SOC Analyst

2 weeks ago


Damansara Selangor, Malaysia Strato Solutions Malaysia Full time 60,000 - 180,000 per year

Experience: 4–6 years

Duration: 6 months (Contract)

Location: On-site @ Kwasa Damansara

Industry: Fund Management & Retirement

Key Responsibilities:

  • Rule writing for threat detection and alerting.
  • SIEM automation to streamline incident response workflows.
  • Management and maintenance of asset listings within the SIEM platform.
  • Fine-tuning of false positives to improve alert accuracy.
  • Implementation of data filtering techniques for relevant log ingestion.
  • Application of data masking to protect sensitive information during analysis.

Requirements:

  • Experience in managing or implementing SOC environments, including onboarding log sources and defining operating models.
  • Involvement in SIEM migration and deployment projects, including tuning rules and filters to reduce false positives.
  • Hands-on experience in Level 1 and Level 2 SOC roles.
  • Any related security certification


  • Selangor, Malaysia Cognizant Full time

    Cognizant is looking for a **Business Analyst for Network Security **in developing customized product for our clients. The role is expected to drive technology discussions and analyze the current landscape for gaps in addressing business needs. Cognizant needs a motivated individual to challenge the status quo and provide thought leadership/best practices to...


  • Selangor, Malaysia RHB Banking Group Full time

    Working Hour - Regular Hours - Monday - Friday- Business Area - Digital Technology- Location - Malaysia - Selangor- Description **Primary Objective**: To timely response to security alerts using a combination of technology solutions and a complete & reliable set of documented processes on a 24 x 7 x 365 basis **Key Responsibilities**: - Act as a point of...

  • SOC L3 Analyst

    2 weeks ago


    Damansara, Malaysia Asgard Resources Sdn Bhd Full time

    **Key Responsibilities**: Threat Hunting: Proactively search for malicious activity within the network using various techniques such as network traffic analysis, log analysis, and endpoint detection. Examples: "Develop threat hunting queries to identify suspicious network traffic," "Use endpoint detection and response tools to hunt for malware," "Analyze...