Continent 8 Technologies

SOC Analyst

Continent 8 Technologies

full-time

Posted on:

Location Type: Hybrid

Location: MakatiPhilippines

Visit company website

Explore more

AI Apply
Apply

About the role

  • Incident response activities, security incident investigations, and working with asset owners, stakeholders, other teams, and relevant teams to develop remediation plans.
  • Investigating, documenting, and reporting on external information security threats and emerging trends.
  • Overseeing of vulnerability and risk analysis for customer IT systems, enterprise applications and cloud infrastructure.
  • Building automated alerting and remediation workflows for security issues.
  • Development of operating procedures for teams to integrate into their daily workflows to deliver secure enterprise applications and & infrastructure at scale.
  • Consulting on technical design & engineering processes for system architectures to ensure that security is a design consideration and not a feature.
  • Recommending information assurance and security solutions to support product development and customer requirements.
  • Driving the ongoing improvement of security processes and procedures.

Requirements

  • 3.5 + years in a Security Operations role with comprehensive experience in investigations and incident response.
  • Experience working within a Security Operations Centre.
  • Knowledge in using and configuring the Elastic stack (Elastic Search, Logstash, Kibana) to drive SOC operations (or equivalent SOC tech stack)
  • One or more of the following certifications are highly desired: CompTIA Security+, PentTest+, EC-Council (CEH, ECIH, CHFI, CND), Cisco CyberOps, GIAC (GCED, GCIA, GCIH), ISC2 (CISSP, CSSP) or similar security certifications.
  • Detailed understanding of threats, vulnerabilities, exploits, defences, security principles and policies.
  • Knowledge of techniques attackers use to identify vulnerabilities, gain unauthorized access, escalate privileges and access restricted information.
  • Experience analyzing event and system logs, performing packet and forensic analysis in support of intrusion analysis or enterprise-level information security operations.
  • Knowledge of security practices and essential security technologies (AV, EDR, FIM, HIPS, NIPS, SIEM, WAF/DAM, DLP, IDS/IPS).
  • Knowledge of information security protection/detection and authentication systems (firewalls, IDS, IPS, anti-virus, AD, AAD, RADIUS etc.).
  • Knowledge of Unix, Linux and Windows administration, patch deployment and system configuration and security controls.
  • Knowledge of communication protocols (HTTP, DNS, TCP/UDP) as well as the various techniques utilized by malware within an operating system for persistence and data collection.
  • Practical experience with scripting languages (e.g., Python, Perl, Bash, PowerShell).
  • Understanding of database systems, application system development and installation/implementation processes.
  • Practical experience performing vulnerability scans, risk assessments and security assessments.
  • Practical experience in the use of Tenable vulnerability assessment tool is highly desirable.
  • Understanding of virtualization technologies (e.g. VMware) and cloud environments (e.g. Azure, AWS)
Benefits
  • Health insurance
  • Retirement plans
  • Flexible work arrangements
  • Professional development
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
incident responsesecurity investigationsvulnerability analysisrisk analysisautomated workflowssecurity designpacket analysisforensic analysisscripting languagesvulnerability scans
Soft Skills
communicationcollaborationproblem-solvingconsultingprocess improvement
Certifications
CompTIA Security+PentTest+CEHECIHCHFICNDCisco CyberOpsGCEDGCIAGCIH