Requirements
- Degree in Computer Science Information Security or a related discipline
- A minimum of 5 years of experience in a SOC or cybersecurity operations role
- Possession of IT security certifications such as CISSP CISM CISP or OSCP is an advantage
- Experience with SIEM platforms (e.g. Splunk Elastic Trellix Helix) vulnerability management tools (e.g. Tenable Qualys Rapid7) and email security control such as SPF DKIM and DMARC
- Familiarity with incident response frameworks (e.g. MITRE NIST SANS)
- Strong understanding of network protocols operating systems security technologies patch management processes and tools (e.g. WSUS SCCM)
- Knowledge of malware analysis phishing and threat intelligence
- Excellent analytical problem-solving and communication skills
- Ability to work in a fast-paced environment (non-office hour work may be required)
Applications
You are invited to apply online via or send in your CV stating the position (with reference number) you are applying for by mail to Human Resource Management Department MTR Corporation G.P.O. Box 9916 Hong Kong on or before 22 January 2026.
For other job openings please visit MTR Corporations website for more details.
All information provided by applicants will be treated in strict confidence and used for recruitment purpose only. All personal data of unsuccessful applicants will be retained for 12 months for future recruitment purpose and will then be destroyed.
Responsibilities
- Monitor security alerts and events from SIEM IDS/IPS firewalls and other security tools
- Analyse and triage security incidents to determine severity and impact
- Respond to and investigate security incidents including containment eradication and recovery
- Coordinate with external SOC teams to streamline incident handling and resolution processes
- Conduct root cause analysis and recommend improvements to prevent recurrence
- Collaborate with IT and other departments to implement security controls and best practices
- Maintain and update incident response documentation and playbooks
- Assist in threat hunting and proactive detection of malicious activity
- Stay current with the latest security threats vulnerabilities and technology trends
- Participate in security audits compliance efforts and risk assessments
Required Experience:
IC
RequirementsDegree in Computer Science Information Security or a related disciplineA minimum of 5 years of experience in a SOC or cybersecurity operations rolePossession of IT security certifications such as CISSP CISM CISP or OSCP is an advantageExperience with SIEM platforms (e.g. Splunk Elastic T...
Requirements
- Degree in Computer Science Information Security or a related discipline
- A minimum of 5 years of experience in a SOC or cybersecurity operations role
- Possession of IT security certifications such as CISSP CISM CISP or OSCP is an advantage
- Experience with SIEM platforms (e.g. Splunk Elastic Trellix Helix) vulnerability management tools (e.g. Tenable Qualys Rapid7) and email security control such as SPF DKIM and DMARC
- Familiarity with incident response frameworks (e.g. MITRE NIST SANS)
- Strong understanding of network protocols operating systems security technologies patch management processes and tools (e.g. WSUS SCCM)
- Knowledge of malware analysis phishing and threat intelligence
- Excellent analytical problem-solving and communication skills
- Ability to work in a fast-paced environment (non-office hour work may be required)
Applications
You are invited to apply online via or send in your CV stating the position (with reference number) you are applying for by mail to Human Resource Management Department MTR Corporation G.P.O. Box 9916 Hong Kong on or before 22 January 2026.
For other job openings please visit MTR Corporations website for more details.
All information provided by applicants will be treated in strict confidence and used for recruitment purpose only. All personal data of unsuccessful applicants will be retained for 12 months for future recruitment purpose and will then be destroyed.
Responsibilities
- Monitor security alerts and events from SIEM IDS/IPS firewalls and other security tools
- Analyse and triage security incidents to determine severity and impact
- Respond to and investigate security incidents including containment eradication and recovery
- Coordinate with external SOC teams to streamline incident handling and resolution processes
- Conduct root cause analysis and recommend improvements to prevent recurrence
- Collaborate with IT and other departments to implement security controls and best practices
- Maintain and update incident response documentation and playbooks
- Assist in threat hunting and proactive detection of malicious activity
- Stay current with the latest security threats vulnerabilities and technology trends
- Participate in security audits compliance efforts and risk assessments
Required Experience:
IC
View more
View less