Banner Default Image

SOC Analyst III

Back to job search

SOC Analyst III

  • Location:

    Pasig

  • Sector:

    Monroe Information Technology

  • Job type:

    Permanent

  • Salary:

    PHP100000 - PHP120000 per month + PHP 2,000 non taxable allowance

  • Contact:

    April Olavides

  • Contact email:

    april.olavides@monroeconsulting.com.ph

  • Job ref:

    BBBH402510_1660787056

  • Published:

    about 2 months ago

  • Expiry date:

    2022-10-17

  • Client:

    Monroe Consulting Group

Executive search firm Monroe Consulting Group Philippines is recruiting on behalf of a global technology company that is delivering truly prominent IT solutions, IT Design, IT Management, Data Security, Business Reform, and Infrastructure Plan for enterprises. Due to the company's expansion to EMEA and Manila, our respected client is currently looking for an IT professional with experience for the SOC Analyst III job. The company is based in Pasig, Metro Manila, Philippines, that currently offers WFH set-up with night shift work hours and devices/equipment will be provided.

The SOC Analyst is responsible for day-to-day Cybersecurity monitoring utilizing the company's security tools that are used to monitor and secure our clients' business. Incumbents are accountable for detecting threats, creating incident tickets, assisting with the response process, assisting the team in developing threat detection and prevention capabilities, and equipping clients to optimize their cybersecurity incident response capabilities. The SOC Analyst will participate in a team of analysts.

Job Summary:

The Sr SOC Analyst is responsible for detecting and reporting cybersecurity incidents to clients. Incumbents are accountable for defining threat prevention, detection, and response processes, developing system specifications to maximize threat detection and prevention capabilities and equipping clients to optimize their cybersecurity incident response capabilities. The Sr SOC Analyst is responsible for gathering intelligence from the client, building and maintaining a client threat profile, and maintaining a relationship with the client to aid in the ability to prevent and detect threats within the client's environment. The Sr SOC Analyst is also responsible for identifying automation opportunities both for the SOC incident handling and for an automated response.

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform essential functions.

Job Responsibilities:

  • Participate in the daily cybersecurity threat monitoring of the Company's Managed Security Services (MSS) clients.
  • Act as lead for critical incident escalations and guide SOC staff and clients
  • Gather intelligence from clients and via open sources to build threat profiles for each client.
  • Perform threat analysis on events reported by security technologies supported by MSS.
  • Perform threat hunting within events and raw logs stored within technologies supported by MSS.
  • Identify indicators of compromise within threat events.
  • Enrich threat events with intelligence from multiple technologies, open-source intelligence sources, and knowledge of the client environment.
  • Configure automation within the SOAR toolset and identify opportunities for automation within the SOC
  • Report specific, measurable, achievable, relevant, and timely cybersecurity incidents to clients.
  • Design and implement technical and process solutions for maximum threat prevention, detection, and reporting capabilities.
  • Build and maintain a relationship with each client to maximize threat prevention, detection, and reporting capabilities for their environment
  • Provide the client's cybersecurity incident response team with intelligence from the tools MSS manages to equip them for optimal cybersecurity incident response and recovery
  • Document, review, edit, and present cybersecurity incident reports for audiences with broad degrees of cybersecurity and technical acumen
  • Document problems and resolutions for future reference.
  • Coach and train junior SOC analysts and SOC engineers

Job Requirements:

  • Bachelor's Degree in Cybersecurity, Computer Science, Information Technology, or similar.
  • The position requires 5-7 years of hands-on experience within a similar industry.
  • Familiarity with the following systems required: SIEM, SOAR, Next Generation Firewall, End Point Protection, Vulnerability Scanning, Operating Systems (Windows, Linux), and other common IT platforms and cybersecurity tools.
  • Familiar with scripting languages such as Python
  • Must have a proven track record of working cohesively with clients and other team members.