176 Cybersecurity jobs in Manila
Threat Intelligence Manager
Posted today
Job Viewed
Job Description
I. PURPOSE
Execute activities that will improve existing operations and operationalize new service portfolio to achieve service excellence, operational efficiency, business profitability, and retention of customers.
II. DUTIES AND RESPONSIBILITIES
Accomplish all assigned tasks by the management in a timely and effective manner as deemed necessary for the betterment of the organization.
Manage teams and ensure accordance with the support and operations' policies, protocols, and procedures.
Oversee the 24x7x365 management of teams and overall performance and reliability of the shift.
Ensure effective and efficient processes are followed, and that proper escalation protocols are in place and complied with by the teams.
Prepare shift hand over report. Hand over open and ongoing events, incidents, and escalations to the next shift.
Collaborate and contribute with other managers in improving workflows, documentations, standards, and processes.
Accountable for the growth of team members and ensuring succession plan is in place.
Evaluate the skill sets of each group member and give recommendations to the MSS Manager for growth.
Responsible/Accountable in providing input to training and certifications plan for his direct reports and ensure that the entire group is covered according to business operations need.
Conduct performance review of team members.
Contribute to the knowledge and information relevant to Operations.
Participate in activities promoting a harmonious working environment such as demonstrating trust and respect and practicing open communication.
Comply with company policies, guidelines, standards, and procedures.
Professionally represent Trends management; enriching client relationships and providing expertise, composure, and competence.
Perform all other duties and tasks as assigned by the MSS Manager.
Threat Intelligence
- Monitor the displayed information on the Threat Intelligence Platform (TIP) related to emerging threats, vulnerabilities, campaigns, etc.
- Conduct research using the Threat Intelligence Platform (TIP) or any other relevant source of information such as open-source, proprietary or commercial information to gather cyber and IT information about threats, vulnerabilities, and/or any other party that needs to be monitored for awareness.
- Monitor, utilize the collected data, and report to the client if affected by pre-NVD and zero-day vulnerabilities.
- Utilize Threat Intelligence Platform's threat intelligence card and advanced queries for deeper and more contextual investigation.
- Investigate information on the intention to target clients, their industry like major activist campaigns, and indications of activism and all relevant intelligence against the clients.
- Perform industry peer comparison and determine the trending attack methods.
- Prepare and submit the following reports based on frequency:
- Operational Intelligence Report (Weekly Digest)
- Tactical Intelligence Report (Daily Digest)
- Incident-related Reports (Adhoc)
- Other operational report as directed by the business
- Lead the team in establishing cyber protection programs and activities.
- Perform as lead researcher, giving guidance to team on where, what, and how to dig information.
- Review materials prepared and written by the team.
- Create analyst notes (or validated research documents) and collaborate with other members of the team for verification of reports.
- Detect, report, and request for takedowns of servers launching phishing attacks, fake applications that impersonate legitimate ones from app stores, malicious websites, or fraudulent social media accounts.
- Report any brand attack and data leakage detection from the solution with corresponding mitigating actions.
Threat Hunting
- Configure tools and detect patterns/outliers within client environments matching tactics, techniques, or procedures (TTPs) of known threat actors, malware or other unusual or suspicious behaviors.
- Conduct cyber hunts in support of identifying emerging threats on behalf of multiple clients, often operating as a lead investigator.
- Provide expert analytic investigative support for large-scale and complex security incidents across multiple clients and support the TOC team through the investigation, recommendations, response, and post-mortem efforts.
- Monitor multiple client environments and investigate & report on emerging threats.
- Work with internal teams on orchestration & tool-based enablement and optimization of team processes supporting overall service delivery.
- Conduct dynamic and static malware analysis on samples obtained during incident handling or hunt operations to identify IOCs.
- Contribute to documenting simple and reusable hunt tactics and techniques for the extended and shifting team delivering threat services.
