SOC Analyst

Please login or register as jobseeker to apply for this job.

TYPE OF WORK

Full Time

SALARY

PHP 70k per month

HOURS PER WEEK

TBD

DATE POSTED

Apr 25, 2024

JOB OVERVIEW

Job Title: SOC Analyst – T1 / T2
Working Hours: Fulltime Graveyard Shift (WFH Set Up)

SUMMARY:

This role is pivotal in supporting and enhancing Client's Security Operations Center (SOC). As a SOC Analyst, the focus is on three key areas:
(1) being the primary entry point for all security alerts, responsible for triaging and ensuring effective alert management,
(2) actively contributing to the operational effectiveness of the SOC
within Client's managed security services framework;
(3) playing a critical role in the analysis and resolution
of security alerts, escalations and iUpgrade to see actual info, working collaboratively with Client Operations teams.

ESSENTIAL RESPONSIBILITIES:

Alert Triage: Acts as the first point of contact for all incoming security alerts from various sources, including SIEM, IDS/IPS, and other security tools. Responsibilities include initial assessment, categorization, and prioritization of alerts based on severity and potential impact.

IUpgrade to see actual info Response Support: Perform initial investigations on security alerts to determine the root cause and potential impact. Escalate alerts, events, and iUpgrade to see actual info to the appropriate teams for further analysis and remediation.

Process Enhancement: Participates in evaluating and enhancing alert management processes, ensuring efficient and effective triage procedures.

Security Tools Operation: Involved in the basic operation and configuration of security tools like the Client Security Platform, focusing on alert management and response capabilities.

Learning and Development: Actively engages in training programs to improve alert triaging skills and overall SOC knowledge. Stay current on emerging security threats, vulnerabilities, and best practices with active commitment to professional development.

Reporting and Documentation: Assists in documenting alert activities and contributes to SOC performance reports, focusing on triage effectiveness and alert resolution.

Collaborative Teamwork: Works closely with the SOC team, providing insights and support to enhance team-wide alert management capabilities.



REQUIRED EXPERIENCE:

-Bachelor's degree in computer science, information technology, or a related field.
-2-4 years in cybersecurity roles within a Security Operations Center (SOC)
-Experience in handling and triaging security alerts.
-Familiarity with MITRE ATT&CK Framework.
-Familiarity with security frameworks and standards such as NIST 800-53, CIS Top 20, etc.
-Understanding of cloud technologies (AWS, Azure, etc.) and security fundamentals.
-Knowledge of networking and infrastructure basics.
-Tools and Technologies:
-Basic proficiency in SIEM systems.
-Exposure to IDP, EDR, and NDR tools.
-Familiarity with network analysis tools like Wireshark or tcpdump.
-Introductory scripting skills in Python, Bash, or PowerShell.
-Strong organizational and time management skills.
-Strong analytical and problem-solving skills.
-Ability to work independently and as part of a team.
-Excellent communication skills, both written and verbal.
-Ability to prioritize and manage multiple tasks and projects.

OTHER REQUIREMENTS:

T1 or T2 title will be dependent on experience.
-Flexibility of schedule is required to meet the demands of the position.
-This role will be required to work nights and weekends in rotating shifts to provide 24x7x365 coverage.

PREFERRED CERTIFICATIONS:

One or more of the following certifications are preferred.

• CompTIA – Security
• GSEC – SANS GIAC Security Essentials
• SSCP – Systems Security Certified Practitioner

To APPLY,
To APPLY, kindly send your most Updated Resume to Upgrade to see actual info

SKILL REQUIREMENT
VIEW OTHER JOB POSTS FROM:
SHARE THIS POST
facebook linkedin