SOC Intern de Kuala Lumpur em Logicalis

Data de Postagem 10/17/2024

Resumo do Emprego

  • Tipo de Profissional:
    Full-Time
  • Localização:
    Kuala Lumpur
  • Tipo de Vaga:
  • Experiência
    Not Specified
  • Data de Postagem
    10/17/2024

Descrição da Vaga

Why choose Logicalis?          

  

As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability. 
 

We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth. 

Responsibilities:   

  • Assist in monitoring security alerts and incidents using various security information and event management (SIEM) tools. Analyse alerts for potential threats and vulnerabilities.
  • Participate in incident triage by categorising and prioritising alerts based on severity and impact. Work with senior analysts to determine appropriate response actions.
  • Learn to operate and maintain security tools, such as intrusion detection systems (IDS), firewall logs, antivirus solutions, and endpoint detection and response (EDR) tools.
  • Assist in collecting, analysing, and interpreting security events and incidents data. Generate reports and dashboards for senior analysts and management.
  • Support the incident response process by documenting incident details, coordinating with relevant teams, and assisting in containing and eradicating security threats.
  • Contribute to creating and maintaining standard operating procedures (SOPs) and documentation related to security processes and incident handling.
  • Stay updated on cybersecurity threats, vulnerabilities, and attack techniques. Help integrate threat intelligence feeds into the SOC's monitoring processes.
  • Collaborate with cross-functional teams, including IT, network operations, and compliance, to ensure a coordinated response to security incidents.
  • Engage in continuous learning and development activities to improve technical and analytical skills in the cybersecurity field.

Qualifications:

  • Currently pursuing a degree in cybersecurity, computer science, information technology, or a related field.
  • Basic cybersecurity concepts, including threats, vulnerabilities, and attack techniques.
  • Familiarity with operating systems (e.g., Windows, Linux) and networking fundamentals.
  • Strong analytical and problem-solving skills.
  • Ability to work effectively in a team and communicate technical information.
  • Eagerness to learn and adapt to new technologies and tools.
  • Knowledge of cybersecurity frameworks and standards (e.g., NIST, CIS) is a plus.
  • Familiarity with security tools and technologies (e.g., SIEM, IDS/IPS, EDR) is a plus.

Não está pronto para se candidatar?

Se você está interessado em nossas oportunidades de carreira, mas não está pronto para se candidatar, cadastre-se em nossa rede de Talentos, fique conectado conosco e receba nossas atualizações.

Red Arrow