SOC Analyst
🚀 Founded in 2016 Ekco is now one of the fastest growing cloud solution providers in Europe!
About Ekco:
🚀 Founded in 2016 Ekco is now one of the fastest growing cloud solution providers in Europe!
We specialise in enabling companies to progress along the path of cloud maturity, managing transformation and driving better outcomes from our customers’ existing technology investments.
☁️ In a few words, we take businesses to the cloud and back!
🌍 We have over 600 highly talented and supportive colleagues (and counting) across a number of regional offices in the UK, Netherlands, Ireland & Malaysia.
About the role:
We are seeking a highly skilled and motivated Security Operations Center (SOC) Level 2 Analyst with advanced proficiency in Microsoft Sentinel. The successful candidate will play a pivotal role in enhancing our organization's cybersecurity posture, with a focus on incident analysis, investigation, and response using Microsoft Sentinel
Responsibilities
Incident Analysis
• Utilize Microsoft Sentinel to conduct in-depth analysis of security incidents and alerts.
• Investigate and assess the scope, impact, and root cause of incidents, providing detailed reports
Incident Response
• Actively participate in incident response activities, coordinating with Level 1 and Level 3 analysts.
• Develop and execute comprehensive incident response plans, ensuring efficient containment and eradication.
Threat Hunting
• Proactively hunt for potential security threats and vulnerabilities using Microsoft Sentinel.
• Stay informed about emerging threats and provide recommendations for enhancing detection capabilities
Security Operations
• Serve as a subject matter expert on Microsoft Sentinel, providing guidance to Level 1 analysts.
• Collaborate with other security teams to implement and enhance security controls.
• Develop and maintain detailed documentation, including playbooks and standard operating procedures
Continuous Improvements
• Identify opportunities for process improvement within the SOC, contributing to the enhancement of workflows and tools.
• Stay current with industry trends, new threats, and advancements in cybersecurity Requirements
• Bachelor's degree in Cybersecurity, Information Technology, or a related field (or equivalent work experience).
• Minimum of 3 years of experience in a SOC Level 2 environment, with a focus on incident analysis and response.
• Advanced expertise in working with Microsoft Sentinel for security monitoring and incident investigation.
• Strong understanding of cybersecurity principles, threat intelligence, and incident response best practices.
• Relevant certifications such as CompTIA Security+ CySA+, Microsoft SC-200, GIAC Certified Incident Handler (GCIH), or equivalent would be an advantage.
• Proficient in scripting and automation for SOC tasks (e.g., PowerShell).
• Strong analytical and problem-solving skills with meticulous attention to detail Bonus points if you have:
• Familiarity with cloud security concepts and platforms, especially Microsoft Azure.
• Experience with other SIEM solutions and security tools.
• Knowledge of network protocols, firewall technologies, and intrusion detection/prevention systems.
• Familiarity with regulatory requirements and frameworks (e.g., GDPR, NIST, ISO 27001),
Why Ekco
- ⭐️Microsoft’s 2023 Rising Star Security Partner of the year
- 🚀VMware & Veeam top partner status
- 🏅Ranked as 4th fastest growing technology company in the Deloitte Fast50 Awards
- 🌈Ekco are committed to cultivating an environment that promotes diversity, equality, inclusion and belonging
- 🎉We recognise the value of internal mobility and encourage opportunities for internal development & progression
- ✨Flexible working with a family friendly focus are at the core of our company values
- Department
- Technical Delivery
- Locations
- Kuala Lumpur - Malaysia