About the role

  • SOC Analyst enhancing cybersecurity operations for a global security team based in Manila, Philippines. Responsible for incident response, threat analysis, and process improvement.

Responsibilities

  • Incident response activities, security incident investigations, and working with asset owners, stakeholders, other teams, and relevant teams to develop remediation plans.
  • Investigating, documenting, and reporting on external information security threats and emerging trends.
  • Overseeing of vulnerability and risk analysis for customer IT systems, enterprise applications and cloud infrastructure.
  • Building automated alerting and remediation workflows for security issues.
  • Development of operating procedures for teams to integrate into their daily workflows to deliver secure enterprise applications and & infrastructure at scale.
  • Consulting on technical design & engineering processes for system architectures to ensure that security is a design consideration and not a feature.
  • Recommending information assurance and security solutions to support product development and customer requirements.
  • Driving the ongoing improvement of security processes and procedures.

Requirements

  • 3.5 + years in a Security Operations role with comprehensive experience in investigations and incident response.
  • Experience working within a Security Operations Centre.
  • Knowledge in using and configuring the Elastic stack (Elastic Search, Logstash, Kibana) to drive SOC operations (or equivalent SOC tech stack)
  • One or more of the following certifications are highly desired: CompTIA Security+, PentTest+, EC-Council (CEH, ECIH, CHFI, CND), Cisco CyberOps, GIAC (GCED, GCIA, GCIH), ISC2 (CISSP, CSSP) or similar security certifications.
  • Detailed understanding of threats, vulnerabilities, exploits, defences, security principles and policies.
  • Knowledge of techniques attackers use to identify vulnerabilities, gain unauthorized access, escalate privileges and access restricted information.
  • Experience analyzing event and system logs, performing packet and forensic analysis in support of intrusion analysis or enterprise-level information security operations.
  • Knowledge of security practices and essential security technologies (AV, EDR, FIM, HIPS, NIPS, SIEM, WAF/DAM, DLP, IDS/IPS).
  • Knowledge of information security protection/detection and authentication systems (firewalls, IDS, IPS, anti-virus, AD, AAD, RADIUS etc.).
  • Knowledge of Unix, Linux and Windows administration, patch deployment and system configuration and security controls.
  • Knowledge of communication protocols (HTTP, DNS, TCP/UDP) as well as the various techniques utilized by malware within an operating system for persistence and data collection.
  • Practical experience with scripting languages (e.g., Python, Perl, Bash, PowerShell).
  • Understanding of database systems, application system development and installation/implementation processes.
  • Practical experience performing vulnerability scans, risk assessments and security assessments.
  • Practical experience in the use of Tenable vulnerability assessment tool is highly desirable.
  • Understanding of virtualization technologies (e.g. VMware) and cloud environments (e.g. Azure, AWS)

Benefits

  • Health insurance
  • Retirement plans
  • Flexible work arrangements
  • Professional development

Job title

SOC Analyst

Job type

Experience level

Mid levelSenior

Salary

Not specified

Degree requirement

Bachelor's Degree

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job