What Jobs are available for Soc Analyst in Malaysia?
Showing 94 Soc Analyst jobs in Malaysia
SOC Analyst
Posted 7 days ago
Job Viewed
Job Description
SOC Analyst
role at
Orange Business
About Us
Orange Business is a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
About The Role
Map your knowledge to a defense in depth strategy implemented on our detection capabilities
Analyze security events raised by our tooling and take adequate steps together with the customer’s security department to mitigate them
Develop and improve playbooks within our SOAR used to automate our investigations & remediation procedures
Interlock with CyberSOC teams to actively implement new threat scenarios in our customers context
Advise customers on cyber trends
Contribute to our mentorship program towards other SOC analysts
Your success is defined by building a trust relationship with our customers and minimizing risks based on their business.
About You
Cybersecurity needs to be your passion, securing the customers assets your mission. As security is often a tradeoff between different aspects, you need to be pragmatic and result driven to get your message delivered while reducing the risk for the customer.
Minimal a bachelor degree in computer science or programming
3+ years of experience in security management services oriented position giving support and/or performing installations of network security systems with proven working experience in logs collection and threat monitoring
2+ years of experience in a SOC role
Broad knowledge on threat analysis and experience in intelligence reporting
Excellent English written/verbal and communication skills
Experience in administrating a SIEM solution such as IBM QRadar or Splunk
Experience in reversing malware is a plus
Technical security certifications (at least one) such as CompTIA Security+, CompTIA CySA+, C|EH, GIAC GSEC, GIAC GCDA, GIAC GDAT
Industry certifications like CISA, CISM, CISSP is a plus
What We Offer
Global opportunities: Work in multi-national teams with the opportunity to collaborate with colleagues and customers from all over the world
Flexible work environment: Flexible working hours and possibility to combine work from office and home (hybrid ways of working)
Professional development: training programs and upskilling/re-skilling opportunities
Career growth: Internal growth and mobility opportunities within Orange
Caring and daring culture: health and well-being programs and benefits, diversity & inclusion initiatives, CSR and employee connect events
Reward programs: Employee Referral Program, Change Maker Awards
Only Your Skills Matter
Regardless of your age, gender identity, race, ethnic origin, religion/belief, sexual orientation, marital status, neuroatypia, disability, veteran status or appearance, we encourage diversity within our teams because it is a strength for the collective and a vector of innovation. Orange Group is a disabled-friendly company and equal opportunity employer: don't hesitate to tell us about your specific needs.
Job Details
Seniority level: Mid-Senior level
Employment type: Full-time
Job function: Information Technology
Industries: IT Services and IT Consulting
#J-18808-Ljbffr
Is this job a match or a miss?
Internship -IT SOC Analyst
Posted 9 days ago
Job Viewed
Job Description
Assist in monitoring and analyzing security alerts from various security tools (e.g., SIEM, IDS/IPS, firewalls).
Support the SOC team in investigating security incidents and responding to threats in real-time.
Participate in incident response activities, including threat hunting and root cause analysis.
Help with log analysis and forensic investigation to identify potential security breaches.
Learn to identify vulnerabilities in systems, networks, and applications.
Contribute to improving the security monitoring infrastructure and alerting systems.
Document findings, incidents, and resolutions, following internal procedures.
Assist in updating and maintaining security documentation, reports, and dashboards.
Stay updated on the latest cybersecurity threats, trends, and technologies.
Qualifications & Skills:
Currently pursuing or recently graduated with a degree in Computer Science, Information Security, Cybersecurity, or a related field.
Basic understanding of networking concepts (TCP/IP, DNS, HTTP, etc.) and common network protocols.
Familiarity with security technologies such as firewalls, antivirus, SIEM, and IDS/IPS tools.
Knowledge of common cybersecurity threats and attack vectors (e.g., phishing, malware, DDoS).
Basic understanding of incident response, risk management, and vulnerability assessment.
Strong problem-solving and analytical skills with attention to detail.
Ability to work under pressure in a fast-paced, dynamic environment.
Excellent communication and teamwork skills.
Willingness to learn and grow in the field of cybersecurity.
Is this job a match or a miss?
