Job Summary
You will serve as the first line of defense in monitoring and responding to security incidents involving cloud and data center infrastructure. You will work with SIEM/EDR systems and collaborate with senior-level teams to analyze events, investigate alerts, and perform initial incident response.
Responsibilities
• Monitor and analyze alerts from SIEM systems, Cloud Security Tools, and EDR on a 24x7 basis
• Perform initial alert triage to distinguish true security incidents from false positives
• Review and analyze logs from cloud services such as AWS, Azure, and GCP
• Follow the Incident Response Playbook, including actions like isolating endpoints, disabling user accounts, and blocking IP addresses
• Document incidents and generate comprehensive Incident Reports
• Coordinate with Tier 2 Analysts or Security Engineers for incident escalation as needed
• Work in shifts and respond to security incidents in accordance with defined SLAs
Qualifications
• Bachelor's degree in Computer Engineering, Computer Science, Information Technology, or a related field
• Basic understanding of cybersecurity concepts such as threat types, CIA triad, and attack lifecycle
• Ability to analyze logs, including firewall logs, CloudTrail, and authentication logs
• Willingness to work in shifts and strong work discipline
• Ability to learn new tools and technologies, and work effectively in a team
Preferred
• Experience with SIEM tools such as Splunk, Microsoft Sentinel, or Elastic
• Basic experience with AWS, Azure, or Google Cloud, especially in areas like IAM, Security Groups, and Log analysis
• Certifications such as CompTIA Security+, Microsoft SC-900, AWS Cloud Practitioner, or other cybersecurity-related certifications
Benefits
• Shift-based work schedule (8–12 hour shifts, with shift allowance or overtime pay)
• Ongoing training in Cybersecurity and Cloud Security
• Career growth opportunities to Tier 2 Analyst, Threat Hunter, or Cloud Security Engineer
เป็นไปตามนโยบายของทางบริษัทกำหนด