53 Soc Engineer jobs in Malaysia
SOC Engineer
Posted 12 days ago
Job Viewed
Job Description
Hytech Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
Hytech Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
As a SOC Engineer, you will be responsible for designing, implementing, and managing security systems within
an organization's SOC. They play a crucial role in monitoring, analysing, and responding to security threats
while maintaining and improving security infrastructure.
Job Responsibilities:
- Implement and manage the security tools that are currently being used as required.
- Involved in POC for any new security products that will be used in the future.
- Write, review and enhance the cybersecurity SOP and playbook as required.
- Investigate on the alerts from different security technologies (SIEM, XDR, Anti-Malware, Email
- Security etc.) end-to-end, perform the root cause analysis, and mitigate the security threats.
- Analyze the emerging threat & provide actionable threat intelligence.
- Perform threat hunting periodically based on the latest threat intelligence.
- Create and review use case based on the latest threat intelligence.
Job Requirements:
- Minimum Diploma in Cybersecurity, Computer Science, Information Technology, or a related field.
- Passionate in Cybersecurity, interested in different aspects of technical expertise in Cybersecurity, which includes (but not limited to): Penetration Testing, Digital Forensic & Incident Response, Threat
- Willingness to solve the challenges in a practical/hands-on manner.
- Hands-on experience in different types of OS (Mainly Windows 10/11 and Linux); experienced in macOS will be a plus.
- High level of understanding on how different technologies work, such as Active Directory, Databases, EDR/XDR, Anti-Malware, Firewall, WAF, IDS/IPS, VPN etc.
- Keep up to date with the latest technologies, threats and vulnerabilities.
- Understand different types of logs, and able to analyze and correlate based on different types of logs.
Good to Have:
- Ability to perform automation when required, with any programming language such as PowerShell, Bash, Python, Java, Go.
- Hands-on experience in setting up a home lab and configuring different technologies, including but not limited to: SIEM (e.g.: OpenSearch, ElasticSearch, Wazuh, Splunk Free), Firewall (e.g.: pfSense), Active Directory, VPN, vulnerable VMs etc.
- Strong knowledge on different standards, guidelines and best practices, such as ISO 27001, NIST, PCI DSS, CIS Benchmark etc.
- Obtained Cybersecurity Certification, such as CompTIA, EC-Council, ISC2, ISACA, INE, OffSec etc.
- Experienced in multiple offering in AWS, such as EC2, GuardDuty, ALB, S3 etc. ◦ Maintain a personal blog on the review/introduction of certain technologies/skills/certifications
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Desktop Computing Software Products and IT System Custom Software Development
Referrals increase your chances of interviewing at Hytech by 2x
Get notified about new Engineer jobs in Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia .
Kota Damansara, Selangor, Malaysia 2 weeks ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Kota Damansara, Selangor, Malaysia 1 week ago
Kota Damansara, Selangor, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Petaling Jaya, Selangor, Malaysia 6 months ago
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Petaling Jaya, Selangor, Malaysia 2 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSOC Engineer
Posted 1 day ago
Job Viewed
Job Description
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Desktop Computing Software Products and IT System Custom Software Development Referrals increase your chances of interviewing at Hytech by 2x Get notified about new Engineer jobs in
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia . Kota Damansara, Selangor, Malaysia 2 weeks ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Kota Damansara, Selangor, Malaysia 1 week ago Kota Damansara, Selangor, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Petaling Jaya, Selangor, Malaysia 6 months ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Petaling Jaya, Selangor, Malaysia 2 days ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
L2 Security Engineer (SOC)
Posted 7 days ago
Job Viewed
Job Description
Logicalis Federal Territory of Kuala Lumpur, Malaysia
L2 Security Analyst (SOC)Logicalis Federal Territory of Kuala Lumpur, Malaysia
Get AI-powered advice on this job and more exclusive features.
• Actively research and stay updated with latest and new cyberattacks, TTPs, threat attackers, vulnerabilities and based on it perform proactive threat hunting in customer environments.
• Understand customer environments to develop use cases based on industry, targeted attacks, vulnerabilities, attack vector, threat landscape, TTPs etc., for the scope of monitoring.
• Develop identification and documentation of Indicators of Compromise (IOCs).
• Ability to perform malware reverse engineering on the detected malware file to investigate and identify its potential entry points.
• Perform forensic analysis and investigations leveraging SOC solutions and provide evidence in case of breaches.
• Handle security incidents tickets escalated by Level II team, and draft security incident report covering the root cause, forensic evidence, and recommended mitigation plans.
• Strong understanding of MITRE ATT&CK framework, and ability to operationalize it for day-day SecOps activities, to develop tactics, techniques, procedures (TTPs) for security analysis and threat hunting.
• Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers.
• Identify gaps in existing SOC process and work with team members or other departments to create, modify standard operating procedures, to automate any mundane daily operational activities, ensuring Ops are run efficiently.
• Enable regional security analysts to deliver seamless support locally by developing SOC playbooks, relevant and sufficient Knowledge base.
• Lead regional security analysts in handling incidents, customer escalations and requests, SLA (Service Level Agreement) requirements.
