139 Security Breaches jobs in the Philippines

Security Incident Response Analyst

Taguig, National Capital Region ₱900000 - ₱1200000 Y PositiveLinks Asia

Posted today

Job Viewed

Tap Again To Close

Job Description

Summary

Support the global Information Security Team by detecting, analyzing, and responding to security incidents. Help protect the firm's systems and data based on business needs and compliance requirements.

Key Responsibilities

  • Handle Tier 2 security incidents and resolve tickets within SLA
  • Analyze alerts and data to assess potential threats
  • Recommend improvements to current security practices
  • Help design and implement threat detection tools
  • Use tools like SIEM, log management, and packet capture
  • Assist with forensic investigations and evidence handling
  • Maintain system reliability and performance
  • Report issues and metrics to management
  • Contribute to security awareness and documentation
  • Join special projects as needed

Required Skills & Experience

  • 4–5 years of relevant experience
  • Strong background in digital forensics

Hands-on experience in:

  • Incident Response
  • Threat Detection
  • Malware Analysis
  • Forensics & Incident Handling
  • Network Traffic Analysis
  • SOAR & Threat Intelligence
  • EDR & Vulnerability Management
  • Cloud Forensics & Incident Response
  • SIEM tools

Work Schedule:
Rotating shifts every 2 months

  • APAC: 6am–3pm
  • EMEA: 2pm–11pm
  • WHEM: 10pm–7am (next day)
  • Workdays: Sunday–Thursday or Monday–Friday
This advertiser has chosen not to accept applicants from your region.

Security Incident Response Consultant

Ayala Alabang, National Capital Region ₱900000 - ₱1200000 Y Ascendion

Posted today

Job Viewed

Tap Again To Close

Job Description

CSIRT Consultant Service Responsibilities
  • Act as a dedicated contact and communications point between our security services team and the customer's IT/security staff, users, and partners.
  • Operate and manage the incident management process in alignment with procedures defined with the customer.
  • Assist, identify, and respond to security incidents on a day-to-day basis.
  • Proactively propose improvements to reduce risk and prevent future incidents.

Incident Handling & Response

  • Receive and monitor incident information from managed security services and other sources.
  • Review and validate collected incident data, confirming or rejecting incidents.
  • Classify and prioritize incidents according to established criteria.
  • Facilitate communication between stakeholders regarding incident status.
  • Coordinate containment efforts based on available information and processes.
  • Make containment decisions and escalate when necessary, according to agreed procedures.
  • Communicate with affected users and partners to support containment activities.
  • Verify the effectiveness of containment and eradication actions.
  • Identify attack vectors and implement measures to prevent recurrence.
  • Coordinate forensics and law enforcement activities when required.
  • Analyze incident response efforts, incorporating feedback from customers and third parties.

Proactive Security & Risk Management

  • Perform vulnerability management using the Qualys tool.
  • Conduct proactive management of monitoring and analytics solutions.
This advertiser has chosen not to accept applicants from your region.

Computer Security Incident Response Team

Ayala Alabang, National Capital Region ₱900000 - ₱1200000 Y Ascendion

Posted today

Job Viewed

Tap Again To Close

Job Description

Role Summary:

As a CSIRT Consultant, you'll be the primary point of contact between our security team and our customers' IT staff. You'll manage the entire security incident process, from initial detection and analysis to final resolution. Your role involves both reactive incident response and proactive risk reduction to protect our clients' digital environments.



