As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights.
The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry.
The brand refresh underpins both the evolution of Logicalis' positioning as well as our strategic vision for growth.
The role is part of our Global SOC team, tasked to deliver Managed Security Services (MSS) and help customers achieve their business goals & objectives by re-imagining cybersecurity as one of its business enablers.
The role reports to SOC vertical based in Singapore.
This is a great opportunity to put your past experiences in building a world-class SOC and address cybersecurity challenges of organizations in the region.
It provides exposure to a wide variety of security technologies and offers the candidate the chance to pioneer in developing SOC and build new MSS offerings.
Accountabilities:
Work in a 24x7 shift environment to handle security incidents and provide level two (L2) support during analysis & investigations to identify the root cause.
Provide detailed remediation recommendations to customers for the incidents within agreed SLAs, and if required, assist them during remediation implementation.
Execute SOC playbooks and knowledge base to minimize the security incident impact and perform detailed investigations on the infected assets.
Escalate critical incidents to the 3rd level support team for further analysis & investigations, demonstrating excellent collaboration skills for timely resolution to minimize impact to customers.
Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers.
Prepare SOC monthly reports, which include customization based on business requirements, and present them to customers during monthly meetings, highlighting risks and mitigation plans.
Enable regional L1 Security Analysts to deliver seamless L1 support by developing SOC playbooks and a relevant and sufficient knowledge base.
The Individual and their Experience:
Candidate should have at least 3 years of experience working in SOC and MSS environments, with a Bachelor's degree in Computer Science/IT/Information Security.
Excellent hands-on experience in incident analysis using SIEM platforms such as Microsoft Sentinel and IBM QRadar.
Hands-on experience with any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies, preferably Microsoft Defender or CrowdStrike.
Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, and Fortinet.
Good understanding of WIN and LINUX environments and well-versed with basic LINUX commands and troubleshooting, with proven Unix (Solaris, Linux, BSD) experience.
Knowledge of any shell scripting language and the ability to apply them to automate mundane operations tasks.
Candidate should have at least one cybersecurity industry certification such as CEH or CHFI.
Good understanding of basic network concepts, with an advantage for exposure to cloud technologies.
Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL standards.#J-18808-Ljbffr
Built at: 2025-03-28T04:00:33.818Z