Required Qualifications: - Essential
• Candidate should have at least 5 years of working experience in SOC and MSS environments,
• Bachelor's degree in computer engineering, Computer Science, Cyber Security, Information Security, or other equivalents.
• Experience in malware analysis for Windows and Linux/Mac.
• Excellent hands-on experience in implementations, incident analysis of IBM QRadar, Azure Sentinel SIEM (Security Information and Event Management) technologies.
• Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if CrowdStrike, Microsoft Defender.
• Hands on experience on SOAR (Security Orchestration, Automation, and Response) technologies.
• Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
• Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with proven Unix (Solaris, Linux, BSD (Bumi Serpong Damai)) experience.
• Knowledge of any shell scripting language and applying it to automate mundane operations tasks.
• Candidate should have at least one SANS certification. Preferred if that is GCIH
• Good understanding of basic network concepts and advantages of exposure to cloud technologies.
• Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL (Information Technology Infrastructure Library) standards
• Excellent English communication skills (verbal and written) combined with professional telephone manner.
• Advantage if have hands on experience in performing vulnerability assessments and presenting to customer business teams
• Experience in penetration testing and report drafting
• Experience in Forensics and Incident Response
• Lead team of security analysts, develop SOC standard operating procedures and develop Threat Intel feeds.
• Having experience in security standards viz., ISO 27001:2013, NIST (National Institute of Standards and Technology), CIS etc.
As part of any recruitment process, we collect and processes personal data relating to job applicants. We are committed to being transparent about how we collect and use that data and to meeting our data protection obligations. By applying to this post and sending us your resume, you agree to the collection, use and/or disclosure of your personal data in the manner as set out in our Data Protection Notice for Job Applicants which can be found
Logicalis is committed to protecting your privacy.
Click below to view the data protection notice.
Posting code : #LI-JC1
Seniority level- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Logicalis by 2x
Get notified about new Security Analyst jobs in Federal Territory of Kuala Lumpur, Malaysia .
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Information Security Operations Team LeadKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 months ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 hours ago
GRC (Governance, Risk and Compliance) AnalystFederal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Manager Information Security Governance, Risk & ComplianceFederal Territory of Kuala Lumpur, Malaysia 1 week ago
Senior Technical Business Analyst (Cyber Security Services)WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 hours ago
T&T Analyst - Artificial Intelligence & Data (AI PCOE) - MYKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago
Client Manager - Information Security Management System (Auditor)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
(Senior) Cyber Security Consultant & Penetration TesterWP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 months ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Cyber Security Manager & Consultant (Offensive Security) - MalaysiaKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago
(TRC) Manager - Cyber Response (Petaling Jaya)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 5 hours ago
Team Lead, Security Analyst (SOC) I IT Security, Group Technology & DigitalWP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 months ago
Federal Territory of Kuala Lumpur, Malaysia 4 weeks ago
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Security Operations Center Analyst (SOC Analyst)WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Internship - Network & Information Security EngineerKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 months ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 7 months ago
Information Security Lead - (Risk, NIST, ISO)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 17 hours ago
Federal Territory of Kuala Lumpur, Malaysia 5 hours ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 days ago
Application Security Engineer (Pentester)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 months ago
Federal Territory of Kuala Lumpur, Malaysia 1 day ago
Federal Territory of Kuala Lumpur, Malaysia 5 hours ago
Information Security Specialist - Supply Chain SecurityKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Security Operations Centre Analyst (Night Shift)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrL2 Security Engineer (SOC)
Posted 1 day ago
Job Viewed
Job Description
Logicalis Federal Territory of Kuala Lumpur, Malaysia Get AI-powered advice on this job and more exclusive features. • Actively research and stay updated with latest and new cyberattacks, TTPs, threat attackers, vulnerabilities and based on it perform proactive threat hunting in customer environments. • Understand customer environments to develop use cases based on industry, targeted attacks, vulnerabilities, attack vector, threat landscape, TTPs etc., for the scope of monitoring. • Develop identification and documentation of Indicators of Compromise (IOCs). • Ability to perform malware reverse engineering on the detected malware file to investigate and identify its potential entry points. • Perform forensic analysis and investigations leveraging SOC solutions and provide evidence in case of breaches. • Handle security incidents tickets escalated by Level II team, and draft security incident report covering the root cause, forensic evidence, and recommended mitigation plans. • Strong understanding of MITRE ATT&CK framework, and ability to operationalize it for day-day SecOps activities, to develop tactics, techniques, procedures (TTPs) for security analysis and threat hunting. • Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers. • Identify gaps in existing SOC process and work with team members or other departments to create, modify standard operating procedures, to automate any mundane daily operational activities, ensuring Ops are run efficiently. • Enable regional security analysts to deliver seamless support locally by developing SOC playbooks, relevant and sufficient Knowledge base. • Lead regional security analysts in handling incidents, customer escalations and requests, SLA (Service Level Agreement) requirements. Required Qualifications: - Essential • Candidate should have at least 5 years of working experience in SOC and MSS environments, • Bachelor's degree in computer engineering, Computer Science, Cyber Security, Information