Share this Job
Apply now »

Cybersecurity Analyst SOC L1

About Capgemini

A global leader in partnering with companies to transform and manage their business by harnessing the power of technology. The Group is guided everyday by its purpose of unleashing human energy through technology for an inclusive and sustainable future. It is a responsible and diverse organization of 270,000 team members in nearly 50 countries. With its strong 50 year heritage and deep industry expertise, Capgemini is trusted by its clients to address the entire breadth of their business needs, from strategy and design to operations, fueled by the fast evolving and innovative world of cloud, data, AI, connectivity, software, digital engineering and platforms. The Group reported in 2020 global revenues of EUR 16 billion.


Group Cybersecurity creates and manages global security policies, tracks compliance from Business Units and Global Business Lines, provides strong communications, training and awareness campaigns to employees, designs global security architecture based on threats and market evolution, and manages Group Cybersecurity Projects and Operations.


In order to keep building the team, Group Cybersecurity is looking for a Security Analyst SOC L1.



Job Description

Professionals help to protect an organization by employing a range of security tools and technologies and processes to prevent, detect and manage cyber threats.


You will be working within a team composed of 12 people located internationally as Group Cybersecurity Operations SOC. Your primary role would be to support all activities undertaken by the Threat Intelligence pillar.


You will work with the wider team to prioritize and schedule work within your pillar. You will work with various members of the team to develop and input into technical projects, report, and oversee progress to make sure goals are met.



What you’ll be tasked with:

To be a member of the Security Operations Centre (SOC), a team who deliver specific Cybersecurity Services to the CAPGEMINI GROUP. The role is focused on delivering Intrusion Detection / Prevention services and assisting with Investigations as a result of escalated problems and security alerts from client security information & event management systems (SIEM). Additional activities include periodic and ad-hoc host Vulnerability Assessments and Application security assessments. Security policy enforcement is also key, and is achieved through various assurance activities such as auditing Firewalls, and conducting privilege account reviews etc.


You will be responsible for ensuring the integrity of client IT infrastructures and protecting the information systems residing upon them from external and internal attack / compromise.


L1 will analyse security events that have been triaged. This will involve responding to incidents and determining the appropriate next steps for the investigation and any remediation action. 


Analysts will operate as Subject Matter Experts. They will also initiate security incidents, creating tickets, and where appropriate, initiating the process leading to declaration of a major incident.


L1 Analysts will perform slow time analysis of data to identify trends or other suspicious behavior that is not captured by use cases.


They are also responsible for creation and maintenance of playbooks and other processes used by the team along with some basic SIEM administration; including improvements such as Use Case creation and onboarding of devices already supported by the platform.


  • Analytics and rule authoring
  • Fine tuning of alerting
  • Level 1 support for security incidents
  • Validate, suggest or create knowledge base articles
  • Reviews and updates SIEM security incidents, suspicious events and analyses recommendation
  • Work with L2 to decrease false positives
  • Creates/maintains dashboards, correlation rules, thresholds etc.
  • Report review



What you’ll need to excel in the role:

  • Knowledge and experience in IT Network Security
  • IP Networking
  • Experience in the use of Intrusion Detection systems, management and responding to and the tuning of alerts
  • Experience in conducting host vulnerability assessments
  • Experience in the use of SIEM platforms, preferably IBM QRadar.
  • Unix & Microsoft Administration
  • Experience in conducting application vulnerability assessments
  • Vulnerability Awareness / Understanding
  • Experience using tools such as IBM Resilient, Falcon Crowdsike, FireEye HX, VirusTotal Enterprise, Onyphe, ThreatQuotient, Shodan, etc
Ref:  1010610
Posted on:  Jan 18, 2022
Experience level:  Experienced Non-Manager
Contract Type:  Permanent Full Time

Singapore, 01, SG

Department:  Cyber Security

Apply now »