81 Information Security jobs in the Philippines
Web Investigator
Posted 2 days ago
Job Viewed
Job Description
WORK LOCATION: Cebu / Baybay br>WORK SCHEDULE: Day shift
JOB DESCRIPTION:
We are looking for an investigator to do a web-based search. You will search, collect evidence, and apply
various investigative methods. You will also prepare detailed step-by-step reports proving your findings.
The successful candidate will learn to employ modern investigative techniques. Above all, the successful
candidate must have excellent logic, research skills, a strong sense of what constitutes evidence and
proof, and the persistence to hunt for leads.
RESPONSIBILITIES:
● Investigate Amazon rogue sellers using state-of-the-art digital investigative methodologies and < r>research tools
● Create step-by-step reports with screenshots showing exactly how we arrived at our conclusions < r>
ESSENTIAL REQUIREMENTS:
• Graduate of any IT-related courses or Statistics < r>● Excellent analytical skills and logical reasoning < r>● Ability to observe minute details, sift evidence, and create detailed reports < r>● Proficient in detecting and interpreting clues– an ability to “connect the dots”
● E cellent Google search abilities
● Strong written and verbal communication skills in English < r>● Willing to work on-site at night shift schedules
Security Lead
Posted 2 days ago
Job Viewed
Job Description
- Must have a PNP SOSIA license to exercise security profession (LESP) as security officer br>-CSP, CSSP, SO or SM trained
- Computer literate
- at least 1 to 2 years experience in the same field
- Willing to be assigned in Anonas, Quezon City
Paralegal and Data Privacy Officer for Makati
Posted 3 days ago
Job Viewed
Job Description
JOB RANK: TECHNICAL br> Objective of Hiring a PARALEGAL & DATA PRIVACY OFFICER: br>To strengthen the internal capabilities of the organization in legal and data privacy aspects.
br>Job Description/Responsibilities
As Paralegal:
The Paralegal provides crucial support to lawyers by focusing on legal tasks such as legal research, preparation
of legal documents, case preparation and assisting with trial preparation.
1. Keep abreast of and conduct research on relevant laws, regulations and legal precedents in support of
developing case strategies.
2. Assist in reviewing contracts and service agreements with client accounts.
3. Assist in drafting various legal documents such as pleadings and correspondences.
4. Assist with all aspects of case management, including fact investigation and evidence gathering, witness
interviews, preparation for hearings and trials, organization of exhibits and management of deadlines.
5. Organize and maintain legal documents and evidences, in both paper and electronic filing systems.
As Data Privacy Officer:
The Data Privacy Officer plays a key role in ensuring that the organization handles personal data responsibly and
ethically, minimizing risks and maintaining the trust of its clientele.
1. Develop the company’s data privacy policies, ensuring alignment and compliance with relevant laws and < r>regulations including RA 10173.
2. Ensure the development of function-specific data protection policies, procedures, and security measures.
3. Ensure that policies and procedures are effectively implemented across the organization.
4. Conduct regular audits and risk assessments to identify potential gaps in compliance with data privacy
policies.
5. Educate and raise awareness of employees on data privacy principles, responsibilities, policies, and
procedures.
6. Serve as primary point of contact for data protection authorities and regulatory agencies.
7. Respond to inquiries from data subjects regarding personal data.
8. Handle data breach incidents and security breaches in accordance with established procedures.
QUALIFICATIONS: With relevant education and/or certification, preferably Bachelor of Laws (LLB) graduate.
Preferably with at least 1 year work experience as paralegal. Prior involvement in Data Privacy matters would be
desirable. Computer savvy; research skills; analytical skills; leadership skills; interpersonal relationship skills;
communication skills; a team-worker; has initiative; innate desire to learn; flexible and adaptable; strong work ethic.
SITE ASSIGNMENT: Head Office – Makati < r>EMPLOYMENT TYPE: initially under a 6-month service agreement; regularization based on acceptable performance
SALARY RANGE: Php 20,000 or above
Vulnerability Analyst
Posted 3 days ago
Job Viewed
Job Description
Work Set-up: Hybrid (1-2x a month RTO) br>Work Schedule: Mid Shift (4 or 5 PM - Login time)
DUTIES and RESPONSIBILITIES:
Vulnerability Analysts aid in the identification, assessment, and communication of new and
emergent threats in the cybersecurity landscape, specifically vulnerability intelligence and
detections. As a Vulnerability Analyst, you will be expected to familiarize yourself with high-impact
and critical vulnerabilities, proofs-of-concept, and reports of in-the-wild exploitation, producing
and reviewing intelligence summaries accessible to Client's customers.