Security, or other equivalents. • Experience in malware analysis for Windows and Linux/Mac. • Excellent hands-on experience in implementations, incident analysis of IBM QRadar, Azure Sentinel SIEM (Security Information and Event Management) technologies. • Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if CrowdStrike, Microsoft Defender. • Hands on experience on SOAR (Security Orchestration, Automation, and Response) technologies. • Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet. • Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with proven Unix (Solaris, Linux, BSD (Bumi Serpong Damai)) experience. • Knowledge of any shell scripting language and applying it to automate mundane operations tasks. • Candidate should have at least one SANS certification. Preferred if that is GCIH • Good understanding of basic network concepts and advantages of exposure to cloud technologies. • Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL (Information Technology Infrastructure Library) standards • Excellent English communication skills (verbal and written) combined with professional telephone manner. • Advantage if have hands on experience in performing vulnerability assessments and presenting to customer business teams • Experience in penetration testing and report drafting • Experience in Forensics and Incident Response • Lead team of security analysts, develop SOC standard operating procedures and develop Threat Intel feeds. • Having experience in security standards viz., ISO 27001:2013, NIST (National Institute of Standards and Technology), CIS etc. As part of any recruitment process, we collect and processes personal data relating to job applicants. We are committed to being transparent about how we collect and use that data and to meeting our data protection obligations. By applying to this post and sending us your resume, you agree to the collection, use and/or disclosure of your personal data in the manner as set out in our Data Protection Notice for Job Applicants which can be found Logicalis is committed to protecting your privacy. Click below to view the data protection notice. Posting code : #LI-JC1 Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at Logicalis by 2x Get notified about new Security Analyst jobs in
Federal Territory of Kuala Lumpur, Malaysia . Federal Territory of Kuala Lumpur, Malaysia 1 week ago Information Security Operations Team Lead
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 months ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 hours ago GRC (Governance, Risk and Compliance) Analyst
Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Manager Information Security Governance, Risk & Compliance
Federal Territory of Kuala Lumpur, Malaysia 1 week ago Senior Technical Business Analyst (Cyber Security Services)
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 hours ago T&T Analyst - Artificial Intelligence & Data (AI PCOE) - MY
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago Client Manager - Information Security Management System (Auditor)
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago (Senior) Cyber Security Consultant & Penetration Tester
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 months ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Cyber Security Manager & Consultant (Offensive Security) - Malaysia
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago (TRC) Manager - Cyber Response (Petaling Jaya)
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 5 hours ago Team Lead, Security Analyst (SOC) I IT Security, Group Technology & Digital
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 months ago Federal Territory of Kuala Lumpur, Malaysia 4 weeks ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Security Operations Center Analyst (SOC Analyst)
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Internship - Network & Information Security Engineer
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 months ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 7 months ago Information Security Lead - (Risk, NIST, ISO)
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 17 hours ago Federal Territory of Kuala Lumpur, Malaysia 5 hours ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 days ago Application Security Engineer (Pentester)
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 months ago Federal Territory of Kuala Lumpur, Malaysia 1 day ago Federal Territory of Kuala Lumpur, Malaysia 5 hours ago Information Security Specialist - Supply Chain Security
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Security Operations Centre Analyst (Night Shift)
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Incident Response Analyst
Posted 12 days ago
Job Viewed
Job Description
Please note that we will never request payment or bank account information at any stage of the recruitment process. As we continue to grow our teams, we urge you to be cautious of fraudulent job postings or recruitment activities that misuse our company name and information. Please protect your personal information during any recruitment process. While Monks may contact potential candidates via LinkedIn, all applications must be submitted through our official website (monks.com/careers ).
We are looking for an Incident Response Analyst who is able to analyze security events and investigate potential incidents, validate and manage high priority incidents while providing comprehensive written root-cause analysis to security teams & stakeholders, utilize tooling to contain & minimize overall impact while escalating unresolved incidents to security engineering teams, maintain & continuously update incident response plans and runbooks for more efficient incident response.
This person will be responsible for monitoring security alerts and events in order to identify & remediate security incidents across various on-prem and cloud based solutions. We are looking for someone who is passionate about what they do, and not afraid to speak up or make suggestions.
Key accountabilities:
- Develop operational procedures to implement and continually improve the incident response process.
- Monitor security alerts within the tech stack, and investigate any potential security incidents.
- Analyze the alerts received to classify and assess the impact, managing high priority incidents, including communication to the business, facilitating root cause analysis and resolution.
- Perform cyber security investigations as part of the incident analysis.
- Coordinate with other departments the remediation tasks to be performed and escalate unresolved incidents.
- Perform post-mortem analysis to identify root causes and design controls or measures to prevent future incidents.
- Write comprehensive investigation reports capturing investigation details and root cause analysis aligned knowledge of modern Tactics, Techniques, and Procedures (TTPs).
- Collaborate with content production for security awareness.
