Job Openings
SOC Analyst
About the job SOC Analyst
Responsibilities:
a) 24/7 Incident Response
- Perform triage, assess severity of incidents
- Investigate and contain security incidents
- Execute predefined response procedures
b) 24/7 Alerts Monitoring
- Continuously monitor security alerts, logs, and network traffic
- Identify potential threats or anomalies
c) Suspicious Email Analysis and other Security Validations
- Respond to reported suspicious emails
- Analyze suspicious emails, trigger email threat remediation actions
- Perform validations for reported suspicious activities and other cybersecurity concerns
- Provide recommendations on analyzed concerns
d) Documentations and other tasks
- Assist in developing and executive Recovery Plan
- Participate in investigations or forensics activities
- Participate in change management processes
- Assist in troubleshooting hardware and software issues of Collectors and MXDR agents
- Documentation of Incident Reports, weekly/monthly reporting, maintenance of trackers and other relevant documents
- Detection Rules review and configuration
e) Threat Intelligence duties
- Performance relevant Threat Intelligence team responsibilities such as, but not limited to:
- Indicators of compromise (IOCs): Collect, analyze, disseminate, and initiate blacklisting
- Compromised accounts: Monitor and validate Client's password leaks
- Brand protection initiatives: hunting of trademark infringements and other violations, impersonations, and sales scams. Perform validations, request for takedown, and monitoring
Others:
- Threat Intel publications and release of advisories, and other reports
- Monitor releases of new vulnerability advisories, disseminate and track
- Monitor of other potential leaks relating to Client (e.g. code repository, database, etc.)
- Implement and enforce security policies, procedures, and best practices.
- Track and validate security controls, addressing deviations and risks
- Mid-level SOC should be experience in L2 incident response such as containment, isolation, root cause analysis and deep probing analysis. Has experience in cyber threat intelligence is an advantage.
- Senior-level SOC should be experienced in L2 (see mid-level); and/or L3 threat hunting; Team management;
- Ideal to have: use case development, and use of cyber threat intelligence.
- Good-to-have competency related to governance and enforcement: Implement and enforce security policies, procedures, and best practices; Track and validate security controls, addressing deviations and risks; proficiency in process and documentation.
Qualifications:
- Bachelor Graduate of Computer Science, IT or other related course
- Have at least 3- 5 years - Mid level and 6-7 years for Senior as a SOC Analyst or Security Engineer
- Amendable to work 100% onsite in Ortigas and shifting
- Proficient in documentation, strong incident, attack response and containment skills.
- Threat hunting or Threat intelligence is an advantage