SOC Intern en Kuala Lumpur a Logicalis

Fecha de publicación: 10/17/2024

Resumen de la oferta

  • Tipo de empleado:
    Full-Time
  • Localización:
    Kuala Lumpur
  • Tipo de empleo:
  • Experiencia:
    Not Specified
  • Fecha de publicación:
    10/17/2024

Descripción del puesto de trabajo

Why choose Logicalis?          

  

As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability. 
 

We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth. 

Responsibilities:   

  • Assist in monitoring security alerts and incidents using various security information and event management (SIEM) tools. Analyse alerts for potential threats and vulnerabilities.
  • Participate in incident triage by categorising and prioritising alerts based on severity and impact. Work with senior analysts to determine appropriate response actions.
  • Learn to operate and maintain security tools, such as intrusion detection systems (IDS), firewall logs, antivirus solutions, and endpoint detection and response (EDR) tools.
  • Assist in collecting, analysing, and interpreting security events and incidents data. Generate reports and dashboards for senior analysts and management.
  • Support the incident response process by documenting incident details, coordinating with relevant teams, and assisting in containing and eradicating security threats.
  • Contribute to creating and maintaining standard operating procedures (SOPs) and documentation related to security processes and incident handling.
  • Stay updated on cybersecurity threats, vulnerabilities, and attack techniques. Help integrate threat intelligence feeds into the SOC's monitoring processes.
  • Collaborate with cross-functional teams, including IT, network operations, and compliance, to ensure a coordinated response to security incidents.
  • Engage in continuous learning and development activities to improve technical and analytical skills in the cybersecurity field.

Qualifications:

  • Currently pursuing a degree in cybersecurity, computer science, information technology, or a related field.
  • Basic cybersecurity concepts, including threats, vulnerabilities, and attack techniques.
  • Familiarity with operating systems (e.g., Windows, Linux) and networking fundamentals.
  • Strong analytical and problem-solving skills.
  • Ability to work effectively in a team and communicate technical information.
  • Eagerness to learn and adapt to new technologies and tools.
  • Knowledge of cybersecurity frameworks and standards (e.g., NIST, CIS) is a plus.
  • Familiarity with security tools and technologies (e.g., SIEM, IDS/IPS, EDR) is a plus.

¿No encuentras una vacante que sea adecuada?

Si estás interesado en una nueva oportunidad profesional, pero aún no has encontrado una vacante para tí, únete a nuestra red de profesionales para seguir conectado/a con nosotros y recibir las últimas oportunidades y noticias de nuestra compañía.

Red Arrow