Minimum Qualifications:
- 3+ years of experience in similar roles
- Working ITIL knowledge and experience or similar
- Functional knowledge of the MITRE ATT&CK framework
- Experience with log analysis, malware analysis, and/or forensic analysis
- Hands-on experience with industry leading security tools: EDR, SWG, SIEM, MDM
Qualities:
- Good communication
- Ability to confidently present findings to those with either a technical or non-technical background.
- Self-directed, resourceful, and a critical thinker with attention-to-detail and proactive problem-solving skills.
- Ability to self-organize and plan activities with commitment towards results.
- Ready to learn new contents both from others or self-learned.
- Passionate about self-improvement and suggesting improvements to processes or activities.
Preferred Qualifications:
- Cloud experience (AWS, Azure, GCP) in a production environment
- Experience in Blue/Red/Purple team engagements
#LI-WT1
About Monks
Monks is the global, purely digital, unitary operating brand of S4Capital plc. With a legacy of innovation and specialized expertise, Monks combines an extraordinary range of global marketing and technology services to accelerate business possibilities and redefine how brands and businesses interact with the world. Its integration of systems and workflows delivers unfettered content production, scaled experiences, enterprise-grade technology and data science fueled by AI—managed by the industry’s best and most diverse digital talent—to help the world’s trailblazing companies outmaneuver and outpace their competition.
Monks was named a Contender in The Forrester Wave: Global Marketing Services. It has remained a constant presence on Adweek’s Fastest Growing lists (2019-23), ranks among Cannes Lions' Top 10 Creative Companies (2022-23) and is the only partner to have been placed in AdExchanger’s Programmatic Power Players list every year (2020-24). In addition to being named Adweek’s first AI Agency of the Year (2023), Monks has been recognized by Business Intelligence in its 2024 Excellence in Artificial Intelligence Awards program in three categories: the Individual category, Organizational Winner in AI Strategic Planning and AI Product for its service Monks.Flow. Monks has also garnered the title of Webby Production Company of the Year (2021-24), won a record number of FWAs and has earned a spot on Newsweek’s Top 100 Global Most Loved Workplaces 2023.
We are an equal-opportunity employer committed to building a respectful and empowering work environment for all people to freely express themselves amongst colleagues who embrace diversity in all respects. Including fresh voices and unique points of view in all aspects of our business not only creates an environment where we can all grow and thrive but also increases our potential to produce work that better represents—and resonates with—the world around us.
Interested?Apply for this job!
First Name*
Last Name*
Email*
Country
Åland Islands (+358)
American Samoa (+1684)
Antigua and Barbuda (+1268)
Argentina (+54)
Aruba (+297)
Australia (+61)
Austria (+43)
Belize (+501)
Bermuda (+1441)
Bolivia, Plurinational State of bolivia (+591)
British Indian Ocean Territory (+246)
Bulgaria (+359)
Burkina Faso (+226)
Cambodia (+855)
Cameroon (+237)
Central African Republic (+236)
Chad (+235)
Chile (+56)
China (+86)
Christmas Island (+61)
Colombia (+57)
Congo, The Democratic Republic of the Congo (+243)
Cook Islands (+682)
Croatia (+385)
Cuba (+53)
Cyprus (+357)
Djibouti (+253)
Dominican Republic (+1849)
Egypt (+20)
Eritrea (+291)
Ethiopia (+251)
Falkland Islands (Malvinas) (+500)
Finland (+358)
France (+33)
French Polynesia (+689)
French Southern Territories (+262)
Gabon (+241)
Georgia (+995)
Germany (+49)
Greece (+30)
Greenland (+299)
Guadeloupe (+590)
Guam (+1671)
Guatemala (+502)
Guernsey (+44)
Heard Island and Mcdonald Islands (+672)
Holy See (Vatican City State) (+379)
Hong Kong (+852)
Iceland (+354)
India (+91)
Iran, Islamic Republic of Persian Gulf (+98)
Ireland (+353)
Isle of Man (+44)
Israel (+972)
Italy (+39)
Japan (+81)
Jersey (+44)
Jordan (+962)
Korea, Democratic People's Republic of Korea (+850)
Korea, Republic of South Korea (+82)
Lesotho (+266)
Malaysia (+60)
Mali (+223)
Marshall Islands (+692)
Micronesia, Federated States of Micronesia (+691)
Moldova (+373)
Namibia (+264)
Nauru (+674)
Nepal (+977)
Netherlands (+31)
New Zealand (+64)
Niue (+683)
Norfolk Island (+672)
Northern Mariana Islands (+1670)
Norway (+47)
Oman (+968)
Palestinian Territory, Occupied (+970)
Paraguay (+595)
Poland (+48)
Portugal (+351)
Russia (+7)
Reunion (+262)
Saba (+599)
Saint Barthelemy (+590)
Saint Helena, Ascension and Tristan Da Cunha (+290)
Saint Kitts and Nevis (+1869)
Saint Martin (+590)
Saint Pierre and Miquelon (+508)
Saint Vincent and the Grenadines (+1784)
Sao Tome and Principe (+239)
Solomon Islands (+677)
Somalia (+252)
South Sudan (+211)
South Georgia and the South Sandwich Islands (+500)
Spain (+34)
Sri Lanka (+94)
Sudan (+249)
Svalbard and Jan Mayen (+47)
Swaziland (+268)
Syrian Arab Republic (+963)
Tanzania, United Republic of Tanzania (+255)
Thailand (+66)
Tunisia (+216)
Turkey (+90)
Turks and Caicos Islands (+1649)
Ukraine (+380)
United Arab Emirates (+971)
United Kingdom (+44)
United States (+1)
Uruguay (+598)
Vanuatu (+678)
Vietnam (+84)
Virgin Islands, British (+1284)
Virgin Islands, U.S. (+1340)
Wallis and Futuna (+681)
Yemen (+967)
Phone*
LinkedIn Profile*
What is your notice period?*
Would you require a work visa sponsorship?(Indicate 'Yes' if you are already on one)* Yes No
What is your expected annual salary range?(Kindly indicate local currency)*
Uploads
Resume / CV*
Supported Files: pdf, doc, docx, txt and rtf
You can paste in the contents here 0
Male
Female
Nonbinary
Decline to self identify
I don't wish to answer
Monks does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
At Monks, we are committed to protecting your personal information. As part of our recruitment process, we collect and process personal data to evaluate your application and communicate with you. To understand how we handle your information, including the types of data we collect, how we use it, and your rights, please read our Monks Candidate Privacy Notice . We encourage you to review this notice to ensure you are fully informed about how your data will be managed during your application process.
