MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious
3

SOC Analyst Tier 1 Support

Location East, Singapore
Posted 06-June-2019
Description
Responsibilities

SOC Analyst Tier 1 performs 24X7 monitoring using alerts from cyber defence tools such as intrusion detection system alerts, and end-point security monitoring alerts. SOC Analyst determines which security issues may have an impact on the organisation. They provide initial evaluation and escalation of incidents to Tier 2s. SOC Analysts may be tasked to perform initial / basic containment of incidents and deliver reports. Normally has 0 to 2 or more years of experience in cyber defence or a related field.


Qualifications
Knowledge of common network tools (e.g., ping, traceroute, nslookup)Knowledge of cyber defence policies, procedures, and regulationsKnowledge of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Wide Area Network [WWAN], Wireless Local Area Network [WLAN])Knowledge of SIEM, Intrusion Detection System (IDS) tools and applicationsKnowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution)Knowledge of vulnerability assessment tools, including open source tools, and their capabilitiesKnowledge of incident response and handling methodologiesKnowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)Knowledge of the cyber defence service provider reporting structure and processes within ones own organizationKnowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)Language/Structured Query Language [PL/SQL]Ability to interpret and incorporate data from multiple tool sourcesKnowledge of file extensions (e.g. .dll, .bat, .zip, .pcap, .gzip)Knowledge of the common attack vectors on the network layerSkill in reading and interpreting signatures (e.g., Snort)Knowledge of web filtering technologiesKnowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologiesKnowledge of host/network access controls (e.g., access control list)Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Dynamic Host Configuration Protocol [DHCP]) and directory services (e.g., Domain Name System [DNS])Knowledge of the common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communicationsKnowledge of Windows command line (e.g., ipconfig, netstat, dir, nbtstat)Knowledge of Defence-in-depth principles and network security architectureKnowledge of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open System Interconnection model [OSI], Information Technology Infrastructure Library [ITIL])Knowledge of signature implementation impactSkill in recognizing and categorizing types of vulnerabilities and associated attacksSkill in detecting host and network-based intrusions via intrusion detection technologies

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url