Deltadata Mandiri

Security Analyst

Posted: 4 hours ago

Job Description

Job Title : L1 Security Analyst As an L1 Security Analyst, you will be the first line of defense in our Security Operations Center (SOC). You will monitor and triage security events from various security tools, escalating incidents when necessary to higher-level analysts. This is a critical role for maintaining the security and integrity of our organization’s IT infrastructure.Responsibilities : Monitor SIEM and other security tools for alerts and anomalies.Perform initial triage and classification of security incidents.Escalate genuine threats to L2 analysts following incident response procedures.Maintain incident logs and documentation.Conduct basic malware analysis or URL scanning using automated tools.Follow standard operating procedures (SOPs) and assist in their improvement.Support compliance and security reporting tasks.Stay updated with emerging cyber threats and security news.Requirements : Bachelor’s degree in Computer Science, Cybersecurity, or related field (or equivalent work experience).0–2 years of experience in a SOC or IT security role.Basic understanding of networking, operating systems, and common attack vectors.Familiarity with SIEM tools (e.g., Splunk, QRadar, LogRhythm).Strong analytical and problem-solving skills.Willingness to work in shifts, including nights and weekends.Security certifications such as CompTIA Security+, or equivalent, are a plus.Job Title : L2 Security AnalystThe L2 Security Analyst plays a more advanced role in our SOC by conducting in-depth investigations of security incidents escalated by L1 analysts. You will perform root cause analysis, threat hunting, and collaborate with other teams to contain and remediate threats.Responsibilities :Investigate escalated security incidents and perform in-depth analysis.Conduct threat hunting using security data and threat intelligence feeds.Perform root cause analysis of incidents to identify gaps in defenses.Guide and mentor L1 analysts on incident response and best practices.Develop and tune detection rules in SIEM and EDR tools.Coordinate with IT and security teams to contain and remediate threats.Maintain and update incident response plans and documentation.Create detailed incident reports and deliver findings to stakeholders.Job Requirements :Bachelor’s degree in Cybersecurity, Information Security, or a related field.2–5 years of experience in a SOC or security-focused role.Strong understanding of networking, operating systems, and common security frameworks.Experience with SIEMs, IDS/IPS, EDR tools, and malware analysis.Ability to perform forensic analysis and reverse engineering (preferred).Industry certifications such as CEH, GCIA, GCIH, or CISSP (a plus).Excellent written and verbal communication skills.Ability to work under pressure and manage multiple incidents effectively.

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In