Thank you!We have received your application. We will be in touch via email.
#J-18808-LjbffrIncident Response Analyst
Posted 12 days ago
Job Viewed
Job Description
Monks Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
Monks Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
Direct message the job poster from Monks
Global Talent Acquisition Leader | Talent Management and Candidate Attraction Specialist | Recruitment and Sourcing Strategy | Recruitment Process…Please note that we will never request payment or bank account information at any stage of the recruitment process. As we continue to grow our teams, we urge you to be cautious of fraudulent job postings or recruitment activities that misuse our company name and information. Please protect your personal information during any recruitment process. While Monks may contact potential candidates via LinkedIn, all applications must be submitted through our official website (monks.com/careers).
Position Description
We are looking for an Incident Response Analyst who is able to analyze security events and investigate potential incidents, validate and manage high priority incidents while providing comprehensive written root-cause analysis to security teams & stakeholders, utilize tooling to contain & minimize overall impact while escalating unresolved incidents to security engineering teams, maintain & continuously update incident response plans and runbooks for more efficient incident response.
This person will be responsible for monitoring security alerts and events in order to identify & remediate security incidents across various on-prem and cloud based solutions. We are looking for someone who is passionate about what they do, and not afraid to speak up or make suggestions.
Key Accountabilities
- Develop operational procedures to implement and continually improve the incident response process.
- Monitor security alerts within the tech stack, and investigate any potential security incidents.
- Analyze the alerts received to classify and assess the impact, managing high priority incidents, including communication to the business, facilitating root cause analysis and resolution.
- Perform cyber security investigations as part of the incident analysis.
- Coordinate with other departments the remediation tasks to be performed and escalate unresolved incidents.
- Perform post-mortem analysis to identify root causes and design controls or measures to prevent future incidents.
- Write comprehensive investigation reports capturing investigation details and root cause analysis aligned knowledge of modern Tactics, Techniques, and Procedures (TTPs).
- Collaborate with content production for security awareness.
- 3+ years of experience in similar roles
- Bachelor’s degree in Computer Science/Engineering/Information Security
- Working ITIL knowledge and experience or similar
- Functional knowledge of the MITRE ATT&CK framework
- Experience with log analysis, malware analysis, and/or forensic analysis
- Hands-on experience with industry leading security tools: EDR, SWG, SIEM, MDM
- Good communication
- Ability to confidently present findings to those with either a technical or non-technical background.
- Self-directed, resourceful, and a critical thinker with attention-to-detail and proactive problem-solving skills.
- Ability to self-organize and plan activities with commitment towards results.
- Ready to learn new contents both from others or self-learned.
- Passionate about self-improvement and suggesting improvements to processes or activities.
- InfoSec Certification (e.g. CISSP, Comptia Sec+, CEH, etc)
- Cloud experience (AWS, Azure, GCP) in a production environment
- Scripting experience (Python, Perl, Powershell, etc)
- Experience in Blue/Red/Purple team engagements
Monks is the global, purely digital, unitary operating brand of S4Capital plc. With a legacy of innovation and specialized expertise, Monks combines an extraordinary range of global marketing and technology services to accelerate business possibilities and redefine how brands and businesses interact with the world. Its integration of systems and workflows delivers unfettered content production, scaled experiences, enterprise-grade technology and data science fueled by AI—managed by the industry’s best and most diverse digital talent—to help the world’s trailblazing companies outmaneuver and outpace their competition.