Shifting, Hybrid Setup in Muntinlupa City

Key Responsibilities
  • Incident Management & Response: You'll lead the incident management process by receiving and monitoring incident data, analyzing it to confirm or reject an incident, and then classifying and prioritizing it. You'll coordinate containment efforts, facilitate decision-making with stakeholders, and communicate with affected parties.
  • Vulnerability & Risk Mitigation: You'll perform vulnerability management using tools like Qualys. Your job isn't just to respond to incidents but also to proactively identify and propose improvements to reduce future risks. You'll analyze attack vectors to prevent similar incidents and validate the effectiveness of all eradication actions.
  • Coordination & Communication: You'll act as a central hub for all incident-related communication, ensuring all stakeholders—from technical staff to executives—are informed of the status. You'll also coordinate with forensics and law enforcement officials when necessary.
  • Analysis & Improvement: After an incident, you'll conduct a thorough analysis of the response effort with feedback from the customer and third parties. This helps us continuously improve our processes. You'll also be responsible for the proactive management of our monitoring and analytics solutions.


Candidate Qualifications
  • Required Skills & Experience (Must-Haves)

  • A bachelor's degree or at least three years of relevant work experience.

  • Minimum of three years of experience in the security field.
  • Solid knowledge of Network and Web Application vulnerability assessments.
  • Preferred Skills & Certifications (Even Better)

  • Two or more years of experience in security incident detection or management.

  • Strong communication and problem-solving skills, with the ability to engage effectively with both technical and executive audiences.
  • Experience with Splunk or other SIEM and log analytics tools.
  • Knowledge of common malware types, their infection methods, and eradication techniques.
  • Familiarity with modern security threats and vulnerabilities.
  • Professional certifications such as CISSP, CISM, or SANS certifications (e.g., GCIA, GCIH, GREM, GPEN).
  • Experience with ISO 27001 and/or ITIL Foundations.
  • A strong background in structuring and operating an efficient incident response process.
This advertiser has chosen not to accept applicants from your region.

Senior Cyber Security Incident Responder

Taguig, National Capital Region ₱1200000 - ₱2400000 Y Procter & Gamble

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Location
MANILA NET PARK OFFICE

Job Description
Information Technology (IT) at Procter & Gamble is where business, innovation and technology integrate to create a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT mastery to deliver game-changing, technology-driven business models and capabilities for our 65 iconic, trusted brands.

From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place. You'll be doing meaningful work that takes your career places you never imagined. And you'll do this in creative workspaces where new ideas flourish and where your technical mastery is recognized and rewarded.

The Opportunity
Procter & Gamble is seeking a highly skilled Senior Cyber Security Incident Responder who can leverage technology, develop, and improve our processes and empower organizations that will enable us to respond to any cybersecurity threats quickly and effectively in the P&G environment. Join a team of professionals motivated by groundbreaking technologies and innovations, serving as a catalyst for change, and identifying and aligning solutions to strengthening P&G's cyber security.

You will report to the Cyber Defense Response Services Director based in Cincinnati, United States which is world HQ of P&G. We are proud to be a highly diverse and technically-adept team with members from different countries, cultures and backgrounds.

Your success will be based on operational and project work, which would be reviewed on a quarterly basis. Your manager would provide full-support though continuous mentoring and coaching.

Position Responsibilities

  • Lead the analysis, triage, containment, and remediation of serious and major security incidents following the P&G's cyber security incident response plan.
  • Perform deep dive investigations from start to finish of a security incident using data from disparate sources such as SIEM, internal and external threat intelligence, and host and network-based security tools.
  • Provide expert support to our stakeholders specially the information security leaders from different organization units to resolve cyber security incidents.
  • Collect intrusion artifacts and perform forensically sound collection of images in aid of investigating and resolving cyber security incidents.
  • Perform introspection of incidents to document, publish and share after-action learnings, improve awareness, and strengthen our security posture to prevent similar security incidents from recurring.
  • Be the escalation point for complex incidents that SOC L1 and L2 analysts are unable to resolve independently.
  • Help in the continuous development, drive awareness of and improve the Cyber Security Response processes and procedures, ensuring timely and effective response to detected cybersecurity incidents.
  • Assist in evaluating SOC's performance by completing quality reviews on a quarterly basis.
  • Perform basic forensics investigation and fulfill eDiscovery requests in aid of a cybersecurity, legal or HR investigation
  • Use proven industry methods to preserve, collect, analyze and present digital evidences derived from different sources (e.g. end user devices, network, cloud, etc) to reconstruct events that led to incidents
  • Adhere to chain of custody rules for digital evidences, providing them in acceptable formats for legal proceedings
  • Assist the P&G Incident Response Team in investigating and resolving security incidents.
  • Continuously improve and mature our Digital Forensics processes
  • Effectively communicate technical information to non-technical audiences and influence others to comply with policies and conform to standards and best practices.