Associate - L1 SOC Analyst
Posted 16 days ago
Job Viewed
Job Description
In the Digital Trust & Cybersecurity team, our work is always evolving to help our clients respond to cybersecurity related threats and trends, and we combine our deep technical skills in response to our clients' changing cybersecurity needs. The Level 1 SOC Analyst is responsible for monitoring and analyzing an organization’s security posture on an ongoing basis. This role involves working in a 24/7 environment to detect, respond to, and mitigate security incidents. The L1 SOC Analyst will serve as the first line of defense in identifying potential threats and vulnerabilities within the organization’s network and systems. Responsibilities
Alert Triage & Investigation: Monitor for newly triggered alerts; look for alerts not yet marked as Open or Closed; collect more information to support the theory of the alerts under assessment; correlate alerts with other security devices; investigate the impact of the alerts. Shift Handover: Ensure that shift handovers are conducted clearly and concisely, including participating in the handover process, conducting the handover, preparing a shift handover report, and communicating information to the next shift personnel. Logger & SIEM Monitoring: Monitor and investigate if logs stop flowing to SIEM; reach out to the server owner, generate a list, work through the list, and report resolved items and methods used. Includes Linux (Syslogs) and Windows (permission, user status, password expiry). Jira Tickets: Attend to tickets sent to the client, respond to inquiries, or forward the ticket to the respective group/team. Incident Reporting: Detect and report tickets with log parser issues or false alarms to Infra/SIEM Engineer; review and analyze alerts generated by security tools and systems; escalate potential security incidents to higher-level analysts (L2 or L3) based on predefined criteria. Collaboration: Work as part of a problem-solving team to address complex security issues from strategy to execution. Qualifications
Graduates with a degree in Cybersecurity, Network Security or an equivalent field. 1–2 years of experience in Cybersecurity, SOC or surveillance. Proficiency in English, Malay; Mandarin is a must; proficiency in Cantonese is an added advantage. Familiarity with Linux and Windows is desirable, though not strictly necessary. Key Skills
Analytical thinking, alert triage, investigation, and incident response. Security monitoring, SIEM, login and log analysis. Communication, teamwork, and ability to work in a 24/7 environment.
#J-18808-Ljbffr
Is this job a match or a miss?
Security Operations Center Lead
Posted 4 days ago
Job Viewed
Job Description
32567
**Security Operations Center Lead**
Regular
Lisbon, Portugal ( Bollate, Italy Barcelona, Spain ( Bangkok, Thailand Oldbury, United Kingdom of Great Britain and Northern Ireland ( Kingdom of Great Britain and Northern Ireland) Prague, Czechia Warsaw, Poland ( Bucharest, Romania Seremban, Malaysia ( My candidate profile
Syensqo is all about chemistry. We're not just referring to chemical reactions here, but also to the magic that occurs when the brightest minds get to work together. This is where our true strength lies. In you. In your future colleagues and in all your differences. And of course, in your ideas to improve lives while preserving our planet's beauty for the generations to come.
**We are looking for:**
+ Security Operations Center Lead
**We count on you for:**
+ Strategic Product Leadership:
+ Develop and implement the overall SOC & VOC strategy, aligning them with the organization's security needs and business service goals.
+ Create a strategic products roadmap, prioritizing initiatives based on their potential impact on security operations efficiency and security posture improvement.
+ Strategic planning:
+ Develop and implement security policies, standard operating procedures and incident response plans
+ Provide expertise in designing, implement and maintaining security measures for organization
+ Maintain a constant technological and threats watch to adapt to changes in security threats and technologies
+ Cross functional team collaboration:
+ Collaborate with cross functional teams to integrate and remediate security threats and vulnerabilities
+ Product Performance Monitoring:
+ Define and report key performance indicators (KPIs) for SOC & VOC services, monitoring their success in enhancing security operations
+ Use data analytics to generate insights into product usage, effectiveness, and areas for improvement.
+ Risk Management and Regulatory Compliance:
+ Ensure all implementation comply with relevant cybersecurity regulations and standards
+ Implement risk management strategies to mitigate potential security vulnerabilities within products.
