About the role

  • SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.

Responsibilities

  • Monitor security consoles and SIEM dashboards 24/7 (Roaster) to identify, categorise, and prioritise security alerts.
  • Perform initial triage and deep-dive analysis of security events to determine if they are false positives or legitimate threats.
  • Conduct log analysis across various sources, including firewalls, web proxies, EDR tools, and email gateways, to reconstruct attack timelines.
  • Respond to and contain security incidents such as malware infections, phishing attempts, and unauthorised access requests.
  • Assist in the containment of compromised hosts and accounts by disabling credentials or isolating endpoints from the network.
  • Document all investigative steps, findings, and remediation actions clearly within the ticketing system for audit and compliance purposes.
  • Analyze suspicious emails and URLs reported by users to identify phishing campaigns and credential harvesting attempts.
  • Research emerging threats, vulnerabilities, and "Zero Day" exploits to understand how they might impact the organisation’s environment.
  • Support the maintenance and health monitoring of security tools to ensure consistent visibility across the network.
  • Participate in regular training and tabletop exercises to improve response times and technical proficiency.
  • Contribute to the creation and refinement of standard operating procedures (SOPs) and response playbooks.

Requirements

  • 3+ years of experience working in a 24/7 SOC (Shift Work) environment
  • Proficiency with SIEM platforms to monitor dashboards, run search queries, and filter through high volumes of log data.
  • Solid understanding of Network Protocols (TCP/IP, DNS, HTTP/S, SMTP) and the ability to interpret traffic patterns and packet captures (PCAP) to identify anomalies.
  • Hands-on experience with EDR and Antivirus tools (e.g., CrowdStrike, SentinelOne, or Microsoft Defender) for endpoint investigation and threat containment.
  • Knowledge of Common Attack Vectors and the ability to map suspicious activity to stages of the Cyber Kill Chain or the MITRE ATT&CK framework.
  • Experience with Email Security Gateways and manual analysis of email headers, attachments, and URLs to identify phishing and business email compromise (BEC) attempts.
  • Familiarity with Operating System Internals (Windows, Linux, and macOS), specifically regarding common persistence mechanisms, registry changes, and process execution.
  • Ability to perform basic Log Analysis across diverse sources, including firewalls, VPNs, web proxies, and cloud audit logs (AWS CloudTrail, Azure Activity Logs).
  • Strong documentation habits, with the ability to write clear, concise technical summaries of investigations within a ticketing system like Jira.
  • Basic Scripting skills (Python, PowerShell, or Bash) are highly preferred to assist with data parsing or minor task automation.
  • Adaptability for Shift Work, including the ability to work nights, weekends, and holidays as part of a rotating 24/7 coverage schedule.
  • Critical thinking and problem-solving skills, with the discipline to follow Standard Operating Procedures (SOPs) while identifying when an incident requires immediate escalation.

Benefits

  • Not specified

Job title

SOC Analyst II

Job type

Experience level

Mid levelSenior

Salary

Not specified

Degree requirement

No Education Requirement

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job