- Engage with client POCs as necessary to help them truly mature and optimize their security architecture, primarily from a risk management and incident response perspective.
Availability Management
- Manage monthly shift schedules, create appropriate shift design, manage conflicts within the shift, design operational process guidelines, and ensure cascade and understanding of the shift being managed as compliance to agreed levels of availability of people and processes needed for Operations delivery.
- Operationalization of management defined metrics and reporting compliance.
- Ensures that tools being used are appropriate for the agreed service level targets for availability such as tools for role-based access design, availability reporting, and design testing.
Capacity Management
- Determine and report the capacity and performance of people, processes, and organizational controls, and ensure resolution of issues through tactical adjustment of operational processes, people, and platform.
- Work with other managers to gather data and develop strategies as input to the business plan and execute these strategies to deliver the service and plans for short, medium, and long-term business requirements.
IT Service Continuity Management
- Perform the role assigned in the Business Continuity Plan (BCP).
- Create and perform adjustments in the operational processes in compliance with the Business Continuity Plan (BCP) objectives to ensure service delivery objectives are met in case of a disaster.
- Provide input to the Operations' Business Impact analysis to reduce risks to an acceptable level and plan for the team's recovery.
Risk Management
- Execute risk treatment plans for people and processes needed for Operations.
Service Level Management
- Ensure compliance of Service Level Agreements with clients.
- Manage the performance of team members in Internal Support
- Monitor and report on Operational Service Levels.
Change Advisory Board
- Approve Method of Procedures to be presented during Managed ICT Services Change Advisory Board meetings.
- Participate in client Change Advisory Board meetings.
- Advise client during Operational discussions on the possible impact, risks, and effects of proposed client changes.
- Create advisories on the possible impact, risks, and effects of proposed client changes.
- Provides Method of Procedure/s and other documentation to clients whenever necessary.
Configuration Management
- Responsible for accepting Configuration Items (CI) and other relevant information of Transitions.
- Sign off CI of client assets and its components as part of Operations, and handover CI and other relevant information to Transitions for Offboarding.
Client Support
- Ensure that the team members are:
- Performing triage on received events and incidents.
- Handling cases assigned.
- Undertaking immediate effort/s to restore a failed service of a Managed Service client as quickly as possible.
- Performing brand monitoring and takedown requests.
- Handling escalation and follow-ups until resolution.
- Review Incident and Root-Cause-Analysis (RCA) Reports.
Client Incident Management
- Review operational playbooks to detect, analyze, eradicate, remediate, and recover from client cybersecurity incidents.
- Guarantee that quality of service incidents is reviewed and adjusted according to client needs, agreed standards and frameworks.
- Lead resolution of P1 and P2 incidents.
- Review RCA Reports and ensure Corrective Actions/Preventive Actions (CA/PA) are executed.
Client Access Management
- Performs authorization of users' right to access client assets, while preventing access to non-authorized users.
- Essentially executes Terms and Conditions of the client.
Client IT Asset Management
- Ensure that clients' managed assets are accounted for, maintained, upgraded (if within scope), and that lifecycle is monitored.
- Provides reports and recommendations to the Client, Service Delivery Manager/s, and other relevant stakeholders.
Client Problem Management
- Leads P1/P2 RCA and ensure CA/PA is implemented on time.
- Ensure shift compliance with contractual Problem Management deliverables.
- Acts as the Problem Manager for P1/P2 incidents:
- Manage the lifecycle of all identified problems.
- Prevent recurring incidents from happening and minimize the impact of recurring incidents that cannot be prevented.
- Maintain information or Knowledgebase about Known Errors and Workarounds.
- Identify Problem records.
- Attend Problem Management meetings with the MSS Manager.
Process Management
- Create, share, use, and manage the documented processes of Service Operations, and ensure that these processes are being followed.
Knowledge Management
- Responsible in updating the knowledge and information pertaining to existing Clients and clients' Managed ICT assets.