**You can count on us for:**
+ Be part of and contribute to a once-in-a-lifetime change journey
+ Join a dynamic team that is going to tackle big bets
+ Have fun and work at a high pace
**You will bring:**
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
+ Minimum of 8-10 years of experience in a similar role preferably in a multinational complex setting.
+ Experience with SIEM solutions such as Splunk, Sentinel, Chronicle
+ Experience with EDR solutions such as Crowdstrike, Sentinel, Microsoft Defender
+ Experience with SOAR solutions implementation
+ Proven track record of successfully designing and implementing Identity and Access management strategies for large user bases.
+ Experience in managing complex technology migrations and lifecycle management.
+ Project management skills to plan and execute cloud Identity-related projects, ensuring they are delivered on time and within budget
+ Certifications related to product management, cybersecurity (e.g., CISSP, CISM)
+ Agile or other project management methodologies experience is a plus
+ Fluent in English
+ Result orientation, influence & impact
+ Empowerment & accountability
+ Team spirit, building relationships, collective accountability
+ Strong leadership capability, executing as appropriate in the areas of responsibility
+ Excellent oral and written communication skills, including the ability to explain technology solutions in business terms, establish rapport and persuade others
**You will get:**
+ Competitive salary and benefits package
+ 16, or more, weeks of maternity/paternity and co-parenting leave, according to local regulations
+ Training platform for all employees
+ Free language courses (24 languages available)
+ Free well-being sessions (physical and psychological)
**Additional information:**
+ Smart working flexibility
+ Subbmit your application in English
About us
+ Syensqo is a science company developing groundbreaking solutions that enhance the way we live, work, travel and play. Inspired by the scientific councils which Ernest Solvay initiated in 1911, we bring great minds together to push the limits of science and innovation for the benefit of our customers, with a diverse, global team of more than 13,000 associates. Our solutions contribute to safer, cleaner, and more sustainable products found in homes, food and consumer goods, planes, cars, batteries, smart devices and health care applications. Our innovation power enables us to deliver on the ambition of a circular economy and explore breakthrough technologies that advance humanity.
+ At Syensqo, we seek to promote unity and not uniformity. We value the diversity that individuals bring and we invite you to consider a future with us, regardless of background, age, gender, national origin, ethnicity, religion, sexual orientation, ability or identity. We encourage individuals who may require any assistance or accommodations to let us know to ensure a seamless application experience. We are here to support you throughout the application journey and want to ensure all candidates are treated equally. If you are unsure whether you meet all the criteria or qualifications listed in the job description, we still encourage you to apply.
+ As you may already know, Syensqo is the newly established standalone company resulting from the recent spin-off of Solvay. While both organizations are in the process of finalizing the transition, some email communications related to your recruitment process may continue to come from Solvay.
#LI-FM1
#LI-Hybrid
#senior
Is this job a match or a miss?
Manager, Security Operations Center
Posted 1 day ago
Job Viewed
Job Description
Lead Security Threat Monitoring and Response (STMR) tower and is the main liaison for all platforms within Next Generation Security Operations Center (NGSOC) Department.
Lead and work closely with designated Manage Security Service Provider (MSSP) to handle, operate, troubleshoot and maintain availability of STMR Management platforms and all assets in all security platforms managed and owned by Great Eastern.
Monitor, review and respond to security alerts escalated from NGSOC; and manage cyber incidents associated to threats, intrusions, compromise, and unusual, unauthorized or illegal activity via CSIRT framework.
Create and fine‑tune the policies and rules within each of the STMR Management security platforms, and other log sources to correlate events and improve detection capability.
Assist in recommending, planning and implementing security measures or enhancement to protect computer systems, networks and data.
Work closely with Risk and Compliance during various audits and CSIRT team during IT security incidents and crisis situations.
Takes accountability in considering business and regulatory compliance risks and takes appropriate steps to mitigate the risks.
Maintains awareness of industry trends on regulatory compliance, emerging threats and technologies in order to understand the risk and better safeguard the company.
Highlights any potential concerns /risks and proactively shares best risk management practices.
We are looking for people who
Possess at least a diploma/ degree/ professional degree/ master’s degree in Computer Science/Information Technology/ Engineering or equivalent.
At least 5 years of working experience in related field.
