Match score not available

SOC Analyst 1

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Bachelor's degree in Information Technology or equivalent experience preferred., Strong verbal and written communication skills, fluent in English., Experience with Security Information and Event Management (SIEM) tools is a plus., Basic knowledge of Linux operating systems and scripting skills in Python or PowerShell are desirable..

Key responsabilities:

  • Initial triage of security events using established procedures and tools.
  • Assist senior SOC members with analyzing and responding to potential security incidents.
  • Document threat campaign techniques and manage security monitoring tools.
  • Conduct security research and participate in shift-transition calls for case management.

Remote Employee PH logo
Remote Employee PH Human Resources, Staffing & Recruiting Scaleup https://www.remoteemployee.ph/
201 - 500 Employees
See all jobs

Job description

Remote Employee BPO has a great opportunity for you!

Role: SOC Analyst I 

Salary: Competitive Basic Salary

Benefits: HMO plus 2 Free Dependents, P1,500 Rice Allowance, Night Differential.

Shift schedule: Sunday 5AM - 2PM and Monday Thursday 12AM - 9AM PHT.

Day Off: Tuesday, Friday, Saturday

Work set up:  Work from Home


Duties and Responsibilities: 

The SOC Analyst (Level 1) is responsible for:

  • Initial triage of security events using established procedures, tools and monitoring platforms including, but not limited to:
    • Firewalls and network devices
    • Servers and workstations
    • Web proxies
    • Intrusion detection and prevention systems (IDS/IPS)
    • Anti-malware systems
    • Security Incident and Event Management systems (SIEM)
    • Data Loss Prevention systems (DLP)
    • Advanced Endpoint Detection and Response systems (EDR)
    • External communications from outside entities, users, phone calls, emails.
  • Assist senior members of the SOC with analyzing and responding to potential security incidents
  • Maintain situational awareness of emerging cyber trends by reviewing open-source reports for recent vulnerabilities, malware, and other threats that have the potential to impact our client organizations.
  • Document threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs).
  • Manage the Security monitoring tools, set up dashboards and alerts.
  • Develop and maintain technical documentation and Standard Operating Procedures (SOP).
  • Conduct security research and intelligence gathering on emerging threats and exploits.
  • Participate on shift-transition calls to ensure all open cases and tasks are properly managed and addressed.
  • Periodic reporting of metrics and corresponding analysis for client review and strategic information security program adjustments and planning.
  • Maintenance and management of various security technology platforms including Crowdstrike and Microsoft Sentinel.

Qualifications: 

  • Highly motivated to work in information security
  • Customer oriented & professional.
  • Strong verbal and written communication skills, fluent in English.
  • Ability to understand and correlate data from multiple sources, not limited to user authentication events, windows security event logs, syslog, NetFlow/PCAP data, DHCP logs, DNS logs, intrusion detections alerts, proxy logs, packet captures, and firewall events.
  • Knowledge of various security methodologies and processes, and technical security solutions is a plus.
  • Understanding of how both Windows, Linux and network platforms are compromised is a plus.
  • Experience as a Security/Network Administrator or equivalent knowledge. Previous Security Operations Center (SOC) experience is a plus.
  • Experience with Security Information and Event Management (SIEM) tools is a plus.
  • Regular expression creation experience to support dynamic security event analysis.
  • Solid understanding of IP networking fundamentals, including IPv4, TCP/IP, LAN/WAN design theory, static and dynamic routing protocols, NAT, ACLs, etc.
  • Solid Understanding of TCP/IP, the OSI Model, and underlying Protocols.
  • Scripting language skills in Python or PowerShell are a plus.
  • Understanding of cyber forensics concepts, including malware, hunt, etc. a plus.
  • Understanding how to interpret vulnerability and penetration scan results a plus.
  • Configuration and knowledge of design and implementation concepts of firewall, VPN, IPS, vulnerability management platforms, and other security technologies is desirable
  • Bachelors degree in Information Technology or equivalent experience preferred; background will be considered in lieu of formal education.
  • Competency with Microsoft Operating Systems, including server and workstation and AD engineering and administration capabilities, is desirable
  • Basic knowledge of Linux operating systems (command line and GUI) is a plus
  • Expected to stay current on security industry trends, new threats and attack techniques, mitigation techniques, and emerging security technologies
  • Type at least 40 words per minute
  • Flexible schedule for working on nights and weekends.


Required profile

Experience

Industry :
Human Resources, Staffing & Recruiting
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Communication
  • Problem Solving

Related jobs