Senior Security Analyst

Kuala Lumpur, MY, Malaysia

Logicalis

Elevate your business with Logicalis, the top IT solutions and managed services provider in Australia. Explore our offerings and start your journey to success!

View all jobs at Logicalis

Apply now Apply later

Why choose Logicalis?          

     

As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability. 
 

We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth. 

Accountabilities:

  • Actively research and stay updated with latest and new cyberattacks, TTPs, threat attackers, vulnerabilities and based on it perform proactive threat hunting in customer environments. 

  • Understand customer environments to develop use cases based on industry, targeted attacks, vulnerabilities, attack vector, threat landscape, TTPs etc., for the scope of monitoring. 
  • Develop identification and documentation of Indicators of Compromise (IOCs). 
  • Ability to perform malware reverse engineering on the detected malware file to investigate and identify its potential entry points. 
  • Perform forensic analysis and investigations leveraging SOC solutions and provide evidence in case of breaches. 
  • Handle security incidents tickets escalated by Level II team, and draft security incident report covering the root cause, forensic evidence, and recommended mitigation plans. 
  • Escalate complex incidents to higher-level teams, ensuring proper documentation and reporting. 
  • Strong understanding of MITRE ATT&CK framework, and ability to operationalize it for day-day SecOps activities, to develop tactics, techniques, procedures (TTPs) for security analysis and threat hunting. Collaborate with other security teams to enhance the detection and mitigation of emerging threats. 
  • Perform SIEM/EDR rule fine-tuning to minimize false positive alerts and enhance detection accuracy for MSS SOC. 
  • Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers. 
  • Identify gaps in existing SOC process and work with team members or other departments to create, modify standard operating procedures, to automate any mundane daily operational activities, ensuring Ops are run efficiently. 
  • Provide guidance and mentoring to junior SOC analysts, supporting their growth and knowledge development. Enable regional security analysts to deliver seamless support locally by developing SOC playbooks, relevant and sufficient Knowledge base. 
  • Lead regional security analysts in handling incidents, customer escalations and requests, SLA (Service Level Agreement) requirements. 
  • Stay updated on the latest security trends, vulnerabilities, and attack techniques to improve incident response capabilities. 

The Individual and their Experience:

  • Advantage if have hands on experience in performing vulnerability assessments and presenting to customer business teams

  • Familiarity with threat hunting techniques and proactive security measures. 
  • Expertise in network security technologies such as firewalls, IDS/IPS, and VPNs. 
  • Strong understanding of cyberattack tactics, techniques, and procedures (TTPs), including familiarity with frameworks like MITRE ATT&CK. 
  • Experience with cloud security platforms (e.g., AWS, Azure, Google Cloud). 
  • Knowledge of compliance standards and frameworks (e.g., GDPR, NIST, PCI-DSS). 
  • Strong troubleshooting skills with the ability to analyze and resolve complex security incidents. 
  • Experience in Forensics and Incident Response, penetration testing and report drafting 
  • Advanced knowledge of SIEM tools (e.g., QRadar, Splunk) and threat intelligence platforms. 
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation and incident response. 
  • Multilingual proficiency (e.g., Mandarin, Cantonese, Bahasa Malayu) for effective communication in global environments. 

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Analyst Jobs

Tags: Automation AWS Azure Cloud Compliance EDR Firewalls Forensics GCP GDPR Governance IDS Incident response IoT IPS Malware MITRE ATT&CK Monitoring Network security NIST Pentesting PowerShell Python QRadar Reverse engineering Scripting SecOps Security analysis SIEM SOC Splunk Threat intelligence TTPs VPN Vulnerabilities

Region: Asia/Pacific
Country: Malaysia

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.