The Ideal Candidate

  • Is passionate about designing and managing scalable data applications
  • Can work independently and as a team to resolve incidents and develop solutions for the future
  • Has the ability to work cross-functionally across different organizations and geographical locations.
  • Is detail-oriented and analytical in nature, with strong problem-solving skills
  • Has the ability to operate effectively and calmly in high stress situations
  • Possesses strong leadership skills with the ability to communicate effectively with key customers including Senior Management. Articulates security events in a concise and understandable manner.

Job Qualifications
Required:

  • Bachelor's degree or above, majored in software engineering, computer science, information technology, cybersecurity, or related area.
  • At least 5 years of experience related to Digital Forensics and Incident Response (DFIR) or Security Operations Center (SOC).
  • Intermediate/advanced knowledge of different Cybersecurity tools including but not limited to EDR, SIEM, Network proxies and firewalls and Security Orchestration, Automation and Response (SOAR).
  • Experience with forensics tooling (Axiom, Encase, Wireshark, Cellebrite etc)
  • Strong scripting skills (Powershell, Python, Bash, etc)
  • Strong expertise with Windows and Linux/Unix system administration.
  • Solid understanding of major cloud services provider – AWS, Azure and GCP. Having foundational certifications from these CSPs will be an advantage.

Preferred:

  • Has intermediate/advanced and industry recognized certifications such as GCIH, CISSP, GCIH.
  • Awareness of the cyber security/privacy incident disclosure requirements of different geographies

About Us
We produce globally recognized brands and we grow the best business leaders in the industry. With a portfolio of trusted brands as diverse as ours, it is paramount our leaders are able to lead with courage the vast array of brands, categories and functions. We serve consumers around the world with one of the strongest portfolios of trusted, quality, leadership brands, including Always, Ariel, Gillette, Head & Shoulders, Herbal Essences, Oral-B, Pampers, Pantene, Tampax and more. Our community includes operations in approximately 70 countries worldwide.

Visit to know more.

We are an equal opportunity employer and value diversity at our company. We do not discriminate against individuals on the basis of race, color, gender, age, national origin, religion, sexual orientation, gender identity or expression, marital status, citizenship, disability, HIV/AIDS status, or any other legally protected factor.

Job Schedule
Full time

Job Number
R

Job Segmentation
Experienced Professionals

This advertiser has chosen not to accept applicants from your region.

Senior Cyber Security Incident Responder

Taguig, National Capital Region ₱2000000 - ₱2500000 Y Procter & Gamble

Posted today

Job Viewed

Tap Again To Close

Job Description

Information Technology (IT) at Procter & Gamble is where business, innovation and technology integrate to create a competitive advantage for P&G. Our mission is clear - we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT mastery to deliver game-changing, technology-driven business models and capabilities for our 65 iconic, trusted brands.

From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place. You'll be doing meaningful work that takes your career places you never imagined. And you'll do this in creative workspaces where new ideas flourish and where your technical mastery is recognized and rewarded.

The Opportunity

Procter & Gamble is seeking a highly skilled Senior Cyber Security Incident Responder who can leverage technology, develop, and improve our processes and empower organizations that will enable us to respond to any cybersecurity threats quickly and effectively in the P&G environment. Join a team of professionals motivated by groundbreaking technologies and innovations, serving as a catalyst for change, and identifying and aligning solutions to strengthening P&G's cyber security.