• Vulnerability Lead Identification and Analysis: You will be tasked with the prompt < r>identification, analysis, and comprehensive assessment of emerging cybersecurity
threats, specifically recently disclosed or exploited vulnerabilities.
Subject Matter: Your technical prowess will be crucial in ensuring our preparedness
for potential risks and understanding the implications of prompt and thorough analysis
of high-impact vulnerabilities.
Key Detail Identification: During research, identify and take note of infection chains,
host and network IoCs, malware samples, threat actors, exposed vulnerable
instances, publicly available proofs-of-concept, and MITRE ATT&CK tactics and
techniques
• Author Insikt Notes: Write TTP Instances detailing identified vulnerability leads. TTP < r>Instances include a combination of information from open-source reporting and your own
analysis (i.e. code review). Each TTP Instance should comprehensively address the
nature of the threat, its potential impact, suggested mitigation strategies, and a succinct
summary for quick referencing. ○ Cadence: Write at least 2 TTP Instance notes daily < r> Quality: Authored TTP Instances should include minimal grammatical or syntax errors.
Plagiarism is not acceptable.
• Detection Engineering: Design and develop Nuclei templates for vulnerability scanning, < r>ensuring these templates are tailored to detect new and emerging vulnerabilities
efficiently.
Cadence: Create at least 1 Nuclei template per month with assistance from our Senior
Vulnerability Analyst
Delivery: Nuclei templates will be delivered alongside a TTP Instance. ● Information < r>Security: Adhere to and implement Infinit-O's quality and information security policies
and carry out its processes and procedures accordingly. ○ Protect client-supplied and < r>generated-for-client information from unauthorized access, disclosure, modification,
destruction, or interference (see also Table of Offenses)
Carry out tasks as assigned and aligned with particular processes or activities related
to information security.
Report any potential or committed non-conformity, observation and/or security event
or risks to your immediate superior.
QUALIFICATIONS:
• B.S. equivalent in computer science, information systems, or cyber intelligence < r>• 1 - 2 years of minimum professional experience in cybersecurity, with a focus on threat < r>detection, penetration testing, or vulnerability assessment.
• A solid grasp of fundamental cybersecurity principles, attack trajectories, and techniques < r>for vulnerability analysis.
• Demonstrable experience researching and analyzing new cyber threats. < r>• Practical experience using common threat intelligence analysis models such as MITRE < r>ATT&CK, D3FEND, the Diamond Model, and the Cyber Kill Chain.
• Familiarity with and use of common cyber threat intelligence tools such as Domain Tools, < r>VirusTotal, Shodan, etc.
• Demonstrable experience in technical writing, showcasing an ability to translate complex < r>technical concepts into engaging, reader-friendly content.
Cyber Threat Analyst - Hybrid
Posted 3 days ago
Job Viewed
Job Description
• Threat Lead Identification: Research new adversary tactics, techniques, and procedures br>(TTPs) using open sources (public information such as security vendor reporting, social
media, code repositories); closed sources (dark web and underground forums); and
proprietary sources.
Subject Matter: Threat leads should focus on team priority intelligence requirements
(PIRs). Examples of such subject matter include malware developments, offensive
security tools, vulnerability exploits, cloud security, and mobile security.
Key Detail Identification: During research, identify and take note of infection chains,
host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics
and techniques
• Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP Instances < r>include a combination of information from open-source reporting and your own analysis
(i.e. code review, static malware analysis). TTP Instances are written and formatted to
help our customers understand infection chains while also helping them prepare and
validate their defenses.
Cadence: Write at least 2 TTP Instance notes daily
Quality: Authored TTP Instances should include minimal grammatical or syntax
errors. Plagiarism is not acceptable.
• Malware Analysis: Using sandbox environments and static analysis tools, analyze < r>malware samples associated with threat leads.
Use Cases: Malware analysis is used to provide additional insight into an event,
validate open-source reporting, uncover additional IoCs, and assist peers and
customers in detection engineering
• Detection Engineering: Create malware or vulnerability detections (e.g. YARA, Sigma, < r>Snort, Nuclei) that can be used for threat hunting, detection, and classification.
Cadence: Create at least 1 malware or vulnerability detection per month ○ Delivery: < r>In most cases, these detections will be delivered alongside a TTP Instance.