Continual Service Improvement Management
- Execute improvement plans of the people and processes of Operations at a tactical level.
- Review and approve tactical and operational changes and ensure its deployment.
- Ensure the quality of data and content of tickets are reviewed.
III. QUALIFICATIONS
A. Minimum Education
- Must be a graduate of any IT related bachelor's degree such as:
- Computer Studies
- Computer Engineering
- Information Technology
- Electronics Engineering
B. Minimum Experience/Training
- Have at least 5 years of working experience in a 24x7x365 Security Operations Center.
- Trainings and/or certifications on at least 2 of the following domains are required:
- IT Service Management
- IT Infrastructure (Network, Servers, Cloud, etc.)
- Cybersecurity and/or Information Security
- Threat Intelligence Certifications i.e. CTIA, GCTI, CCTIA
- eCTHPv2 or other related certification
- OSINT/Threat Intelligence Trainings
C. Competency
(F) - Familiar / 0-12 months
(N) - Novice / 1-2 years
(I) - Intermediate / 3-4 years
(A) - Advanced / > 5 years
KNOWLEDGE
(A) Knowledge of cybersecurity and privacy principles.
(A) Knowledge of computer networking concepts and protocols, and network security methodologies.
(A) Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
(A) Knowledge of cyber threats and vulnerabilities.
(A) Knowledge of specific operational impacts of cybersecurity lapses.
(A) Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
(A) Knowledge of system administration, network, and operating system hardening techniques.
(A) Knowledge of MITRE ATT&CK Framework and NIST SP800-61
TECHNICAL SKILLS
(A) ITIL
(A) Networking Fundamentals
(A) Operating System Fundamentals
(A) Application/Web Programming
(A) Enterprise Application Architecture
(A) Cybersecurity Fundamentals
(A) Secure Network Architecture
(A) Application Security & Secure Coding Practices
(I) Identity & Access Management Principles
(A) Cryptography & Encryption Technologies
(I) Perimeter Defense Technologies
(I) End-Point Protection Technologies
(A) Vulnerability Scanning & Ethical Hacking
(A) Advanced Persistent Threats & pattern modeling
(A) Forensic Investigation
(N) Dark web Surfing & Intel Gathering
COMMUNICATION SKILLS
(A) Speaks clearly and can be easily understood.
(A) Expresses & speaks ideas in a logical and organized sequence.
(A) Writes clearly, concisely, and effectively.
(A) Expresses ideas in a logical and organized sequence in written form.
IV. WORKING CONDITIONS
Reporting to the company's main office in Makati City.
Shifting schedule.
Collaborate physically and/or virtually with internal and external stakeholders.
May travel for company-sponsored conferences and related marketing events.
Attend training and acquire certifications that are applicable to the role.
Cybersecurity Officer
Posted today
Job Viewed
Job Description
Job Duties
- Implement and maintain security controls to protect information systems.
- Conduct periodic security audits to identify vulnerabilities and ensure compliance with security policies.
- Monitor and respond to security incidents, including breaches and malware attacks.
- Develop and enforce security policies and procedures.
- Perform risk assessments and recommend mitigation strategies.
- Stay updated with the latest cybersecurity threats and trends.
- Collaborate with IT and other departments to enhance overall security posture.
- Provide training and support to staff on cybersecurity best practices.
Qualifications and Skills
- Bachelor's degree in Computer Science, Information Technology, or a related field.
- With proven 2-4+ years of experience in cybersecurity or a related field.
- Proficiency in security tools and technologies such as firewalls, intrusion detection systems, and antivirus software.
- Strong understanding of network protocols and security architecture.
- Experience with security frameworks and standards (e.g., ISO 27001, NIST).
- Excellent problem-solving skills and attention to detail.
- Certifications such as CISSP, CISM, or CEH is an added advantage.
- Experience with cloud security (e.g., AWS, Azure).