Intermediate knowledge and skills in handling security systems such as SIEM, SOAR and knowledge on other security product is an added value.
Intermediate experience in handling cyber security alerts and incidents.
Strong analytical and problem‑solving skills.
Good knowledge of Incident Response and Investigative methodology.
Self‑motivated and a team player.
Information Security Certification involving incident response, ethical hacking, or cyber security (i.e., GCIA,GCIH, CISSP, CEH etc) will be an added advantage.
High level of integrity, takes accountability of work and good attitude over teamwork.
Takes initiative to improve current state of things and adaptable to embrace new changes.
How you succeed
Champion and embody our Core Values in everyday tasks and interactions.
Demonstrate high level of integrity and accountability.
Take initiative to drive improvements and embrace change.
Take accountability of business and regulatory compliance risks, implementing measures to mitigate them effectively.
Keep abreast with industry trends, regulatory compliance, and emerging threats and technologies to understand and highlight potential concerns/ risks to safeguard our company proactively.
Who we are Founded in 1908, Great Eastern is a well‑established market leader and trusted brand in Singapore and Malaysia. With over S$100 billion in assets and more than 16 million policyholders, including 12.5 million from government schemes, it provides insurance solutions to customers through three successful distribution channels – a tied agency force, bancassurance, and financial advisory firm Great Eastern Financial Advisers. The Group also operates in Indonesia and Brunei.
The Great Eastern Life Assurance Company Limited and Great Eastern General Insurance Limited have been assigned the financial strength and counterparty credit ratings of "AA-" by S&P Global Ratings since 2010, one of the highest among Asian life insurance companies. Great Eastern’s asset management subsidiary, Lion Global Investors Limited, is one of the leading asset management companies in Southeast Asia.
Great Eastern is a subsidiary of OCBC, the longest established Singapore bank, formed in 1932. It is the second largest financial services group in Southeast Asia by assets and one of the world’s most highly‑rated banks, with an Aa1 rating from Moody’s and AA- by both Fitch and S&P. Recognised for its financial strength and stability, OCBC is consistently ranked among the World’s Top 50 Safest Banks by Global Finance and has been named Best Managed Bank in Singapore by The Asian Banker.
To all recruitment agencies: Great Eastern does not accept unsolicited agency resumes. Please do not forward resumes to our email or our employees. We will not be responsible for any fees related to unsolicited resumes.
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
#J-18808-Ljbffr
Is this job a match or a miss?
Security Operations Center Analyst
Posted 2 days ago
Job Viewed
Job Description
Position: SOC & Incident Manager
Key Responsibilities
Handles day‑day security operations during business hours and leverages the GSOC team for 24/7 internal monitoring and the MSSP team for perimeter monitoring.
Prepares information needed for monthly SOC/incident monitoring reports.
Develops and maintains a procedural set of responses for cyber security problems, including creating new playbooks as threats emerge.
Closely monitors security tools (IPS, SIEM, VA scan, DLP, AV, ATP, XDR) for threat alerts and attends to them timely.
Manages MSSP monitoring and incident response.
Identifies security flaws and vulnerabilities and communicates them effectively within the organization.
Collates and provides evidence/submission requested by various parties (risk management, auditor, regulator) to confirm that security policies, processes, guidelines and controls are followed/implemented accordingly.
Requirements
A Bachelor’s Degree in Computer Science, Engineering, Information Systems or equivalent.
Minimum 2–4 years of related working experience; knowledge of IT security is essential.
Highly results‑oriented and able to work independently; a self‑reliant team player comfortable managing multiple tasks and responsibilities.
Good analytical, technical, written and verbal communication skills.
Ability to exercise discretion and independent judgment in applying established techniques, procedures or standards.
Familiar with security standards and best practices; regulatory requirements such as BNM RMIT, MAS, Paynet, PCI‑DSS; architecture and security of operating systems.
Contact Please share your résumé to
Seniority Level Mid‑Senior level
Employment Type Full‑time
Job Function Information Technology
Industries IT Services and IT Consulting, Banking, Computer and Network Security
Location Greater Kuala Lumpur
#J-18808-Ljbffr
Is this job a match or a miss?
