• Competitive
  • Singapore
  • Permanent, Full time
  • OCBC Bank
  • 2018-09-19

SOC Analyst Tier 1 Support

SOC Analyst Tier 1 Support


SOC Analyst Tier 1 performs 24X7 monitoring using alerts from cyber defence tools such as intrusion detection system alerts, and end-point security monitoring alerts. SOC Analyst determines which security issues may have an impact on the organisation. They provide initial evaluation and escalation of incidents to Tier 2s. SOC Analysts may be tasked to perform initial / basic containment of incidents and deliver reports. Normally has 0 to 2 or more years of experience in cyber defence or a related field.

  • Knowledge of common network tools (e.g., ping, traceroute, nslookup)
  • Knowledge of cyber defence policies, procedures, and regulations
  • Knowledge of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Wide Area Network [WWAN], Wireless Local Area Network [WLAN])
  • Knowledge of SIEM, Intrusion Detection System (IDS) tools and applications
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution)
  • Knowledge of vulnerability assessment tools, including open source tools, and their capabilities
  • Knowledge of incident response and handling methodologies
  • Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
  • Knowledge of the cyber defence service provider reporting structure and processes within one's own organization
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)Language/Structured Query Language [PL/SQL]
  • Ability to interpret and incorporate data from multiple tool sources
  • Knowledge of file extensions (e.g. .dll, .bat, .zip, .pcap, .gzip)
  • Knowledge of the common attack vectors on the network layer
  • Skill in reading and interpreting signatures (e.g., Snort)
  • Knowledge of web filtering technologies
  • Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies
  • Knowledge of host/network access controls (e.g., access control list)
  • Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Dynamic Host Configuration Protocol [DHCP]) and directory services (e.g., Domain Name System [DNS])
  • Knowledge of the common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications
  • Knowledge of Windows command line (e.g., ipconfig, netstat, dir, nbtstat)
  • Knowledge of Defence-in-depth principles and network security architecture
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open System Interconnection model [OSI], Information Technology Infrastructure Library [ITIL])
  • Knowledge of signature implementation impact
  • Skill in recognizing and categorizing types of vulnerabilities and associated attacks
  • Skill in detecting host and network-based intrusions via intrusion detection technologies

Singapore Singapore Singapore SG