- Knowledge of scripting languages (e.g., Python, PowerShell).
Job Type: Full-time
Pay: Php20, Php50,000.00 per month
Benefits:
- Company events
- Opportunities for promotion
- Paid training
- Promotion to permanent employee
Ability to commute/relocate:
- Alabang: Reliably commute or planning to relocate before starting work (Required)
Education:
- Bachelor's (Required)
Experience:
- Security frameworks and Standards: 1 year (Required)
- Cybersecurity Officer: 1 year (Required)
Language:
- English (Required)
License/Certification:
- Certified Information Systems Security Professional (Required)
- Certified Information Security Manager (Required)
- Certified Ethical Hacker (Required)
Willingness to travel:
- 100% (Required)
Work Location: In person
Cybersecurity Manager
Posted today
Job Viewed
Job Description
We're hiring for Cybersecurity Managers at GECO Asia to integrate cybersecurity measures into cybersecurity infrastructure, ensuring compliance, and fostering a secure environment.
Responsibilities:
- To lead, plan, manage a staged integration process to stabilise and standardise the new JVco before full integration to cybersecurity
- To bridge cyber security, IT, and business functions, overseeing the design, implementation, and maintenance of security solutions
- To review and streamline transition and integration path to evaluate opportunities of improvement, cost rationalisation and securing growth
- To assess security vulnerabilities in transition and integration to inform risk decisions to business owners from CISCO
- To provide oversight of group cyber security metrics and manage all aspects of integration metrics
Qualifications:
- Degree in IT, computer science, engineering, systems management
- Min 5 years of relevant experience in end-to-end project management framework and methodology to manage execution of cybersecurity programs, including intake from business and IT, prioritisation, capacity and backlog management, and reporting
- Experience in Google Workspace and security stack
- Experience in Microsoft security stack including M365, SOC operatives,
- Exposure in areas such as PAM, DLP, EDR, endpoint security management, access control management, IAM, vulnerability assessment/management, network security, cloud security e.g. AWS, Azure, etc.
Cybersecurity Engineer
Posted today
Job Viewed
Job Description
Our client is seeking a highly skilled and experienced
Senior SOC Engineer
to lead threat detection, incident response, and continuous monitoring efforts within our Security Operations Center. This role is critical to maintaining the confidentiality, integrity, and availability of our systems and data, especially in a highly regulated financial environment. The ideal candidate will bring deep technical expertise, a proactive mindset, and a passion for defending against evolving cyber threats.
Key Responsibilities
:
- Lead and coordinate real-time monitoring, triage, and response to security incidents across cloud and on-prem environments.
- Develop and tune SIEM detection rules, use cases, and correlation logic to improve threat visibility.
- Perform threat hunting and forensic investigations using logs, endpoint telemetry, and network data.
- Collaborate with threat intelligence teams to integrate IOCs and TTPs into detection workflows.
- Maintain and enhance SOC playbooks, runbooks, and incident response procedures.
- Mentor junior SOC analysts and provide technical guidance during escalated incidents.
- Work with engineering and infrastructure teams to implement security controls and logging standards.
- Support compliance efforts (e.g., GLBA, FFIEC, PCI DSS) by ensuring logging, monitoring, and incident response capabilities meet regulatory requirements.
- Participate in red/blue/purple team exercises and post-incident reviews.
Qualifications
:
- Lead and coordinate real-time monitoring, triage, and response to security incidents across cloud and on-prem environments.
- Develop and tune SIEM detection rules, use cases, and correlation logic to improve threat visibility.
- Perform threat hunting and forensic investigations using logs, endpoint telemetry, and network data.
- Collaborate with threat intelligence teams to integrate IOCs and TTPs into detection workflows.
- Maintain and enhance SOC playbooks, runbooks, and incident response procedures.
- Mentor junior SOC analysts and provide technical guidance during escalated incidents.
- Work with engineering and infrastructure teams to implement security controls and logging standards.
