Flag job

Report

Security Analyst (SOC)

Salary

₹0.5 - 0.7 LPA

Min Experience

0 years

Location

Kembangan, Jakarta, Indonesia

JobType

full-time

About the job

Info This job is sourced from a job board

About the role

Job Descriptions

  • Monitor SOC operations on a 24/7 shift basis.
  • Provide subject matter expertise to enhance the organization's security posture across all domains (identify, detect, prevent, respond, and recover).
  • Develop, verify, and refine security rules for automated detection and remediation.
  • Maintain security tools and processes for protection, monitoring, and remediation activities.
  • Manage the ticketing system, including creation, workflow management, and issue resolution.
  • Investigate security events and incidents, gather evidence, and collaborate with cross-functional teams to isolate and/or remediate as necessary. Document best practices identified as a foundation for continuous improvement to prevent similar issues.

Qualifications

  • Bachelor's degree (S1) in Computer Science, Information Technology, or a related field, coupled with demonstrable honesty and integrity.
  • Proficiency in QRadar, security tools, and security devices (e.g., XSOAR, Palo Alto, SIEM, IPS, IDS, proxy).
  • Familiarity with forensic investigation, cybersecurity principles, network security, and vulnerability management.
  • Strong command of operating systems (Windows, Linux, Unix) and the ability to operate within a terminal environment.
  • Understanding of and prior experience in log monitoring and reporting.
  • Familiarity with rules, signature bases, and the ability to develop use cases (playbooks).
  • Possession of relevant cybersecurity certifications (e.g., CHFI, CND, CEH).
  • Prior experience in the IT field, either freelance or employed, is a plus
  • Demonstrated proficiency in discussing technical findings in both formal Indonesian and English.

Skills

qradar
security tools
security devices
forensic investigation
cybersecurity principles
network security
vulnerability management
operating systems
log monitoring
reporting
rules
signature bases
use cases
playbooks