Data Analyst Technical Support SOC SOC Analysis
The Tier 1 MSSP SOC Analyst plays a critical role in the first line of defense against cybersecurity threats. The role involves proactive monitoring, initial triage, and documentation of security incidents. Analysts will utilize various security tools and systems to detect, analyze, and escalate threats as required while ensuring effective communication and collaboration across the SOC team. Responsibilities: • Incident Monitoring and Detection: • Perform proactive monitoring of logs, data, link utilization, and system availability across multiple SIEMs or security tools. • Detect and identify potential security incidents using pre-defined rules and correlation. • Conduct blacklist scanning, keyword ingestion, and fine-tuning of SIEM rules for improved accuracy. • Incident Management: • Investigate and triage alerts to determine the severity and impact of security events. • Document detailed assessments and actions taken into incident tickets. • Escalate incidents that require further investigation or resolution to Tier 2. • Use standardized templates as a base but proactively amend escalation emails based on current investigations and analysis without referring to past emails. • Customer Interaction: • Handle customer phone calls and respond to escalation emails. • Prepare standardized escalation email templates for efficient communication. • Collaboration and Process Improvement: • Work closely with Tier 2, Tier 3 (SOC Leads), and SOC Managers to ensure incidents are effectively mitigated and resolved. • Participate in feedback sessions and process improvement reviews to enhance Tier 1 workflows.
• Basic knowledge of security tools such as SIEMs, IDS/IPS, firewalls, and antivirus systems. • At least 1-2 year of relevant SOC experience • Strong attention to detail and ability to handle multiple tasks efficiently. • Effective communication and teamwork skills to interact with internal teams and external stakeholders. • A collaborative mindset to work effectively with other SOC tiers and managers. • Strong analytical and problem-solving skills to address complex security challenges. • Commitment to continuous learning to stay updated with the latest security trends and technologies. • Adherence to SOC playbooks, standard operating procedures, and compliance requirements. • Willingness to work in a dynamic 24/7 SOC environment. • Willingness to work on a 24/7 rotating shift schedule. • Willingness to work on 12-hour shifts
ST Engineering is one of Asia's largest defense and engineering groups. It has also diversified over the years, and now supplies both military customers and commercial ones in over 100 countries, which cover its four core businesses -- aerospace, land systems, electronics and marine. - Meal allowance & transportation allowance - Private insurance for employees from probation - Laptop - 100% salary from probation - Training from probation - Free learning of all courses on LinkedIn e-learning - SHUI is paid on total Gross Base salary - Annual performance review - Annual salary review - Lots of periodic company gatherings and events.
• Relevant certifications (e.g., CISSP, CISM, CEH) are preferred.
SOC Manager
Online interview (in English), additional interviews if needed