Senior Security Analyst (SOC Level 3)

Ensign InfoSecurity

  • Kuala Lumpur
  • Permanent
  • Full-time
  • 14 days ago
Ensign is hiring !Key Responsibilities:Lead high-severity incident response and containment activities, coordinating with stakeholders across IT and business units.Conduct in-depth forensic analysis on endpoints, networks, and logs to determine the root cause and impact of security incidents.Develop advanced detection use cases and correlation rules based on threat intelligence and TTPs (MITRE ATT&CK, etc.).Perform proactive threat hunting using SIEM, EDR, and threat intel feeds to uncover undetected threats.Review and fine-tune alerts, playbooks, and automation workflows to reduce false positives and improve SOC efficiency.Mentor L1 and L2 analysts, providing guidance, training, and quality review of investigations.Serve as a technical escalation point for complex security issues and investigations.Contribute to incident post-mortems and provide recommendations to improve security posture and processes.Collaborate with red/purple teams and engineering to simulate attacks and validate defense effectiveness.Requirements:Education & Certification:Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.Strongly preferred certifications:GIAC (GCFA, GCIH, GCIA, GDAT)CISSP, OSCP, or equivalentTechnical Skills:Deep understanding of security monitoring and detection tools (SIEM, EDR, IDS/IPS, SOAR).Strong hands-on experience in forensic tools, log analysis, malware analysis, and packet inspection.Solid grasp of attacker tactics, techniques, and procedures (TTPs), threat modeling, and behavior analytics.Familiarity with scripting or automation (Python, PowerShell, Bash) is an advantage.Experience with Windows, Linux, and cloud environments (AWS/Azure security monitoring).Soft Skills:Excellent analytical and problem-solving skills.Strong written and verbal communication, including report writing.Ability to lead investigations and influence cross-functional teams under pressure.Preferred Experience:4–6+ years of experience in SOC operations, incident response, or threat detection.Experience working in or leading incident response within a 24x7 SOC or MSSP environment.Prior involvement in threat hunting or red/purple team collaboration is a strong plus.

Ensign InfoSecurity

Similar Jobs

  • Security Operations Center Analyst (SOC Analyst)

    • Kuala Lumpur
    about the role As a SOC Analyst, you'll be responsible for: Map your knowledge to a defense in depth strategy implemented on our detection capabilities Analyze security events rais…
    • 1 month ago
  • Security Analyst (SOC Level 2)

    • Kuala Lumpur
    Responsibilities: Monitor third party security feeds, forums, and mailing lists to gather information related to the client through automated means Produce intelligence outputs to …
    • 1 month ago