Security Operations Centre Analyst - SRKay Consulting Group
- Petaling Jaya, Selangor, Malaysia
- Apply by: Jan 01, 2026
- 1 Vacancy
- Local Candidates (Malaysia)
- Shift: First Shift (Morning)
- Career Level: Experienced Professional
- Degree: Graduate
- Experience: Year
- Full Time/Permanent (hiring on behalf)
- Work from Office
Job is expired
Job Description
JOB DESCRIPTION
- To carry out technical vulnerability assessments of IT systems to identifying potential vulnerabilities, make recommendations to control identified risks and work with those individuals to ensure they are
- To respond rapidly and effectively to IT security incidents, managing them in a professional manor, including performing forensics for evidence gathering and preservation.
- To contribute towards information security guidance documentation and
- Approach tasks with flexibility, proactivity and complete work to a high quality
- To coordinate tasks as directed by the IT Security Manager to assist in the improvement of the security of the
- Escalate validated and confirmed incidents to designated incident response
- Notify Client of incident and required mitigation
- Fine-tune SIEM rules to reduce false positive and remove false
- Collect global threat intelligence and internal threats then inject actions based on analysis and recommendation and proactively research and monitor security information to identify potential threats that may impact the
- Develop and distribute information and alerts on required corrective actions to the
- Learn new attack patterns, actively participate in security
- Work closely with Vulnerability Management and designated incident response
- Understand the structure and the meaning of logs from different log sources such as FW, IDS, Windows DC, Cisco appliances, AV and antimalware software, email security etc.
- Perform threat intel
- Open and update incidents in ManageEngine (ITSM Platform) to report the alarms triggered or threats Analyst should properly include for each incident on ManageEngine all details related to the logs, alarms and other indicators identified in accordance with the intervention protocol of each client and the SLA.
- Track and update incidents and requests based on client’s updates and analysis
SKILL
- Solid understanding of network and computer security, security testing, software security
- Knowledge and hands-on experience of implementation and management of IDS/IPS, Firewall, VPN, and other security
- Experience with Security Information Event Management (SIEM) tools, creating advanced co-relation rules, administration of SIEM, system hardening, and Vulnerability
- Should have expertise on TCP/IP network traffic and event log
- Knowledge and hands-on experience with Exabeam, Micro Focus, QRadar, Arcsight, Mcafee epo, NetIQ Sentinel or any SIEM
- Knowledge of ITIL disciplines such as Incident, Problem and Change
- Configuration and Troubleshooting experience on Checkpoint, Cisco, Fortigate, PaloAlto and Sonicwall firewalls would be an added
Benefits
EPF + SOCSO + Medical Benefits