FIND_THE_RIGHTJOB.
Kuala, India
Job brief
The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you.
Requirements
Must-haves:
· 2-3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable)
· Process and Procedure adherence
· General network knowledge and TCP/IP Troubleshooting
· Ability to trace down an endpoint on the network, based on ticket information
· Familiarity with system log information and what it means
· Understanding of common network services (web, mail, DNS, authentication)
· Knowledge of host-based firewalls, Anti-Malware, HIDS
· Understanding of common network device functions (firewall, IPS/IDS, NAC)
· General Desktop OS and Server OS knowledge
· TCP/IP, Internet Routing, UNIX / LINUX & Windows
· Excellent written and verbal communication skills
Good to have:
· Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others
Main Responsibilities
· Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack, and affected systems, and collecting data for further analysis.
· Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks.
· Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 3 information security specialists, and/or customer as appropriate to perform further investigation and resolution.
· Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats.
· Analyse the Events & incidents and identify the root cause.
· Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge.
· Staying up to date with emerging security threats including applicable regulatory security requirements.
· Bring enhancements to SOC security process, procedures, and policies.
· Document and maintain customer build documents, security procedures and processes.
· Document incidents to contribute to incident response and disaster recovery plans.
· Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate.
· Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc.
· Other responsibilities and additional duties as assigned by the security management team or service delivery manager.
Job Type: Full-time
Pay: ₹400,025.00 - ₹600,036.00 per year
Application Question(s):
Experience:
Work Location: In person
Similar jobs
ECCO Gulf Majorel Qatar
Qatar
3 days ago
Alshaya Group
Egypt
4 days ago
UST
Hyderabad, Pakistan
4 days ago
Mindstream
Doha, Qatar
4 days ago
Finclutech FZO
Dubai, United Arab Emirates
4 days ago
Maximus KSA | ماكسيموس السعودية
Riyadh, Saudi Arabia
4 days ago
ITS Information Technology Solutions
Giza, Egypt
4 days ago
© 2025 Qureos. All rights reserved.