- Support compliance efforts (e.g., GLBA, FFIEC, PCI DSS) by ensuring logging, monitoring, and incident response capabilities meet regulatory requirements.
- Participate in red/blue/purple team exercises and post-incident reviews.
Preferred Certifications:
- GIAC Certified Incident Handler (GCIH)
- GIAC Security Operations Certified (GSOC)
- Certified Information Systems Security Professional (CISSP)
- Certified SOC Analyst (CSA)
--
Work setup: Hybrid, 3x a week RTO
Work location: BGC, Taguig City
Work schedule: Night shift
Interested applicants may apply directly on this job post or direct their CV to ().
- FILIPINO CITIZEN ONLY residing in the Philippines***
Cybersecurity Consultant
Posted today
Job Viewed
Job Description
About the Role
We are seeking a highly skilled Security SME with expertise in configuring native security solutions across both cloud and on-premises platforms. This role involves designing, implementing, and maintaining secure environments through the expert use of built-in security tools. The ideal candidate will have 5–7 years of experience in security engineering and a strong background in cloud-native and enterprise security controls.
Key Responsibilities
- Configure and maintain native security components such as firewalls, Web Application Firewalls (WAF), network security groups, security lists, and access control lists (ACLs).
- Design, deploy, and upgrade security solutions for hybrid cloud and on-premises environments, ensuring compliance with industry standards and directives.
- Create and maintain technical documentation including security configuration templates, runbooks, and operational procedures.
- Leverage scripting and automation (Python, PowerShell, F5 iRules, etc.) to streamline deployment and monitoring of security components.
- Perform vulnerability assessments, risk analysis, and compliance audits to identify and mitigate threats.
- Troubleshoot and optimize performance of security technologies in production environments.
- Collaborate with cross-functional teams, providing technical leadership and guidance on security best practices.
- Support change management and adoption of new security technologies and policies.
Must-Have Skills
- Strong hands-on experience configuring native security tools in cloud and on-premises environments.
- In-depth knowledge of firewalls, WAF, NAC, SIEM, and related technologies.
- Experience with vulnerability assessment, compliance auditing, and incident response.
- Strong scripting and automation skills (Python, PowerShell, etc.).
- Ability to produce clear technical documentation, templates, and playbooks.
- Excellent troubleshooting and problem-solving skills.
Good-to-Have Skills
- Familiarity with Azure and AWS native security tools.
- Experience with endpoint protection, SIEM/SOAR, IAM, and threat intelligence solutions.
- Strong understanding of security frameworks and compliance standards.
- Excellent communication skills for reporting and stakeholder engagement.
- Relevant security certifications (CISSP, CISM, Azure/AWS Security certifications, etc.).
Qualifications & Experience
- 5–7 years of experience in IT Security or Cybersecurity roles.
- Bachelor's degree in Computer Science, Information Security, or related field (preferred).
Job Type: Full-time
Pay: Php80, Php150,000.00 per month
Benefits:
- Health insurance
- Life insurance
- Opportunities for promotion
- Promotion to permanent employee
Work Location: In person
Cybersecurity Consultant
Posted today
Job Viewed
Job Description
Job Summary
Triforce is seeking a skilled Cybersecurity Consultant to help clients identify, address, and manage their cybersecurity risks and challenges. This role involves working closely with clients to provide expert advice, conduct risk assessments, and design robust security solutions tailored to their unique needs. The ideal candidate will have deep technical knowledge, strong communication skills, and a proven ability to translate complex security concepts into actionable strategies.
Key Responsibilities
1. Cybersecurity Advisory Services:
- Collaborate with clients to understand their security challenges and business goals.
- Provide expert guidance on best practices, emerging threats, and compliance requirements.
- Recommend tailored strategies and solutions to strengthen cybersecurity posture.
2. Risk Assessment and Analysis:
- Conduct comprehensive risk assessments, including vulnerability scans, penetration testing, and threat modeling.