Security Operations Center (SOC) Consultant
Posted 16 days ago
Job Viewed
Job Description
Location(s): BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. About Us: Our mission at BAE Systems Digital Intelligence is to collect, connect and understand complex data, so that our customers can unlock digital advantage in the most demanding environments. At our Malaysian Global Delivery Centre, we work with clients from around the world to deliver cyber technical services to support our customers in keeping their systems secure in today’s hostile digital world. We are seeking a highly skilled SOC Consultant to help our clients strengthen their security operations. The ideal candidate will bring hands-on expertise in Security Operations Center (SOC) environments, strong advisory skills, and proven experience in leveraging platforms such as Splunk and other leading security technologies. This role involves assessing client security postures, recommending improvements to detection and response capabilities, and guiding organisations to build resilient and mature SOC practices. This position is part of our global Cyber Technical Services team, which includes adjacent areas such as Threat Intelligence and penetration testing. While exact responsibilities will depend on project demands the below are some example areas: Engage with clients to assess their SOC maturity across technology, process, and people. Provide expert guidance on enhancing incident detection, response, and threat hunting capabilities. Recommend and help implement frameworks (e.g., MITRE ATT&CK, NIST CSF, ISO 27001) into SOC operations. Design, configure, and optimise SIEM solutions (Splunk required; others such as QRadar, Elastic, or Sentinel are advantageous). Support integration of threat intelligence platforms, SOAR tools, EDR/XDR solutions, and log management systems. Develop advanced detection rules, dashboards, and use cases to improve visibility and response. Define and improve SOC processes (incident response, threat hunting, escalation workflows). Conduct gap analyses and propose roadmaps for SOC capability maturity. Deliver workshops, training sessions, and knowledge-sharing to client SOC teams. Candidate Expectations
4–7+ years of experience in cybersecurity, with at least 3 years in SOC operations or consulting. Experience with SIEM tools (Examples: Splunk, QRadar, Elastic, Azure Sentinel, etc.). Familiarity with SOAR platforms (Splunk SOAR, Palo Alto Cortex XSOAR, ServiceNow Security Operations). Understanding of network security, firewalls, IDS/IPS, and endpoint security. Knowledge of AI technologies and their applications for the security field an advantage. Experience with incident response frameworks and threat hunting methodologies. Passion for cybersecurity, continuous learning, and thought leadership. What We Offer
You’ll have a dedicated line Manager to help you develop your career and guide you on your journey through BAE Systems Digital Intelligence We will support your personal training and development in the areas of cybersecurity by sponsoring training courses and certification exams Work-life balance is important; you’ll get 18 days holiday a year (increases to 21 after 5 years’ service) We support hybrid working and give flexibility for team leads to decide on the balance between remote and office-based working Our benefits package includes private family medical cover, maternity (4 months), paternity (2 weeks), study leave & a Optical/Dental/Health screening allowance You’ll be part of our annual bonus and share award scheme Why BAE Systems?
This is a place where you’ll be able to make a real difference. You’ll be part of an inclusive culture that values diversity of thought, rewards integrity, and merit, and where you’ll be empowered to fulfil your potential. We welcome people from all backgrounds and want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments. Please be aware that many roles at BAE Systems are subject to both security and export control restrictions. These restrictions mean that factors such as your nationality, any nationalities you may have previously held, and your place of birth can restrict the roles you are eligible to perform within the organisation.
#J-18808-Ljbffr
Is this job a match or a miss?
Be The First To Know
About the latest Soc analyst Jobs in Malaysia !