• Information Security: Adhere to and implement Infinit-O's quality and information < r>security policies and carry out its processes and procedures accordingly. ○ Protect client supplied and generated-for-client information from unauthorized access, disclosure, < r>modification, destruction, or interference (see also Table of Offenses)
Carry out tasks as assigned and aligned with particular processes or activities related
to information security.
Report any potential or committed non-conformity, observation and/or security event
or risks to immediate superior.
Required Skills:
• Strong written communication in English < r>• Demonstrable experience writing reports on technical subject matter (e.g. malware, < r>vulnerability exploits, offensive security tools) in a clear, concise, and logical format
• Disciplined time management < r>• Self-starting, self-motivated, and thrive in a collaborative environment < r>• Ability to receive and apply constructive feedback from peers and leadership < r>Minimum Qualifications:
• B.S. equivalent in computer science, information systems, or cyber intelligence < r>• 1 year professional experience < r>• Technical proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms < r>• Experience working with open-source intelligence (OSINT) and/or large data sets < r>• Experience working with sandboxes, virtual machines, or other malware analysis tools < r>• Familiarity with the MITRE ATT&CK Framework, including the ability map reported activity < r>to ATT&CK tactics and techniques
• Familiarity with interpreting and mapping cyberattacks to the Diamond Model of Intrusion < r>Analysis
• Adeptness in cybersecurity and data protection < r>Preferred Qualifications:
• Proficiency in scripting or programming languages (PHP, C, C#, C++, Python, PowerShell, < r>Go, JavaScript, Rust)
• Experience creating malware detections (e.g. YARA, Sigma, Snort) < r>• Experience creating vulnerability detections (e.g. Nuclei) < r>
BENEFITS OFFERED:
• VL/SL credits < r>• Certified Great Place to Work < r>• Hybrid Work Set-up < r>• Equipment is provided (Laptop/Desktop) < r>• HMO coverage (2 dependents) < r>• Work-life Balance < r>• Telecommunication Allowance for Team Leaders and Up < r>• Competitive Salary Package < r>• Performance-based Bonuses (Quarterly)
Web Investigator
Posted 4 days ago
Job Viewed
Job Description
Schedule: Day shift br># of Available positions: 1
Cebu / Baybay Site: Full Onsite
JOB DESCRIPTION:
We are looking for an investigator to do a web-based search. You will search, collect evidence, and apply various investigative methods. You will also prepare detailed step-by-step reports proving your findings. The successful candidate will learn to employ modern investigative techniques. Above all, the successful
candidate must have excellent logic, research skills, a strong sense of what constitutes evidence and proof, and the persistence to hunt for leads.
RESPONSIBILITIES:
● Investigate Amazon rogue sellers using state-of-the-art digital investigative methodologies and research tools < r>● Create step-by-step reports with screenshots showing exactly how we arrived at our conclusions < r>
ESSENTIAL REQUIREMENTS:
● Excellent analytical skills and logical reasoning < r>● Ability to observe minute details, sift evidence, and create detailed reports < r>● Proficient in detecting and interpreting clues– an ability to “connect the dots”
● E cellent Google search abilities
● Strong written and verbal communication skills in English < r>● Willing to work on-site at night shift schedules < r>
NOTE: THIS IS DIRECT HIRE AND NOT UNDER AGENCY
SOC Analyst -Hybrid Setup
Posted 4 days ago
Job Viewed
Job Description
br>Position: SOC Analyst
Company Industry: Healthcare & Medical industry
Work Location: Quezon City
Work Schedule: Night Shift / Rotating Schedule
Salary: Php 60,000–Php100,000 gross < r>Work Setup: Hybrid (4 days onsite, 1 day remote)
JOB REQUIREMENTS:
• 2-4 years of experience in security operations, networking, or related InfoSec roles < r>• trong knowledge of security, monitoring, and networking tools, protocols, and standards < r>• E perience with Network Security, Firewall Security, and Web Security (WAFs, proxies) < r>• F miliarity with industry standards such as ISO 27001, HIPAA, SOX < r>• P oven ability to investigate, document, and report information security issues < r>
JOB RESPONSIBILITIES:
• M nitor and analyze security incidents across network and systems < r>• C nduct investigations on potential security threats or breaches < r>• I plement and maintain security tools and threat detection systems < r>• C llaborate with teams to enhance the organization’s security posture
RECRUITMENT PROCESS (ONLINE):
HR Interview
Technical Assessment
Hiring Manager Interview
Job Offer
Be The First To Know
About the latest Information security Jobs in Philippines !