You will report to the Cyber Defense Response Services Director based in Cincinnati, United States which is world HQ of P&G. We are proud to be a highly diverse and technically-adept team with members from different countries, cultures and backgrounds.

Your success will be based on operational and project work, which would be reviewed on a quarterly basis. Your manager would provide full-support though continuous mentoring and coaching.

Position Responsibilities

  • Lead the analysis, triage, containment, and remediation of serious and major security incidents following the P&G's cyber security incident response plan.
  • Perform deep dive investigations from start to finish of a security incident using data from disparate sources such as SIEM, internal and external threat intelligence, and host and network-based security tools.
  • Provide expert support to our stakeholders specially the information security leaders from different organization units to resolve cyber security incidents.

  • Collect intrusion artifacts and perform forensically sound collection of images in aid of investigating and resolving cyber security incidents.

  • Perform introspection of incidents to document, publish and share after-action learnings, improve awareness, and strengthen our security posture to prevent similar security incidents from recurring.
  • Be the escalation point for complex incidents that SOC L1 and L2 analysts are unable to resolve independently.
  • Help in the continuous development, drive awareness of and improve the Cyber Security Response processes and procedures, ensuring timely and effective response to detected cybersecurity incidents.
  • Assist in evaluating SOC's performance by completing quality reviews on a quarterly basis.
  • Perform basic forensics investigation and fulfill eDiscovery requests in aid of a cybersecurity, legal or HR investigation
  • Use proven industry methods to preserve, collect, analyze and present digital evidences derived from different sources (e.g. end user devices, network, cloud, etc) to reconstruct events that led to incidents
  • Adhere to chain of custody rules for digital evidences, providing them in acceptable formats for legal proceedings
  • Assist the P&G Incident Response Team in investigating and resolving security incidents.
  • Continuously improve and mature our Digital Forensics processes
  • Effectively communicate technical information to non-technical audiences and influence others to comply with policies and conform to standards and best practices.

The Ideal Candidate

  • Is passionate about designing and managing scalable data applications
  • Can work independently and as a team to resolve incidents and develop solutions for the future
  • Has the ability to work cross-functionally across different organizations and geographical locations.
  • Is detail-oriented and analytical in nature, with strong problem-solving skills
  • Has the ability to operate effectively and calmly in high stress situations
  • Possesses strong leadership skills with the ability to communicate effectively with key customers including Senior Management. Articulates security events in a concise and understandable manner.
This advertiser has chosen not to accept applicants from your region.

Computer Security Incident Response Team

₱900000 - ₱1200000 Y Ascendion

Posted today

Job Viewed

Tap Again To Close

Job Description

On a day-to-day basis, you will assist with, identify and respond to incidents as well as proactively propose improvements for how to reduce risk and potential future incidents.

Receiving and monitoring incident information from our managed security services and other sources.

Reviewing the collected incident data and confirming or rejecting incidents based on the analysis.

Classifying and prioritizing incidents based on established criteria.

Facilitating communication between stakeholders of the incident status.

Coordinating the containment effort based on the available information and established processes.

Performing vulnerability management using the Qualys tool.

Making containment decisions and facilitating decision making by other parties using established escalation processes.

Communicating with affected users and partners to organize the containment effort.

Verifying the effectiveness of containment actions taken.

Identifying the attack vector used by incident and taking actions to confirm that similar incidents are prevented in the future.

Validating the effectiveness of the eradication actions.

Coordinating forensics and law enforcement activities with officials as necessary.

Analyzing the incident response effort, with feedback from the customer and third parties.

Conducting proactive management of the Monitoring and Analytics solution.

This advertiser has chosen not to accept applicants from your region.

Senior Security Incident Response Analyst

₱900000 - ₱1200000 Y Five9

Posted today

Job Viewed

Tap Again To Close

Job Description

Join us in bringing joy to customer experience. Five9 is a leading provider of cloud contact center software, bringing the power of cloud innovation to customers worldwide.