Security Operations Center (SOC) Consultant
Posted 16 days ago
Job Viewed
Job Description
Security Operations Center (SOC) Consultant role at BAE Systems Digital Intelligence. This position is part of our global Cyber Technical Services team. The ideal candidate will bring hands-on expertise in Security Operations Center (SOC) environments, strong advisory skills, and proven experience in leveraging platforms such as Splunk and other leading security technologies. This role involves assessing client security postures, recommending improvements to detection and response capabilities, and guiding organisations to build resilient and mature SOC practices. This position is based in Kuala Lumpur, Malaysia, and may involve work across client environments as part of our Global Delivery Centre. BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Responsibilities
Engage with clients to assess their SOC maturity across technology, process, and people. Provide expert guidance on enhancing incident detection, response, and threat hunting capabilities. Recommend and help implement frameworks (e.g., MITRE ATT&CK, NIST CSF, ISO 27001) into SOC operations. Design, configure, and optimise SIEM solutions (Splunk required; others such as QRadar, Elastic, or Sentinel are advantageous). Support integration of threat intelligence platforms, SOAR tools, EDR/XDR solutions, and log management systems. Develop advanced detection rules, dashboards, and use cases to improve visibility and response. Define and improve SOC processes (incident response, threat hunting, escalation workflows). Conduct gap analyses and propose roadmaps for SOC capability maturity. Deliver workshops, training sessions, and knowledge-sharing to client SOC teams. Candidate Qualifications
4–7+ years of experience in cybersecurity, with at least 3 years in SOC operations or consulting. Experience with SIEM tools (examples: Splunk, QRadar, Elastic, Azure Sentinel, etc.). Familiarity with SOAR platforms (Splunk SOAR, Palo Alto Cortex XSOAR, ServiceNow Security Operations). Understanding of network security, firewalls, IDS/IPS, and endpoint security. Knowledge of AI technologies and their applications for the security field is an advantage. Experience with incident response frameworks and threat hunting methodologies. Passion for cybersecurity, continuous learning, and thought leadership. What We Offer
You’ll have a dedicated line Manager to help you develop your career and guide you on your journey through BAE Systems Digital Intelligence Support for personal training and development in cybersecurity through sponsored courses and certifications Hybrid working with flexibility; 18 days holiday a year (increases to 21 after 5 years’ service) Benefits package includes private family medical cover, maternity (4 months), paternity (2 weeks), study leave, and health screening allowances Annual bonus and share award scheme Why BAE Systems?
This is a place where you’ll be able to make a real difference. We value diversity of thought, integrity, and merit, and we empower you to fulfil your potential. If you have a disability or health condition that may affect your performance in certain assessment types, please speak to your recruiter about reasonable adjustments. Please be aware that many roles are subject to security and export control restrictions which may affect your eligibility.
#J-18808-Ljbffr
Is this job a match or a miss?
Security Operations Center (SOC) Consultant
Posted 16 days ago
Job Viewed
Job Description
BAE Systems Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia Location:
Kuala Lumpur, Malaysia BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. At our Malaysian Global Delivery Centre, we deliver cyber technical services to help keep clients’ systems secure in today’s hostile digital world. We are seeking a highly skilled SOC Consultant to strengthen clients' security operations. The role requires hands-on expertise in Security Operations Center environments, advisory skills, and experience with platforms such as Splunk and other leading security technologies. You will assess client security postures, recommend improvements to detection and response, and guide organisations to build mature SOC practices. This position is part of our global Cyber Technical Services team, including Threat Intelligence and penetration testing. Responsibilities may vary by project. Responsibilities Engage with clients to assess SOC maturity across technology, process, and people. Provide expert guidance on enhancing incident detection, response, and threat hunting capabilities. Recommend and help implement frameworks (e.g., MITRE ATT&CK, NIST CSF, ISO 27001) into SOC operations. Design, configure, and optimize SIEM solutions (Splunk required; experience with QRadar, Elastic, or Sentinel is advantageous). Support integration of threat intelligence platforms, SOAR tools, EDR/XDR solutions, and log management systems. Develop advanced detection rules, dashboards, and use cases to improve visibility and response. Define and improve SOC processes (incident response, threat hunting, escalation workflows). Conduct gap analyses and propose roadmaps for SOC capability maturity. Deliver workshops, training sessions, and knowledge-sharing to client SOC teams. Candidate Expectations 4–7+ years of experience in cybersecurity, with at least 3 years in SOC operations or consulting. Experience with SIEM tools (Splunk, QRadar, Elastic, Azure Sentinel, or equivalent). Familiarity with SOAR platforms (Splunk SOAR, Palo Alto Cortex XSOAR, ServiceNow Security Operations). Understanding of network security, firewalls, IDS/IPS, and endpoint security. Knowledge of AI technologies and their applications for security is advantageous. Experience with incident response frameworks and threat hunting methodologies. Passion for cybersecurity, continuous learning, and thought leadership. What We Offer A dedicated line manager to help develop your career and guide you at BAE Systems Digital Intelligence. Support for personal cybersecurity training and certification exams. Work-life balance with 18 days of holiday per year (increases to 21 after 5 years’ service). Hybrid working with flexibility for team leads to balance remote and office-based work. Benefits package includes private family medical cover, maternity (4 months), paternity (2 weeks), study leave, and health screening allowances. Annual bonus and share award scheme participation. Why BAE Systems? This is a place to make a real difference within an inclusive culture that values diversity, integrity, and merit. We encourage applications from all backgrounds and can provide reasonable adjustments for prospective employees with disabilities or health conditions during assessments. Note: Some roles at BAE Systems are subject to security and export control restrictions, which may affect eligibility based on nationality, previous nationalities, or place of birth.