Paralegal & Data Privacy Officer
Posted 4 days ago
Job Viewed
Job Description
Pay up to: 20,000+ br>
As Paralegal:
The Paralegal provides crucial support to lawyers by focusing on legal tasks such as legal research, preparation of legal documents, case preparation and assisting with trial preparation.
1. Keep abreast of and conduct research on relevant laws, regulations and legal precedents in support of developing case strategies.
2. ssist in reviewing contracts and service agreements with client accounts.
3. Assist in drafting various legal documents such as pleadings and correspondences.
4. Assist with all aspects of case management, including fact investigation and evidence gathering, witness interviews, preparation for hearings and trials, organization of exhibits and management of deadlines.
5. Organize and maintain legal documents and evidences, in both paper and electronic filing systems.
As Data Privacy Officer:
The Data Privacy Officer plays a key role in ensuring that the organization handles personal data responsibly and ethically, minimizing risks and maintaining the trust of its clientele.
1. Develop the company’s data privacy policies, ensuring alignment and compliance with relevant laws and regulations including RA 10173. < r>2. E sure the development of function-specific data protection policies, procedures, and security measures.
3. Ensure that policies and procedures are effectively implemented across the organization.
4. Conduct regular audits and risk assessments to identify potential gaps in compliance with data privacy policies.
5. Educate and raise awareness of employees on data privacy principles, responsibilities, policies, and procedures.
6. Serve as primary point of contact for data protection authorities and regulatory agencies.
7. Respond to inquiries from data subjects regarding personal data.
8. Handle data breach incidents and security breaches in accordance with established procedures.
QUALIFICATIONS:
With relevant education and/or certification, preferably Bachelor of Laws (LLB) graduate.
Preferably with at least 1 year work experience as paralegal.
Prior involvement in Data Privacy matters would be desirable.
Computer savvy; research skills; analytical skills; leadership skills; interpersonal relationship skills; communication skills; a team-worker; has initiative; innate desire to learn; flexible and adaptable; strong work ethic.
Paralegal and Data Privacy Officer - 1 Yr Exp/Makati
Posted 4 days ago
Job Viewed
Job Description
Preferably with at least 1 year work experience as paralegal. Prior involvement in Data Privacy matters would be br>desirable. Computer savvy; research skills; analytical skills; leadership skills; interpersonal relationship skills;
communication skills; a team-worker; has initiative; innate desire to learn; flexible and adaptable; strong work ethic.
Job Description/Responsibilities:
As Paralegal:
The Paralegal provides crucial support to lawyers by focusing on legal tasks such as legal research, preparation
of legal documents, case preparation and assisting with trial preparation.
1. Keep abreast of and conduct research on relevant laws, regulations and legal precedents in support of
developing case strategies.
2. Assist in reviewing contracts and service agreements with client accounts.
3. Assist in drafting various legal documents such as pleadings and correspondences.
4. Assist with all aspects of case management, including fact investigation and evidence gathering, witness
interviews, preparation for hearings and trials, organization of exhibits and management of deadlines.
5. Organize and maintain legal documents and evidences, in both paper and electronic filing systems.
As Data Privacy Officer:
The Data Privacy Officer plays a key role in ensuring that the organization handles personal data responsibly and
ethically, minimizing risks and maintaining the trust of its clientele.
1. Develop the company’s data privacy policies, ensuring alignment and compliance with relevant laws and < r>regulations including RA 10173.
2. Ensure the development of function-specific data protection policies, procedures, and security measures.
3. Ensure that policies and procedures are effectively implemented across the organization.
4. Conduct regular audits and risk assessments to identify potential gaps in compliance with data privacy
policies.
5. Educate and raise awareness of employees on data privacy principles, responsibilities, policies, and
procedures.
6. Serve as primary point of contact for data protection authorities and regulatory agencies.
7. Respond to inquiries from data subjects regarding personal data.
8. Handle data breach incidents and security breaches in accordance with established procedures.
SITE ASSIGNMENT: Head Office – Makati < r>EMPLOYMENT TYPE: initially under a 6-month service agreement; regularization based on acceptable performance
SALARY RANGE: Php 20,000 or above
Senior Account Manager (IT Security Solutions)
Posted 4 days ago
Job Viewed