Living our values everyday results in our team-first culture and enables us to innovate, grow, and thrive while enjoying the journey together. We celebrate diversity and foster an inclusive environment, empowering our employees to be their authentic selves.

Job Title:
Sr. Security Incident Response Analyst

Location:
Manila

Work Schedule:
Day-Shift Manila Time (8am to 5pm)

Company Overview:
Five9 provides businesses with reliable, scalable, and secure cloud contact center software designed to create exceptional customer experiences, increase agent productivity, and deliver tangible business results.

We are driven by a passion to transform contact centers into customer engagement centers of excellence. Since 2001, Five9 has led the cloud revolution in contact centers, helping organizations transition from legacy premise-based solutions to the cloud. The Sr Security Incident Response Analyst will ensure a swift and effective response to security incidents. This role requires a deep understanding of incident management best practices and a proven ability to navigate high-pressure situations.

We are looking for an experienced Sr Security Incident Response Analyst to join our Cyber Command Center team. This role includes hands-on involvement in incident response, detection engineering, and security automation. We value a candidate who is autonomous, responsible, and motivated. The right candidate will be comfortable pointing out weak points in our operation and implementing innovative changes that continuously improve our security posture.

Responsibilities:

  • Participate in and lead incident response efforts, from triage to remediation
  • Develop and maintain detection rules, ensuring alerts are high-quality and actionable
  • Perform detection tuning based on threat intelligence, use cases, and incident learnings
  • Build and maintain SOAR playbooks to streamline and automate key workflows
  • Contribute to continuous improvement of SOC processes, tooling, and documentation

Required Qualifications:

  • 3–5 years specifically in incident response and security operations (SOC)
  • Strong analytical and problem-solving skills
  • Excellent communication and reporting abilities (especially during incident escalation)
  • Ability to work under pressure and lead incident investigations
  • Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field
  • Hands-on experience with modern SIEMs
  • Experience working with SOAR platforms (e.g., writing and maintaining automation playbooks)
  • Background in security investigations
  • Strong understanding of log sources, detection logic, and correlation techniques
  • Familiarity with scripting or automation (e.g., Python, Bash)

Preferred Qualifications:

  • Exposure to threat hunting and behavioral detection techniques
  • Experience with cloud environments (GCP, AWS, or Azure)
  • Familiarity with EDR solutions and host-level investigation techniques
  • Experience with hot/cold forensics techniques
  • Experience with reverse engineering
  • Background in enterprise-driven SaaS or customer experience is a plus

What We Offer:

  • A role with real impact in improving and maturing our globally distributed security operations
  • A collaborative environment that encourages autonomy, ownership, and new ideas
  • Opportunities to work on a variety of tasks across detection, response, and automation
  • Support for professional development and growth within the security field

Company Benefits

  • Company stocks
  • Annual merit increase based on performance
  • 15% night shift differential pay
  • Paid Leave with Cash Conversion
  • HMO with free dependents
  • Retirement Plan
  • Life Insurance
  • While on work from home setup: Internet and meal allowance are provided
  • Employee Assistance Program for mental and social well-being
  • Government-mandated Benefits (SSS, PhilHealth, PagIBIG, 13th month pay, Solo parent leave, Special leave for women)

Five9 embraces diversity and is committed to building a team that represents a variety of backgrounds, perspectives, and skills.  The more inclusive we are, the better we are.  Five9 is an equal opportunity employer.

View our privacy policy, including our privacy notice to California residents here:

Note: Five9 will never request that an applicant send money as a prerequisite for commencing employment with Five9.

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security breaches Jobs in Philippines !

