SOC Analyst
2 weeks ago
Experience: 4–6 years
Duration: 6 months (Contract)
Location: On-site @ Kwasa Damansara
Industry: Fund Management & Retirement
Key Responsibilities:
- Rule writing for threat detection and alerting.
- SIEM automation to streamline incident response workflows.
- Management and maintenance of asset listings within the SIEM platform.
- Fine-tuning of false positives to improve alert accuracy.
- Implementation of data filtering techniques for relevant log ingestion.
- Application of data masking to protect sensitive information during analysis.
Requirements:
- Experience in managing or implementing SOC environments, including onboarding log sources and defining operating models.
- Involvement in SIEM migration and deployment projects, including tuning rules and filters to reduce false positives.
- Hands-on experience in Level 1 and Level 2 SOC roles.
- Any related security certification
-
Business Analyst for Network Security
2 weeks ago
Selangor, Malaysia Cognizant Full timeCognizant is looking for a **Business Analyst for Network Security **in developing customized product for our clients. The role is expected to drive technology discussions and analyze the current landscape for gaps in addressing business needs. Cognizant needs a motivated individual to challenge the status quo and provide thought leadership/best practices to...
-
Snr IT Security Analyst
1 week ago
Selangor, Malaysia RHB Banking Group Full timeWorking Hour - Regular Hours - Monday - Friday- Business Area - Digital Technology- Location - Malaysia - Selangor- Description **Primary Objective**: To timely response to security alerts using a combination of technology solutions and a complete & reliable set of documented processes on a 24 x 7 x 365 basis **Key Responsibilities**: - Act as a point of...
-
SOC L3 Analyst
2 weeks ago
Damansara, Malaysia Asgard Resources Sdn Bhd Full time**Key Responsibilities**: Threat Hunting: Proactively search for malicious activity within the network using various techniques such as network traffic analysis, log analysis, and endpoint detection. Examples: "Develop threat hunting queries to identify suspicious network traffic," "Use endpoint detection and response tools to hunt for malware," "Analyze...