Level 1 Security Operations Center (SOC) Analyst
Full-time
Others/Any
Yogyakarta, Yogyakarta City
3 weeks ago
Role OverviewAs a Level 1 Security Operations Center (SOC) Analyst, you will play a crucial role in monitoring and managing security events to safegua..
Role Overview
As a Level 1 Security Operations Center (SOC) Analyst, you will play a crucial role in monitoring and managing security events to safeguard the organisation’s digital assets. Using tools like Microsoft Sentinel, you will triage alerts, investigate incidents, and escalate issues as necessary. This position offers an excellent opportunity to build a career in cybersecurity by gaining hands-on experience in a dynamic and collaborative environment.
Key Responsibilities
- Monitoring and Analysis:
- Continuously monitor Microsoft Sentinel for security alerts and potential threats.
- Analyse and prioritise security events to determine their legitimacy and severity.
- Incident Investigation and Escalation:
- Investigate alerts for signs of unauthorised access, malware activity, or phishing attempts.
- Escalate confirmed security incidents to Level 2 Analysts or the Incident Response team.
- Security Operations:
- Perform initial response actions such as disabling user accounts, blocking IPs, or containing suspicious activities under supervision.
- Log and document all events, analysis, and actions taken during the investigation process.
- Collaboration and Training:
- Work closely with internal teams to resolve security issues promptly.
- Stay updated on Microsoft Sentinel features, threat intelligence, and cybersecurity best practices.
Key Requirements
- Technical Knowledge:
- Hands-on experience or familiarity with Microsoft Sentinel and Azure security tools.
- Basic understanding of networking concepts (TCP/IP, DNS, VPNs).
- Knowledge of cybersecurity principles and common threat types.
- Soft Skills:
- Strong analytical and problem-solving abilities.
- Clear written and verbal communication skills.
- Ability to manage tasks effectively in a fast-paced environment.
- Experience:
- 0–2 years of experience in a cybersecurity or IT support role.
Qualifications & Experience
- Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).
- Certifications such as CompTIA Security+ or Microsoft Certified: Security Operations Analyst Associate (preferred).
- Familiarity with KQL (Kusto Query Language) for advanced queries in Microsoft Sentinel is an advantage.
Work Arrangement & Travel Requirements
- This is a remote role; however, a hybrid work arrangement may be introduced in the future if needed.
- The role may require occasional travel to the HQ in Singapore, as required or up to once every half year.
- Travel will follow Singapore’s per-diem travel arrangements to cover expenses.
Other Information
- This role requires strong organisational skills and the ability to manage multiple tasks simultaneously.
- Being on standby or working on a rotation basis may be required to ensure uninterrupted service delivery.
What We Offer
- Competitive salary and benefits package.
- Access to advanced training in Microsoft Sentinel and Azure security tools.
- A collaborative and supportive work environment.
- Opportunities for career growth in cybersecurity.
aCloud is an equal opportunity employer, committed to diversity and inclusion in the workplace.
Official account of Jobstore.