Senior Cyber Security Incident Responder

Procter & Gamble

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Job Location
MANILA NET PARK OFFICE
Job Description
Information Technology (IT) at Procter & Gamble is where business, innovation and technology integrate to create a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT mastery to deliver game-changing, technology-driven business models and capabilities for our 65 iconic, trusted brands.
From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place. You'll be doing meaningful work that takes your career places you never imagined. And you'll do this in creative workspaces where new ideas flourish and where your technical mastery is recognized and rewarded.
The Opportunity
Procter & Gamble is seeking a highly skilled Senior Cyber Security Incident Responder who can leverage technology, develop, and improve our processes and empower organizations that will enable us to respond to any cybersecurity threats quickly and effectively in the P&G environment. Join a team of professionals motivated by groundbreaking technologies and innovations, serving as a catalyst for change, and identifying and aligning solutions to strengthening P&G's cyber security.
You will report to the Cyber Defense Response Services Director based in Cincinnati, United States which is world HQ of P&G. We are proud to be a highly diverse and technically-adept team with members from different countries, cultures and backgrounds.
Your success will be based on operational and project work, which would be reviewed on a quarterly basis. Your manager would provide full-support though continuous mentoring and coaching.
Position Responsibilities
+ Lead the analysis, triage, containment, and remediation of serious and major security incidents following the P&G's cyber security incident response plan.
+ Perform deep dive investigations from start to finish of a security incident using data from disparate sources such as SIEM, internal and external threat intelligence, and host and network-based security tools.
+ Provide expert support to our stakeholders specially the information security leaders from different organization units to resolve cyber security incidents.
+ Collect intrusion artifacts and perform forensically sound collection of images in aid of investigating and resolving cyber security incidents.
+ Perform introspection of incidents to document, publish and share after-action learnings, improve awareness, and strengthen our security posture to prevent similar security incidents from recurring.
+ Be the escalation point for complex incidents that SOC L1 and L2 analysts are unable to resolve independently.
+ Help in the continuous development, drive awareness of and improve the Cyber Security Response processes and procedures, ensuring timely and effective response to detected cybersecurity incidents.
+ Assist in evaluating SOC's performance by completing quality reviews on a quarterly basis.
+ Perform basic forensics investigation and fulfill eDiscovery requests in aid of a cybersecurity, legal or HR investigation
+ Use proven industry methods to preserve, collect, analyze and present digital evidences derived from different sources (e.g. end user devices, network, cloud, etc) to reconstruct events that led to incidents
+ Adhere to chain of custody rules for digital evidences, providing them in acceptable formats for legal proceedings
+ Assist the P&G Incident Response Team in investigating and resolving security incidents.
+ Continuously improve and mature our Digital Forensics processes
+ Effectively communicate technical information to non-technical audiences and influence others to comply with policies and conform to standards and best practices.
The Ideal Candidate
+ Is passionate about designing and managing scalable data applications
+ Can work independently and as a team to resolve incidents and develop solutions for the future
+ Has the ability to work cross-functionally across different organizations and geographical locations.
+ Is detail-oriented and analytical in nature, with strong problem-solving skills
+ Has the ability to operate effectively and calmly in high stress situations
+ Possesses strong leadership skills with the ability to communicate effectively with key customers including Senior Management. Articulates security events in a concise and understandable manner.
Job Qualifications
Required:
+ Bachelor's degree or above, majored in software engineering, computer science, information technology, cybersecurity, or related area.
+ At least 5 years of experience related to Digital Forensics and Incident Response (DFIR) or Security Operations Center (SOC).
+ Intermediate/advanced knowledge of different Cybersecurity tools including but not limited to EDR, SIEM, Network proxies and firewalls and Security Orchestration, Automation and Response (SOAR).
+ Experience with forensics tooling (Axiom, Encase, Wireshark, Cellebrite etc)
+ Strong scripting skills (Powershell, Python, Bash, etc)
+ Strong expertise with Windows and Linux/Unix system administration.
+ Solid understanding of major cloud services provider - AWS, Azure and GCP. Having foundational certifications from these CSPs will be an advantage.
Preferred:
+ Has intermediate/advanced and industry recognized certifications such as GCIH, CISSP, GCIH.
+ Awareness of the cyber security/privacy incident disclosure requirements of different geographies
About us
We produce globally recognized brands and we grow the best business leaders in the industry. With a portfolio of trusted brands as diverse as ours, it is paramount our leaders are able to lead with courage the vast array of brands, categories and functions. We serve consumers around the world with one of the strongest portfolios of trusted, quality, leadership brands, including Always®, Ariel®, Gillette®, Head & Shoulders®, Herbal Essences®, Oral-B®, Pampers®, Pantene®, Tampax® and more. Our community includes operations in approximately 70 countries worldwide.
Visit to know more.
We are an equal opportunity employer and value diversity at our company. We do not discriminate against individuals on the basis of race, color, gender, age, national origin, religion, sexual orientation, gender identity or expression, marital status, citizenship, disability, HIV/AIDS status, or any other legally protected factor.
Job Schedule
Full time
Job Number
R
Job Segmentation
Experienced Professionals
This advertiser has chosen not to accept applicants from your region.

