Cyber Threat Analyst (L2), Multiple Headcounts

We are currently partnering multiple clients within the Critical Infrastructure Industry to hire for multiple headcounts in Cyber Threat Analyst (L2) to strengthen their security operations and incident response capabilities within a mission-critical technology environment.
Role
In this role, you will handle escalated security alerts, conduct deeper investigations, and support end-to-end incident response activities. You will analyse data from security platforms such as SIEM, EDR, network monitoring tools, and cloud environments to identify threats, determine root causes, and recommend appropriate remediation actions. The position also involves threat intelligence enrichment, IOC-based hunting, incident documentation, process improvement, and close collaboration with L1 analysts and wider cyber security operations teams.
Requirements
- Degree or Diploma in Computer Science, Computer Engineering, Information Security, or a related discipline.
- At least 6 years of experience in a SOC, CERT/CIRT, incident response, or similar cyber security operations function.
- Strong experience in security investigations, including log analysis, event correlation, incident scoping, impact assessment, and root cause analysis.
- Hands-on exposure to incidents such as phishing, malware, credential compromise, misconfigurations, and suspicious network activity, with familiarity in SIEM, EDR, SOAR, MITRE ATT&CK, Cyber Kill Chain, CVSS, and OWASP Top 10.
- Comfortable working independently and collaboratively under pressure, with basic scripting skills in Python, Bash, or PowerShell preferred; able to support 12-hour shift arrangements based on operational needs.
To Apply
Interested candidates, please submit your resume to Grace Lim at gl@kerryconsulting.com. We regret to inform that only successful shortlisted candidates will be notified. License No: 16S8060 Registration no: R1988923
![]()