- Identify security gaps and provide actionable recommendations to mitigate risks.
- Develop risk management plans aligned with clients' operational needs and compliance requirements.
3. Security Solution Design and Implementation:
- Assist in designing and implementing security architectures, tools, and frameworks.
- Support clients in deploying firewalls, intrusion detection/prevention systems, and endpoint protection solutions.
- Ensure that solutions align with industry standards, such as ISO 27001, NIST, or CIS.
4. Compliance and Governance:
- Help clients achieve compliance with regulatory frameworks (e.g., GDPR, HIPAA, PCI-DSS).
- Develop security policies, procedures, and governance frameworks for clients.
- Conduct audits and assessments to verify compliance and recommend remediation steps.
5. Incident Response and Management:
- Provide support during cybersecurity incidents, including containment, eradication, and recovery efforts.
- Develop and deliver incident response plans and training to prepare clients for potential breaches.
- Perform root cause analysis and suggest improvements to prevent recurrence.
6. Training and Awareness:
- Conduct training sessions and workshops for clients to improve their cybersecurity awareness.
- Develop educational materials and resources to empower employees and stakeholders.
Required Qualifications and Skills
- Bachelor's degree in Cybersecurity, Computer Science, or a related field (or equivalent experience).
- Proven experience as a cybersecurity consultant or in a similar role.
- Strong knowledge of cybersecurity principles, frameworks, and technologies.
- Hands-on experience with security tools such as SIEMs, firewalls, IDS/IPS, and EDR platforms.
- Familiarity with common compliance standards and regulatory frameworks.
- Exceptional problem-solving and analytical skills.
- Strong communication skills with the ability to explain technical concepts to non-technical stakeholders.
- Experience in threat hunting and reviewing incident alerts to proactively identify and mitigate security threats.
Preferred Qualifications:
- Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+.
- Experience working with cloud security solutions (e.g., AWS, Azure, GCP).
- Knowledge of emerging security trends, such as zero trust, threat intelligence, or AI-based security solutions.
- Penetration testing or ethical hacking experience.
Cybersecurity Engineer
Posted today
Job Viewed
Job Description
What you will do:
- Manages security policies on various security tools/systems and ensures alignment to Information Security Policy
- Ensures smooth operation of the security tools/systems to ensure controls are in effect, with minimal impact to core business systems' performance
- Ensures security tools/systems are updated and patched against vulnerabilities
- Works with various IT Teams and business owners to ensure security tools and systems are providing value as applicable, enabling secure IT operations
- Periodically assess security tools/systems' adaptability to ever evolving cyber threat landscape
- Attend to ad hoc service requests involving security tools and systems under responsibility
What you should have:
- At least 3 years experience in cyber security tools/systems engineering and administration
- Good hands-on experience in Identity and Access Management, Data Loss Prevention, Endpoint Security, Security Information and Event Management, Privileged Access Management tools/systems
- Solid understanding of Information and Network Security frameworks and principles
- Hands on experience on Windows and Linux system administration and knowledge on various scripting languages
- Good presentation skills
Job Perks You'll Enjoy:
- Hybrid work setup
- Permanent dayshift schedule
- Up to 20% variable performance-based bonus
- HMO on Day 1 and HMO dependents coverage including same-sex partners
- Access to mental health and wellness partners
- Wellness Leaves and Birthday Leave
- Internal career mobility options
- Local and international learning opportunities
Empower Filipinos with innovative financial solutions at Home Credit Philippines. Click Apply Now and join a company where there are #NoSmallRoles and everyone is important.
At Home Credit Philippines, we believe that everyone has something special to offer. Our motto "No Small Roles, Everyone is Important" is at the heart of everything we do. We think diversity makes our company better and every single job and person here plays a big part in our success.
We're all about creating a welcoming place where everyone feels valued for who they are. This means we make sure that everyone, no matter their background or what they look like, gets a fair chance at jobs, training, and promotions.