Monks was named a Contender in The Forrester Wave: Global Marketing Services. It has remained a constant presence on Adweek’s Fastest Growing lists (2019-23), ranks among Cannes Lions' Top 10 Creative Companies (2022-23) and is the only partner to have been placed in AdExchanger’s Programmatic Power Players list every year (2020-24). In addition to being named Adweek’s first AI Agency of the Year (2023), Monks has been recognized by Business Intelligence in its 2024 Excellence in Artificial Intelligence Awards program in three categories: the Individual category, Organizational Winner in AI Strategic Planning and AI Product for its service Monks.Flow. Monks has also garnered the title of Webby Production Company of the Year (2021-24), won a record number of FWAs and has earned a spot on Newsweek’s Top 100 Global Most Loved Workplaces 2023.
We are an equal-opportunity employer committed to building a respectful and empowering work environment for all people to freely express themselves amongst colleagues who embrace diversity in all respects. Including fresh voices and unique points of view in all aspects of our business not only creates an environment where we can all grow and thrive but also increases our potential to produce work that better represents—and resonates with—the world around us.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Management and Manufacturing
- Industries Advertising Services
Referrals increase your chances of interviewing at Monks by 2x
Sign in to set job alerts for “Incident Analyst” roles.Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Bukit Raja, Selangor, Malaysia 1 week ago
Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 day ago
Security Operations Center Analyst (SOC Analyst)WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Petaling Jaya, Selangor, Malaysia 5 days ago
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Security Operations Centre Analyst (Night Shift)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 day ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago
Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Taman Wilayah, Federal Territory of Kuala Lumpur, Malaysia 2 months ago
Security Operations & Governance Analyst (1 year Contract)Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Operational Technology (OT) Security AnalystPetaling Jaya, Selangor, Malaysia 3 days ago
Cyber Security Analyst (Governance, Risk & Compliance)Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Analysts, Associate Analysts & Consultant – Cybersecurity Governance, Risk & Compliance (GRC)Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrIncident Response Analyst
Posted 1 day ago
Job Viewed
Job Description
First Name* Last Name* Email* Country Åland Islands (+358) American Samoa (+1684) Antigua and Barbuda (+1268) Argentina (+54) Aruba (+297) Australia (+61) Austria (+43) Belize (+501) Bermuda (+1441) Bolivia, Plurinational State of bolivia (+591) British Indian Ocean Territory (+246) Bulgaria (+359) Burkina Faso (+226) Cambodia (+855) Cameroon (+237) Central African Republic (+236) Chad (+235) Chile (+56) China (+86) Christmas Island (+61) Colombia (+57) Congo, The Democratic Republic of the Congo (+243) Cook Islands (+682) Croatia (+385) Cuba (+53) Cyprus (+357) Djibouti (+253) Dominican Republic (+1849) Egypt (+20) Eritrea (+291) Ethiopia (+251) Falkland Islands (Malvinas) (+500) Finland (+358) France (+33) French Polynesia (+689) French Southern Territories (+262) Gabon (+241) Georgia (+995) Germany (+49) Greece (+30) Greenland (+299) Guadeloupe (+590) Guam (+1671) Guatemala (+502) Guernsey (+44) Heard Island and Mcdonald Islands (+672) Holy See (Vatican City State) (+379) Hong Kong (+852) Iceland (+354) India (+91) Iran, Islamic Republic of Persian Gulf (+98) Ireland (+353) Isle of Man (+44) Israel (+972) Italy (+39) Japan (+81) Jersey (+44) Jordan (+962) Korea, Democratic People's Republic of Korea (+850) Korea, Republic of South Korea (+82) Lesotho (+266) Malaysia (+60) Mali (+223) Marshall Islands (+692) Micronesia, Federated States of Micronesia (+691) Moldova (+373) Namibia (+264) Nauru (+674) Nepal (+977) Netherlands (+31) New Zealand (+64) Niue (+683) Norfolk Island (+672) Northern Mariana Islands (+1670) Norway (+47) Oman (+968) Palestinian Territory, Occupied (+970) Paraguay (+595) Poland (+48) Portugal (+351) Russia (+7) Reunion (+262) Saba (+599) Saint Barthelemy (+590) Saint Helena, Ascension and Tristan Da Cunha (+290) Saint Kitts and Nevis (+1869) Saint Martin (+590) Saint Pierre and Miquelon (+508) Saint Vincent and the Grenadines (+1784) Sao Tome and Principe (+239) Solomon Islands (+677) Somalia (+252) South Sudan (+211) South Georgia and the South Sandwich Islands (+500) Spain (+34) Sri Lanka (+94) Sudan (+249) Svalbard and Jan Mayen (+47) Swaziland (+268) Syrian Arab Republic (+963) Tanzania, United Republic of Tanzania (+255) Thailand (+66) Tunisia (+216) Turkey (+90) Turks and Caicos Islands (+1649) Ukraine (+380) United Arab Emirates (+971) United Kingdom (+44) United States (+1) Uruguay (+598) Vanuatu (+678) Vietnam (+84) Virgin Islands, British (+1284) Virgin Islands, U.S. (+1340) Wallis and Futuna (+681) Yemen (+967) Phone* LinkedIn Profile* What is your notice period?* Would you require a work visa sponsorship?(Indicate 'Yes' if you are already on one)* Yes No What is your expected annual salary range?(Kindly indicate local currency)* Uploads Resume / CV* Supported Files: pdf, doc, docx, txt and rtf You can paste in the contents here 0 Male Female Nonbinary Decline to self identify I don't wish to answer Monks does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits. At Monks, we are committed to protecting your personal information. As part of our recruitment process, we collect and process personal data to evaluate your application and communicate with you. To understand how we handle your information, including the types of data we collect, how we use it, and your rights, please read our Monks Candidate Privacy Notice . We encourage you to review this notice to ensure you are fully informed about how your data will be managed during your application process. Thank you!
