top of page

Security Officer Centre Analyst
(SOC) Manager

Full-Time (Permanent)
Location: Shah Alam

Job Responsibilities

  • Responsible for hiring and training SOC staff, in charge of defensive and offensive strategy.

  • Manage resources, priorities and projects.

  • Manage the team directly when responding to business-critical security incidents. The organization point of contact for security incidents, compliance, and other security-related issues.

  • Responsible for the SOC team and direct SOC operations and responsible for syncing between analysts and engineers; hiring; training; and creating and executing on cybersecurity strategy.

  • Direct and orchestrate the company’s response to major security threats.

Requirements

  • Bachelor's/Master's Degree in Computer Science or Computer Engineering, Information Security, Information Systems, Information Technology

  • Must have management skills, incident response management training, and strong communication skills.

  •  Experience with penetration testing tools and cross-organization data visualization.

  • Malware reverse engineering, experience identifying and developing responses to new threats and attack patterns.

  • Minimum 10 years of experience including below:

  • Ability to perform and speak regarding log analysis, use of IDS, IPS, and/or other signature technology

  • Provide 1st and 2nd -level troubleshooting support for security applications and appliances

  • Provide threat and vulnerability analysis security advisory services

  • Performs information security assessments or audits of internal networks and systems

  • Serves as team lead, driving goals and performance for Level 1 and Level 2 SOC analysts, managing vacation requests, time off requests, and other HR related requests

  • Be a leader in the expansion and growth of the SOC

  • Collaborate with client technical teams for issue resolution and mitigation

  • To integrate information and network security solutions

  • To analyze various methods of controlling information security problems, determine the strengths and weaknesses of each method and implement the best cost justified solution

  • To identify weak links in information security products, and determine how to mitigate the control deficiencies

Personal Attributes

  • Willing to travel for customer support related assignment.

  • Motivated, independent, team player and able to build and maintain good relationship with customer.

  • Fluent in oral and written English.

  • Possess good presentation skills.  

bottom of page