L1 Cyber Security SOC Analyst

YY SMART TECH PTE. LTD.


Date: 8 hours ago
Area: Singapore, Singapore
Salary: SGD 3,500 - SGD 5,000 per month
Contract type: Full time

Job Overview

We are seeking for a vigilant L1 Security Operations Center (SOC) Analyst to join our 24/7 cybersecurity team.

Operating on 12-hour rotational shifts, you will perform real-time monitoring, threat detection, and initial incident response using SIEM/XDR platforms.

The role requires foundational knowledge of network security, log analysis, and attack vectors to defend against threats while escalating complex incidents to senior analysts.

This position is critical for maintaining our security posture across global digital assets.


Duties and Responsibilities

Continuous Monitoring & Detection:

  • Monitor SIEM/XDR tools (e.g., Splunk, Sentinel, QRadar) for security alerts across networks, endpoints, and cloud environments.
  • Analyze logs from firewalls, IDS/IPS, EDR, and other security tools to identify malicious activity.

Incident Triage & Response:

  • Perform initial investigation and classification of security events (malware, phishing, DDoS).
  • Execute predefined playbooks for containment (e.g., isolate hosts, block IPs).
  • Escalate confirmed incidents to L2/L3 analysts with detailed documentation.

Threat Intelligence Utilization:

  • Apply threat intelligence feeds (e.g., MITRE ATT&CK) to contextualize alerts.
  • Monitor dark web/IoC sources for emerging threats relevant to the organization.

Reporting & Documentation:

  • Document incidents in ticketing systems (e.g., Jira, ServiceNow) with timelines, actions taken, and evidence.
  • Generate daily shift reports highlighting threat trends, false positives, and system health.

Tool Maintenance & Optimization:

  • Tune SIEM rules to reduce false positives and improve detection accuracy.
Validate security tool configurations (e.g., firewall policies, EDR rules).


    Requirements

    Education:

    • Diploma/Bachelor’s in Cybersecurity, IT, Computer Science, or related field.

    Experience & Skills:

    • More than one year in security monitoring or more than 2 years in IT support/networking with security exposure.

    Hands-on experience with:

    • SIEM/XDR platforms (Splunk, Azure Sentinel, etc.)
    • Security tools (EDR, firewalls, IDS/IPS, email security)
    • OS security (Windows/Linux log analysis)

    Understanding of:

    • Networking (TCP/IP, DNS, VPN, HTTP/S)
    • Common attack vectors (phishing, malware, brute force)
    • Cloud security fundamentals (AWS/Azure/GCP)

    Technical Certifications (Preferred):

    • CompTIA Security+, CySA+, CEH, or equivalent entry-level security certs
    • Vendor certifications (e.g., Splunk Core User, Microsoft SC-200)

    Shift Requirements:

    • Willingness to work 12-hour rotational shifts (day/night), including weekends/public holidays.
    • Ability to maintain focus during high-pressure overnight shifts.

    Soft Skills:

    • Strong analytical thinking and attention to detail.
    • Effective communication for cross-team escalation.
    • Adaptability in fast-paced threat environments.
    • Basic knowledge of ITIL/incident management processes.
    Post a CV