We have received your application. We will be in touch via email.
#J-18808-Ljbffr
Be The First To Know
About the latest Soc engineer Jobs in Malaysia !
Incident Response Analyst
Posted 1 day ago
Job Viewed
Job Description
Please note that we will never request payment or bank account information at any stage of the recruitment process. As we continue to grow our teams, we urge you to be cautious of fraudulent job postings or recruitment activities that misuse our company name and information. Please protect your personal information during any recruitment process. While Monks may contact potential candidates via LinkedIn, all applications must be submitted through our official website (monks.com/careers).
Position Description
We are looking for an Incident Response Analyst who is able to analyze security events and investigate potential incidents, validate and manage high priority incidents while providing comprehensive written root-cause analysis to security teams & stakeholders, utilize tooling to contain & minimize overall impact while escalating unresolved incidents to security engineering teams, maintain & continuously update incident response plans and runbooks for more efficient incident response.
This person will be responsible for monitoring security alerts and events in order to identify & remediate security incidents across various on-prem and cloud based solutions. We are looking for someone who is passionate about what they do, and not afraid to speak up or make suggestions.
Key Accountabilities
Develop operational procedures to implement and continually improve the incident response process. Monitor security alerts within the tech stack, and investigate any potential security incidents. Analyze the alerts received to classify and assess the impact, managing high priority incidents, including communication to the business, facilitating root cause analysis and resolution. Perform cyber security investigations as part of the incident analysis. Coordinate with other departments the remediation tasks to be performed and escalate unresolved incidents. Perform post-mortem analysis to identify root causes and design controls or measures to prevent future incidents. Write comprehensive investigation reports capturing investigation details and root cause analysis aligned knowledge of modern Tactics, Techniques, and Procedures (TTPs). Collaborate with content production for security awareness.
Minimum Qualifications
3+ years of experience in similar roles Bachelor’s degree in Computer Science/Engineering/Information Security Working ITIL knowledge and experience or similar Functional knowledge of the MITRE ATT&CK framework Experience with log analysis, malware analysis, and/or forensic analysis Hands-on experience with industry leading security tools: EDR, SWG, SIEM, MDM
Qualities
Good communication Ability to confidently present findings to those with either a technical or non-technical background. Self-directed, resourceful, and a critical thinker with attention-to-detail and proactive problem-solving skills. Ability to self-organize and plan activities with commitment towards results. Ready to learn new contents both from others or self-learned. Passionate about self-improvement and suggesting improvements to processes or activities.
Preferred Qualifications
InfoSec Certification (e.g. CISSP, Comptia Sec+, CEH, etc) Cloud experience (AWS, Azure, GCP) in a production environment Scripting experience (Python, Perl, Powershell, etc) Experience in Blue/Red/Purple team engagements
About Monks
Monks is the global, purely digital, unitary operating brand of S4Capital plc. With a legacy of innovation and specialized expertise, Monks combines an extraordinary range of global marketing and technology services to accelerate business possibilities and redefine how brands and businesses interact with the world. Its integration of systems and workflows delivers unfettered content production, scaled experiences, enterprise-grade technology and data science fueled by AI—managed by the industry’s best and most diverse digital talent—to help the world’s trailblazing companies outmaneuver and outpace their competition.
Monks was named a Contender in The Forrester Wave: Global Marketing Services. It has remained a constant presence on Adweek’s Fastest Growing lists (2019-23), ranks among Cannes Lions' Top 10 Creative Companies (2022-23) and is the only partner to have been placed in AdExchanger’s Programmatic Power Players list every year (2020-24). In addition to being named Adweek’s first AI Agency of the Year (2023), Monks has been recognized by Business Intelligence in its 2024 Excellence in Artificial Intelligence Awards program in three categories: the Individual category, Organizational Winner in AI Strategic Planning and AI Product for its service Monks.Flow. Monks has also garnered the title of Webby Production Company of the Year (2021-24), won a record number of FWAs and has earned a spot on Newsweek’s Top 100 Global Most Loved Workplaces 2023.
We are an equal-opportunity employer committed to building a respectful and empowering work environment for all people to freely express themselves amongst colleagues who embrace diversity in all respects. Including fresh voices and unique points of view in all aspects of our business not only creates an environment where we can all grow and thrive but also increases our potential to produce work that better represents—and resonates with—the world around us.
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Management and Manufacturing Industries Advertising Services Referrals increase your chances of interviewing at Monks by 2x Sign in to set job alerts for “Incident Analyst” roles.