CSIRT - Computer Security Incident Response Team - Hybrid Setup

Ayala Alabang, National Capital Region ₱900000 - ₱1200000 Y Ascendion

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description:

Our newly offered service will include a designated CSIRT Consultant full time or as a shared resource, who will work as a contact and communications point between our security services team and customers' security and IT staff as well as users and other important partners. You will also be responsible for operating the incident management process in accordance with the procedures designed in cooperation with customers.

On a day-to-day basis, you will assist with, identify and respond to incidents as well as proactively propose improvements for how to reduce risk and potential future incidents.

Receiving and monitoring incident information from our managed security services and other sources.

Reviewing the collected incident data and confirming or rejecting incidents based on the analysis.

Classifying and prioritizing incidents based on established criteria.

Facilitating communication between stakeholders of the incident status.

Coordinating the containment effort based on the available information and established processes.

Performing vulnerability management using the Qualys tool.

Making containment decisions and facilitating decision making by other parties using established escalation processes.

Communicating with affected users and partners to organize the containment effort.

Verifying the effectiveness of containment actions taken.

Identifying the attack vector used by incident and taking actions to confirm that similar incidents are prevented in the future.

Validating the effectiveness of the eradication actions.

Coordinating forensics and law enforcement activities with officials as necessary.

Analyzing the incident response effort, with feedback from the customer and third parties.

Conducting proactive management of the Monitoring and Analytics solution.

This advertiser has chosen not to accept applicants from your region.

Information Security

₱1300000 - ₱1560000 Y RSD Human Resource Management Consultancy

Posted today

Job Viewed

Tap Again To Close

Job Description

Skills & Experience

Mandatory

o Knowledge of latest ISO 27001 standard, PCI DSS, and HIPAA.

o Internal and External audit experience of ISO standards ISO 27001.

o Knowledge and audit experience of HIPAA compliance and HITRUST requirements.

o Should have knowledge/hand on experience on working on SOC 2/ HITRUST/PCI DSS,

requirements.

o Should have hands-on experience in VAPT, Vulnerability management, and cyber

security management.

o Should have knowledge of the basic ITGC controls/Information Security.

o Certified Lead Auditor for ISMS and Certified PCI DSS implementor.

o Experience in coordinating with vendors and internal stakeholders for different

compliance and information security tasks.

o Should have knowledge of BCP/DR and conduct BCP tests.

o Experience in handling Risk Management Audits, Risk Registers, BIA processes.

o Knowledge and experience of Risk Management standards i.e. ISO 31000.

o Knowledge and experience of all BCM implementation based on ISO 22301.

o Good written and verbal communication skills.

Desired

o Knowledge of Information Security.

o Knowledge of PCI DSS and VAPT assessments.

o Knowledge of SOC 2, HIPAA and HITRUST Audits.

o Hands on experience of managing BCP incidents.

Job Type: Full-time

Pay: Up to Php130,000.00 per month

Benefits:

  • Paid training

Work Location: In person

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Breaches Jobs