When it comes to hiring, everyone gets a fair look. It doesn't matter where you're from, what you believe, who you love, whether you have a disability, or any other or any other condition protected under Philippine laws. If you meet the job requirements, you have a chance to get the job.
Come join us at Home Credit, where diversity fuels our innovation. Here, there are #NoSmallRoles and #EveryoneisImportant.
LI-GA1Full-time
Corporate
Taguig City
Information Security
Be The First To Know
About the latest Cybersecurity Jobs in Manila !
Cybersecurity Manager
Posted today
Job Viewed
Job Description
Power Up Your Career with Power Mac Center
We are seeking a strategic and hands-on
Cybersecurity Manager
to lead and strengthen our organization's cybersecurity posture. This role focuses on safeguarding our IT infrastructure—including on-premise and cloud environments—critical business applications, and social media platforms. The ideal candidate will have a strong technical foundation, proven leadership experience, and the ability to align cybersecurity initiatives with business objectives.
Responsibilities
- Develop and execute a comprehensive cybersecurity strategy that aligns with the organization's business goals and risk appetite, with specific emphasis on network security, server infrastructure (on-premise and cloud), application security, and social media protection.
- Design, implement, and maintain effective security controls, tools, and processes across all in-scope systems and environments.
- Lead and manage vulnerability assessments, penetration testing, and continuous security evaluations to proactively identify and mitigate threats.
- Direct incident response efforts, including detection, analysis, containment, eradication, recovery, and post-incident reviews.
- Ensure ongoing compliance with relevant cybersecurity standards, regulations, and internal policies (e.g., NIST, ISO, GDPR, etc.).
- Collaborate with cross-functional teams to promote a security-first culture and raise organizational awareness of cybersecurity risks and best practices.
Qualifications
- Minimum
7 years of experience
in cybersecurity, with at least
3 years in a managerial or leadership role
. - Proven expertise in network and server security (both on-premise and cloud), application security, and incident response.
- Deep understanding of networking protocols and architectures, including TCP/IP, DNS, routing, switching, firewalls, IDS/IPS, and VPN technologies.
- Strong knowledge of operating system security, particularly
Windows Server
and
Linux
environments. - Familiarity with common application vulnerabilities (e.g., OWASP Top 10) and appropriate mitigation strategies.
- Hands-on experience with cybersecurity tools and platforms such as SIEM, EDR, vulnerability scanners, penetration testing suites, and cloud security solutions.
- Demonstrated experience managing and developing cybersecurity teams (minimum 3–5 years of people management in a similar domain).
Cybersecurity Intern
Posted today
Job Viewed
Job Description
If you are looking for an opportunity to work with the global Emerson Systems and Software organization, this is an exciting opportunity for you As a Cybersecurity Intern, you will gain hands-on experience by contributing to the security of our web applications. In this role, you'll identify security vulnerabilities, implement secure coding practices, and integrate security tools into our development workflows. This project will serve as both a learning opportunity and a contribution to the organization's AI projects. Emerson interns are given meaningful work, support, and mentorship from experienced managers and key business leaders. There is strong potential to gain knowledge and experience in a variety of ways by exploring opportunities aligned with your interests and academic background.
In This Role, Your Responsibilities Will Be:
- Working closely with the web development team to identify security vulnerabilities and implement security measures in web applications. This includes tasks related to secure coding practices, vulnerability assessments, and security testing.
- Analyzing our current web application development processes and identifying areas that can be further improved through enhanced security measures. This may involve consulting with the web development and cybersecurity teams within the organization to ensure that security measures align with the industry's best practices.
- Working on integrating security tools and practices into our existing web development workflows. This will involve training our web development team members on how to use the security tools effectively and ensuring a seamless transition to secure development practices.