#J-18808-Ljbffr
Is this job a match or a miss?
Senior Cybersecurity Analyst (SOC)
Posted 13 days ago
Job Viewed
Job Description
THE ROLE As a Senior Cybersecurity Analyst (SOC) in our Security Operations Centre, you will drive high‑level incident management, process improvement and mentoring of junior analysts while leading escalation and delivering advanced threat detection for managed detection and response services across the APAC region.
Delivery
Contribute to day‑to‑day SOC monitoring, detection and response for client estates.
Continuously monitor and analyse security alerts from EDR, SIEM and other tools to detect suspicious activities.
Investigate and respond to incidents, executing containment, mitigation and remediation steps.
Tune detection rules, automate workflows and improve incident detection accuracy.
Perform in‑depth log analysis from firewalls, endpoint protection platforms and other solutions.
Document incidents, including timelines, analysis, mitigation steps and lessons learned, and deliver regular reports to stakeholders.
Act as second‑line escalation and support on‑shift SOC analysts in our 24x7 team.
Support onboarding and service request activity for our regional MDR clients.
Proactively hunt for IoCs and advanced threats within the environment using both automated tools and manual analysis.
Stay up to date on the latest cyber threats, vulnerabilities and attack techniques, and integrate threat intelligence into detection and response efforts.
Provide guidance and mentorship to junior SOC analysts, fostering skill development and ensuring adherence to security best practices.
Growth of the service
Collaborate with the SOC team to develop and implement SOC strategies, improve processes and introduce new technologies to strengthen our clients’ security posture.
Collaborate with SOC analysts, security engineers and IT teams to ensure seamless operation of security tools and alignment with broader cybersecurity practices.
Identify areas for improvement in security monitoring and response capabilities, proposing and assisting with implementing new solutions where appropriate.
Assist with onboarding and configuring SOC services and technology for new customers as the MDR service grows quickly.
Work closely with other cyber security service lines to ensure seamless integration of SOC operations with our broader cybersecurity initiatives and business units, especially Incident Response.
Participate in and contribute to internal technical development initiatives when schedules allow, enhancing our tools, processes and overall incident response capabilities.
WHAT WE'RE LOOKING FOR
A Bachelor’s or Master’s degree in cybersecurity, computer science or a related field; relevant certifications (Blue Team, CISSP, Security+) are advantageous.
3+ years of experience in a SOC or cybersecurity operations role with demonstrated team leadership and supervisory experience.
Strong understanding of EDR and SecOps toolsets, with experience configuring and leveraging these tools for incident detection and response.
Experience mentoring junior SOC analysts, with good communication and team‑building skills.
Customer‑mindful and able to discuss cybersecurity issues in client‑friendly language.
An investigative mindset; comfortable solving problems with limited information and curious to learn.
Dependable and reliable, as customers depend on us to manage their security and provide cyber‑resilience.
Demonstrable knowledge of cyber threat actors, tactics, techniques and interest in cybersecurity matters, security monitoring and threat detection techniques.
Clear and concise communication skills, able to work effectively across teams and communicate technical findings for non‑technical audiences.
Location: Hong Kong, Singapore or Malaysia (per start of employment).
To apply, please submit an up‑to‑date CV through Job Application for Senior Cybersecurity Analyst (SOC) at S‑RM.
#J-18808-Ljbffr
Is this job a match or a miss?