Security Analyst L1 de Kuala Lumpur em Logicalis

Data de publicação: 12/13/2024

Resumo do Emprego

  • Tipo de Empregado:
    Full-Time
  • Localização:
    Kuala Lumpur
  • Tipo de Emprego:
  • Experiência:
    Not Specified
  • Data de publicação:
    12/13/2024

Descrição do Trabalho

Why choose Logicalis?          

  

As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability. 
 

We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth. 

Accountabilities:

  • 24x7 manning of our security monitoring systems to monitor for any security threats facing our customer environments.
  • Act as the initial point of contact for security incidents. Gather information and make evaluations and recommendations to protect our customers’ information.
  • Evaluate, research on detected security incidents, and handle triage phase of incident lifecycle management within prescribed SLAs, by leveraging runbooks.
  • Act as first escalation point during incident investigations, by responding to customers within first response time SLA, and attending to calls from our global customers.
  • Manage GSOC mailbox to ensure every customer is responded within prescribed SLA.
  • Manage ticketing platform to ensure all tickets are reviewed, updated, resolved and subsequently close security incidents tickets for our customers, within prescribed SLAs.
  • Perform sanity checks and collect all preliminary data for security incidents and escalate to next level teams.
  • Preparing monthly reports on security incident trends for our customers.


The Individual and their Experience:

  • Bachelor’s Degree in Computer Engineering, Computer Science, Cyber Security, Information Security, or other equivalents.
  • Candidate should have at least 2 years of working experience in SOC and MSS environments.
  • Proven TCP/IP networking expertise, able to articulate OSI 7 layer model and trace various attacks across the stack.
  • Excellent English communication skills (verbal and written) combined with professional telephone manner.
  • Ability to communicate verbally in Mandarin, English and Malay
  • Knowledge and/or certification on two or more of the following - Firewall, Content Filtering, Load Balancer, Web Proxy, IDS, IPS, Identity Management, Strong Authentication, Unix, Linux.
  • Knowledge on Cloud technologies such as Azure.
  • Experience with SIEM workflow and security analysis a plus.
  • Experience working within a linux shell and windows command line.
  • Customer facing experience a plus.
  • Knowledge of service management processes and procedures.
  • Strong commitment to personal and technical development.
  • Strong sense of ownership when dealing with challenging situations

Junte-se à nossa Rede de Talentos

Se está interessado em oportunidades de carreira, mas não está pronto para se candidatar, junte-se à nossa Rede de Talentos para se manter ligado a nós e receber actualizações sobre as últimas oportunidades de emprego e notícias da empresa.

Red Arrow