- Documenting the newly implemented security measures, including standard procedures, guidelines, and troubleshooting instructions, to ensure that the knowledge is retained within the organization.
Who You Are:
You can take a creative idea and put it into practice. You take on the challenge of unfamiliar tasks. You readily learn and adopt new technologies.
For This Role, You Will Need:
- Currently pursuing an undergraduate or graduate degree in Computer Science, Information Technology, or any related field.
- Able to commit to a minimum of 480 hours. We are open to both required and voluntary interns.
- Strong curiosity about cybersecurity, automation, and software development.
- General exposure to Artificial Intelligence concepts, gained through academic projects, thesis research, or practical experience.
- Knowledge of Web Development Programming languages e.g. CSS, C#, React JS, HTML5, etc.
- Ability to collaborate optimally with others and solve complex problems.
Preferred Qualifications That Set You Apart:
- Familiarity with cybersecurity processes automation is a plus.
- Experience with web development technologies.
- Curiosity about developing solutions using existing tools and technologies.
Our Culture & Commitment to You:
At Emerson, we prioritize a workplace where every employee is valued, respected, and empowered to grow. We foster an environment that encourages innovation, collaboration, and diverse perspectives—because we know that great ideas come from great teams. Our commitment to ongoing career development and growing an inclusive culture ensures you have the support to thrive. Whether through mentorship, training, or leadership opportunities, we invest in your success so you can make a lasting impact. We believe diverse teams, working together are key to driving growth and delivering business results.
We recognize the importance of employee wellbeing. We prioritize providing competitive benefits plans, a variety of medical insurance plans, Employee Assistance Program, employee resource groups, recognition, and much more. Our culture offers flexible time off plans, including paid parental leave (maternal and paternal), vacation and holiday leave.
Cybersecurity Analyst
Posted today
Job Viewed
Job Description
About the role
We are seeking a talented Cybersecurity Analyst - App and Cloud Security to join our growing team at Michael Page International Recruitment Philippines Inc. In this full-time role, you will play a crucial part in protecting our client's critical applications and cloud infrastructure from cyber threats. This position is located in Makati City, Metro Manila, and offers a hybrid work setup with two days onsite each week and a mid-shift schedule.
What you'll be doing
- Monitoring and analysing security logs and alerts from various sources to detect and respond to potential security incidents
- Performing vulnerability assessments and penetration testing on applications and cloud systems to identify and mitigate security risks
- Developing and implementing security policies, standards, and controls to enhance the overall security posture of our cloud and application environments
- Collaborating with development and operations teams to integrate security into the software development lifecycle and cloud deployment processes
- Researching and staying up-to-date with the latest security threats, trends, and best practices in the industry
- Providing security guidance and training to colleagues to raise awareness and improve security practices
- Documenting security processes, procedures, and incident response plans
What we're looking for
- Minimum of 3 years of experience as a Cybersecurity Analyst or similar role in the Information & Communication Technology industry
- Solid understanding of application security principles, cloud security best practices, and common security threats and countermeasures
- Proficiency in using security tools and technologies such as SIEM, vulnerability scanners, and cloud security platforms
- Strong analytical and problem-solving skills to quickly identify and address security issues
- Excellent communication and collaboration skills to work effectively with cross-functional teams
- Experience in scripting and automation (e.g., Python, PowerShell) to streamline security processes
- Industry certifications such as CISSP, GIAC, or OSCP are highly desirable
What we offer
At Michael Page International Recruitment Philippines Inc., we are committed to providing a supportive and inclusive work environment. We offer competitive compensation, opportunities for career advancement, and a range of benefits to support your work-life balance. Our employees enjoy access to comprehensive health insurance, generous leave policies, and professional development programs. We also have a strong focus on employee well-being, with initiatives to promote physical and mental health.
If you are passionate about cybersecurity and eager to contribute to the protection of our cloud and application environments, we encourage you to apply for this exciting opportunity. Click the "Apply now" button to submit your application.