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago Bukit Raja, Selangor, Malaysia 1 week ago Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 days ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 day ago Security Operations Center Analyst (SOC Analyst)
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Petaling Jaya, Selangor, Malaysia 5 days ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago Security Operations Centre Analyst (Night Shift)
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 day ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 days ago Taman Wilayah, Federal Territory of Kuala Lumpur, Malaysia 2 months ago Security Operations & Governance Analyst (1 year Contract)
Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Operational Technology (OT) Security Analyst
Petaling Jaya, Selangor, Malaysia 3 days ago Cyber Security Analyst (Governance, Risk & Compliance)
Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Analysts, Associate Analysts & Consultant – Cybersecurity Governance, Risk & Compliance (GRC)
Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Lead Consultant (FortiGuard Incident Response) - APAC
Posted 12 days ago
Job Viewed
Job Description
Location: Malaysia (Kuala Lumpur), Hong Kong, Singapore
Join Fortinet, a cybersecurity pioneer with over two decades of excellence, as we continue to shape the future of cybersecurity and redefine the intersection of networking and security. At Fortinet, our mission is to safeguard people, devices, and data everywhere. We are currently seeking a dynamic Lead Consultant (FortiGuard Incident Response) to contribute to the success of our rapidly growing business.
You will work directly with members of a world-class incident response and forensics team. Our team is comprised of individuals with strong knowledge in malware hunting and analysis, reverse engineering, multiple scripting languages, forensics and threat actors TTPs.
As a Lead Consultant (FortiGuard Incident Response), you will:- Lead IR engagements and mentoring/training junior analysis.
- Continue to focus on process improvement for the customer-facing incident response services.
- Conduct host-based analysis and forensic functions on Windows, Linux, and Mac OS X systems.
- Review firewall, web, database, and other log sources to identify evidence and artifacts of malicious and compromised activity.
- Leverage our FortiEDR Platform to conduct investigations to rapidly detect and analyze security threats.
- Perform basic reverse engineering of threat actor’s malicious tools.
- Develop complete and informative reports and presentations for both executive and technical audience.
- Availability during nights/weekends as needed for IR engagements.
- Perform memory forensics and file analysis as needed.
- Monitor underground forums, our FortiGuard Threat Labs, along with other open-source intelligence outlets to maintain proficiency in latest actor tactics and techniques.
An insightful and influential collaborator to join our team. We encourage you to apply for this position if you have the following qualities:
- Experience with at least one scripting language: Shell, Ruby, Perl, Python, etc.
- Ability to data mine using YARA, RegEx or other techniques to identify new threats.
- Experience with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open source forensic tools a plus.
- Experience with malware analysis tools such as IDA Pro, OllyDbg, Immunity Debugger.
- Hands-on experience dealing with APT campaigns, attack Tactics, Techniques and Procedures (TTPs), memory injection techniques, static and dynamic malware analysis and malware persistence mechanism.
- Strong knowledge of operating system internals and endpoint security experience.
- Able to communicate with both technical and executive personnel.
- Static and dynamic malware and log analysis.
- Excellent written and verbal communication skills a must.
- Reading and writing skills of non-English languages such as Chinese and Russian a plus.
- Analysis of Linux and MAC binary files and the understanding of MAC internals is a plus but not required.
- Highly motivated, self-driven and able to work both independently and within a team.
- Able to work under pressure in time-critical situations and occasional nights and weekends work.
- A good understanding of Active Directory a plus.
- Bachelor’s Degree in Computer Engineering, Computer Science or related field.
- Or 10+ years’ experience with incident response and or Forensics.
At Fortinet, we embrace diversity and inclusivity. We encourage applications from diverse backgrounds and identities. Explore our welcoming work environment designed for a rewarding career journey with an attractive Total Rewards package to support you with your overall health and financial well-being. Join us in bringing solutions that make a meaningful and lasting impact to our 660,000+ customers around the globe.
We will only notify shortlisted candidates.
#J-18808-LjbffrSenior Cyber Forensics and Incident Response
Posted 12 days ago
Job Viewed
Job Description
about the company
You will be working for a major organisation within the finance industry
about the job
- Lead and manage all phases of cybersecurity incident response (containment, eradication, recovery).
- Develop and refine incident response plans, playbooks, and procedures.
- Oversee and conduct advanced digital forensic investigations (endpoints, servers, networks, cloud).
- Lead, mentor, and develop the CFIR team.
- Stay updated on cyber threats and vulnerabilities relevant to the financial sector.
- Communicate technical findings and reports to stakeholders (technical/non-technical, management, regulatory bodies).
- Evaluate, recommend, and implement CFIR tools and technologies.
- Ensure CFIR activities comply with internal policies, industry best practices, and BNM regulations.
- Lead post-incident reviews for continuous improvement.
- Collaborate with SOC, IT, legal, risk, and other departments.
about the package
- Salary up to RM15,000
- Must have working rights in Malaysia
- Performance bonus
- Allowances
- Medical and life insurance
skills
Cyber forensics, digital forensics, incident response, cybersecurity, IT security
qualifications
- 3-5 years hands on experience within Cyber Forensics and Incident Response
education
Associate Degree/Diploma
#J-18808-Ljbffr