Were Hiring: L2 Security Engineer (SOC) / Senior Security Analyst
Location: Kuala Lumpur (KL Sentral)
Work Mode: Hybrid (3 days office / 2 days WFH)
Job Type: Permanent
About the Company
Our client is a globally recognized technology services and digital solutions provider specializing in cloud cybersecurity networking and managed services. With operations across multiple regions and partnerships with leading technology vendors the organization supports enterprise customers in strengthening their cyber resilience digital infrastructure and security operations. The company is known for delivering end-to-end technology services advanced security operations and large-scale enterprise transformation programs.
We are looking for a Security Operations Center (SOC) L2 Engineer to join a global technology services organization that delivers advanced cybersecurity cloud and managed infrastructure solutions to enterprise clients worldwide. This role is ideal for professionals passionate about cybersecurity operations threat analysis and incident response working in a dynamic environment supporting enterprise customers.
What Youll Do
- Work in a 24x7 SOC environment to handle security incidents and provide Level 2 (L2) support during analysis and investigations to identify root causes
- Perform incident investigation and threat analysis providing detailed remediation recommendations within agreed SLAs
- Execute SOC playbooks and knowledge base procedures to minimize security incident impact and conduct detailed investigations on affected assets
- Escalate critical incidents to Level 3 (L3) support teams for deeper analysis and collaborate closely to ensure timely resolution
- Review and integrate third-party threat intelligence feeds into managed security platforms to enhance detection capabilities
- Prepare and present SOC monthly security reports highlighting incidents risks trends and mitigation plans for stakeholders
- Support and enable L1 Security Analysts across regional teams by developing SOC playbooks and maintaining operational knowledge bases
What You Bring
Must-have:
- Minimum 3 years of experience in SOC or Managed Security Services (MSS) environments
- Bachelors degree in Computer Science Information Technology or Information Security
- Strong hands-on experience with SIEM platforms such as Microsoft Sentinel or IBM QRadar for incident monitoring investigation and analysis
- Experience with Endpoint Protection (EPP) or Endpoint Detection & Response (EDR) tools such as Microsoft Defender or CrowdStrike
- Solid understanding of Windows and Linux environments including basic Linux command-line troubleshooting (Unix/Linux/BSD exposure preferred)
- Knowledge of shell scripting to automate operational or security-related tasks
- At least one cybersecurity certification such as CEH CHFI or equivalent
Nice-to-have:
- Exposure to firewall technologies such as Cisco Palo Alto Checkpoint or Fortinet
- Good understanding of network security concepts and threat detection methodologies
- Exposure to cloud security or cloud infrastructure environments
- Familiarity with SOC processes incident response frameworks and threat intelligence integration
- Understanding of ITIL-based operational practices in enterprise environments
Why Join Us
- Opportunity to work with a global technology services provider supporting enterprise-scale security operations *(Inferred please review)*
- Exposure to advanced cybersecurity tools threat intelligence and large-scale SOC environments *(Inferred please review)*
- Performance bonus
Apply Now:
Reach out: 60 11-
Explore more roles:
#CyberSecurity #SOCAnalyst #SecurityEngineer #ThreatAnalysis #SIEM #MicrosoftSentinel #QRadar #KualaLumpurJobs #TechCareers
Were Hiring: L2 Security Engineer (SOC) / Senior Security Analyst Location: Kuala Lumpur (KL Sentral) Work Mode: Hybrid (3 days office / 2 days WFH) Job Type: Permanent About the Company Our client is a globally recognized technology services and digital solutions provider specializing in cloud c...
Were Hiring: L2 Security Engineer (SOC) / Senior Security Analyst
Location: Kuala Lumpur (KL Sentral)
Work Mode: Hybrid (3 days office / 2 days WFH)
Job Type: Permanent
About the Company
Our client is a globally recognized technology services and digital solutions provider specializing in cloud cybersecurity networking and managed services. With operations across multiple regions and partnerships with leading technology vendors the organization supports enterprise customers in strengthening their cyber resilience digital infrastructure and security operations. The company is known for delivering end-to-end technology services advanced security operations and large-scale enterprise transformation programs.
We are looking for a Security Operations Center (SOC) L2 Engineer to join a global technology services organization that delivers advanced cybersecurity cloud and managed infrastructure solutions to enterprise clients worldwide. This role is ideal for professionals passionate about cybersecurity operations threat analysis and incident response working in a dynamic environment supporting enterprise customers.
What Youll Do
- Work in a 24x7 SOC environment to handle security incidents and provide Level 2 (L2) support during analysis and investigations to identify root causes
- Perform incident investigation and threat analysis providing detailed remediation recommendations within agreed SLAs
- Execute SOC playbooks and knowledge base procedures to minimize security incident impact and conduct detailed investigations on affected assets
- Escalate critical incidents to Level 3 (L3) support teams for deeper analysis and collaborate closely to ensure timely resolution
- Review and integrate third-party threat intelligence feeds into managed security platforms to enhance detection capabilities
- Prepare and present SOC monthly security reports highlighting incidents risks trends and mitigation plans for stakeholders
- Support and enable L1 Security Analysts across regional teams by developing SOC playbooks and maintaining operational knowledge bases
What You Bring
Must-have:
- Minimum 3 years of experience in SOC or Managed Security Services (MSS) environments
- Bachelors degree in Computer Science Information Technology or Information Security
- Strong hands-on experience with SIEM platforms such as Microsoft Sentinel or IBM QRadar for incident monitoring investigation and analysis
- Experience with Endpoint Protection (EPP) or Endpoint Detection & Response (EDR) tools such as Microsoft Defender or CrowdStrike
- Solid understanding of Windows and Linux environments including basic Linux command-line troubleshooting (Unix/Linux/BSD exposure preferred)
- Knowledge of shell scripting to automate operational or security-related tasks
- At least one cybersecurity certification such as CEH CHFI or equivalent
Nice-to-have:
- Exposure to firewall technologies such as Cisco Palo Alto Checkpoint or Fortinet
- Good understanding of network security concepts and threat detection methodologies
- Exposure to cloud security or cloud infrastructure environments
- Familiarity with SOC processes incident response frameworks and threat intelligence integration
- Understanding of ITIL-based operational practices in enterprise environments
Why Join Us
- Opportunity to work with a global technology services provider supporting enterprise-scale security operations *(Inferred please review)*
- Exposure to advanced cybersecurity tools threat intelligence and large-scale SOC environments *(Inferred please review)*
- Performance bonus
Apply Now:
Reach out: 60 11-
Explore more roles:
#CyberSecurity #SOCAnalyst #SecurityEngineer #ThreatAnalysis #SIEM #MicrosoftSentinel #QRadar #KualaLumpurJobs #TechCareers
View more
View less