Search by job, company or skills

K

SOC Analyst

1-6 Years
Save
new job description bg glownew job description bg glownew job description bg svg
  • Posted 11 days ago
  • Be among the first 30 applicants
Early Applicant
Quick Apply

Job Description

SOC Analyst (Level 1 & Level 2)

Onsite | Kuala Lumpur

Employment Type: Contract


About the Role

We are looking for motivated and skilled SOC Analysts (Level 1 & Level 2) to join our Security Operations team. In this role, you will be responsible for monitoring, analyzing, and responding to cybersecurity incidents using Microsoft Sentinel and related security tools.

This is a great opportunity to work in a fast-paced SOC environment and play a key role in protecting critical systems and digital assets.


Position 1: SOC Analyst – Level 1

Key Responsibilities

  • Monitor and analyze security alerts using Microsoft Sentinel and other SIEM tools
  • Perform initial triage, validation, and classification of alerts
  • Escalate suspicious or confirmed incidents to Level 2 analysts
  • Follow predefined playbooks and incident response procedures
  • Document incidents and investigation details in ticketing systems
  • Ensure proper shift handover and continuous monitoring coverage

Requirements

  • 1–3 years of experience in SOC or security monitoring
  • Basic understanding of SIEM tools and incident handling
  • Familiarity with Microsoft Sentinel and KQL is an advantage
  • Willingness to work in a shift-based, onsite environment

Position 2: SOC Analyst – Level 2

Key Responsibilities

  • Investigate and correlate security alerts using Microsoft Sentinel
  • Perform threat hunting and root cause analysis across multiple log sources
  • Lead incident response and containment activities
  • Develop and optimize detection rules, KQL queries, and SOAR playbooks
  • Provide guidance and support to Level 1 analysts
  • Prepare incident reports and recommend security improvements

Requirements

  • 3–6 years of experience in SOC operations or incident response
  • Strong hands-on experience with Microsoft Sentinel and KQL
  • Experience in threat hunting, log correlation, and incident investigation
  • Knowledge of MITRE ATT&CK framework and cybersecurity best practices

More Info

Job Type:
Function:
Employment Type:
Open to candidates from:
Malaysian

About Company

Kamlax Global Technologies is a leading IT services & business solution provider delivering cutting edge technology solutions to enterprises across the world.
we add value to organizations through a synergy of skills, technology insight, innovation, products and services that orchestrate our customer's business to perfection. Our expertise bridges the gap between the businesses and IT and offers detailed, process-driven solutions enabling our customers to enhance productivity and achieve better ROI.

Job ID: 145787599

Similar Jobs