kind from applicants to secure employment
. Any request for payments or financial information as part of the recruitment process should be considered fraudulent.

This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

Kuala Lumpur, Kuala Lumpur MYR90000 - MYR120000 Y Avensys Consulting

Posted today

Job Viewed

Tap Again To Close

Job Description

Security Operations Center (SOC) Analyst

Avensys is a reputed global IT professional services company headquartered in Singapore. Our services include enterprise solution consulting, business intelligence, business process automation, and managed services. Given our decade of success, we have become one of the top trusted providers in Singapore and service a client base across banking and financial services, insurance, information technology, healthcare, retail, and supply chain.

We are currently looking to hire
Security Operations Center (SOC) Analyst
This is an exciting opportunity to expand your skill set and achieve job satisfaction and work-life balance. I've included more details below.

Overview

The SOC Analyst plays a pivotal role within the Security Operations Center, safeguarding the organization's digital assets. This position is responsible for proactively identifying, investigating, and responding to cybersecurity threats and incidents, ensuring the integrity of IT infrastructure, data, and systems is maintained.

Key Responsibilities

Monitoring and Threat Detection

  • Continuously monitor SIEM, IDS/IPS, firewalls, and other security systems for suspicious activity.
  • Analyze security alerts to identify threats such as malware, phishing, and unauthorized access.
  • Leverage threat intelligence feeds to stay informed about new vulnerabilities.

Incident Response

  • Investigate and triage security incidents to assess their scope, impact, and root cause.
  • Execute incident response procedures and escalate critical cases as required.
  • Contain and mitigate threats, including isolating compromised systems or blocking malicious traffic.

Log Analysis and Forensics

  • Review logs from diverse sources (servers, endpoints, cloud, etc.) to detect indicators of compromise.
  • Perform basic digital forensics to collect and preserve evidence during investigations.
  • Document findings and maintain thorough incident reports for auditing and compliance.

Threat Hunting

  • Proactively hunt for hidden threats or vulnerabilities within the network that automated tools may miss.
  • Apply advanced analytical techniques to recognize malicious patterns.

Collaboration and Communication

  • Coordinate with fellow SOC team members, IT staff, and external stakeholders during incident response.
  • Report findings and recommendations to technical and non-technical audiences, including management.
  • Participate in post-incident reviews to refine security processes.

Maintenance and Optimization

  • Tune SIEM rules and alerts to improve detection accuracy and minimize false positives.
  • Update and maintain security tools and ensure proper configuration.
  • Help develop and refine SOC processes, procedures, and playbooks.

Compliance and Reporting

  • Ensure compliance with regulatory and industry standards (GDPR, HIPAA, PCI-DSS, ISO
  • Generate reports on security incidents, threat trends, and SOC metrics for management review.

Required Skills and Qualifications

  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 1–3 years of hands-on experience in a SOC or similar security team environment.
  • Expertise in SIEM platforms (Splunk, QRadar, etc.), firewalls, IDS/IPS, and vulnerability scanning tools.
  • Strong understanding of network protocols, endpoint security, and threat detection.
  • Familiarity with incident response, forensic analysis, and malware investigation.
  • Certifications such as CompTIA Security+, CEH, or CISSP are a plus.
  • Exceptional analytical, problem-solving, and communication skills.
  • Ability to work effectively in a fast-paced, collaborative environment.

WHAT'S ON OFFER

You will be remunerated with an excellent base salary and entitled to attractive company benefits. Additionally, you will get the opportunity to enjoy a fun and collaborative work environment, alongside a strong career progression.

To submit your application, please apply online or email your UPDATED CV in Microsoft Word format to Arti
@aven-
. Your interest will be treated with strict confidentiality.

CONSULTANT DETAILS

Consultant Name: Arti Choudhary

Avensys Consulting Pte Ltd

EA Licence 12C5759

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Operations Jobs