350 Security Operations Center Soc Analyst jobs in the Philippines
Security Operations Center and Incident Response Manager
Posted today
Job Viewed
Job Description
Line of Service
Assurance
Industry/Sector
Not Applicable
Specialism
Cybersecurity & Privacy
Management Level
Manager
Job Description & Summary
A career in our Risk and Compliance Management practice, within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. You'll play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.
Our team helps organisations transform their governance, risk, and compliance activities into a tool that is able to anticipate and mitigate risk to drive business performance. In joining, you'll develop risk management solutions, compliance and ethics controls, business continuity planning, internal audit procedures, and a compliance framework.
To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.
As a Manager, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:
- Develop new skills outside of comfort zone.
- Act to resolve issues which prevent the team working effectively.
- Coach others, recognise their strengths, and encourage them to take ownership of their personal development.
- Analyse complex ideas or proposals and build a range of meaningful recommendations.
- Use multiple sources of information including broader stakeholder views to develop solutions and recommendations.
- Address sub-standard work or work that does not meet firm's/client's expectations.
- Use data and insights to inform conclusions and support decision-making.
- Develop a point of view on key global trends, and how they impact clients.
- Manage a variety of viewpoints to build consensus and create positive outcomes for all parties.
- Simplify complex messages, highlighting and summarising key points.
- Uphold the firm's code of ethics and business conduct.
*Roles & Responsibilities *
- Lead and manage Organisation's Security Operations Center (SOC).
- Responsible for incident identification, assessment, quantification, reporting, communication, mitigation and monitoring
- Responsible for compliance to SLA, process adherence and process optimization to achieve the SOC's operational objectives
- Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Center
- Perform threat management, threat modelling, identify threat vectors and develop use cases for security monitoring
- Responsible for integration of standard and non-standard logs into SIEM
- Creation of reports, dashboards, metrics for SOC operations and presentation to Executive Management and Cyber and Information security or Risk Management committees
- Develop and maintain an incident response program/plan consistent with incident response management processes and standards.
- Implement monitoring tools in the cloud
- Work with other SOC analysts to create security-related rules to provide alerts on any suspicious activities
- Conduct periodic threat simulation activities to evaluate the adequacy of deployed detective controls
- Establish and maintain a database of detected and reported information security incidents
- Provide support for forensic investigations related to Information security incidents and develop and share security event logging requirements with infrastructure and applications teams
- Liaise with stakeholders for timely isolation, containment and remediation of Indicators of Compromise (IOCs) related to validated threat intelligence information
*Requirements *
- A minimum of a degree in Computer Science / Engineering, Information
- Technology, Electrical Engineering or a related field of study from a recognised Professional Certification such as CISSP, CISM, CEH or GCIH will be an added advantage
- A Second degree is an added advantage
Minimum of Five (5) years of relevant IT work experience which may include Information Security, IT Infrastructure Management, IT Vendor Assessment and over two (2) years in a managerial role.
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:
Certifications (if blank, certifications not specified)
Required Skills
Optional Skills
Desired Languages (If blank, desired languages not specified)
Travel Requirements
Available for Work Visa Sponsorship?
Government Clearance Required?
Job Posting End Date
Security Operations Center and Incident Response Manager
Posted today
Job Viewed
Job Description
Line of Service
Assurance
Industry/Sector
Not Applicable
Specialism
Cybersecurity & Privacy
Management Level
Manager
Job Description & Summary
A career in our Risk and Compliance Management practice, within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. You'll play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.
Our team helps organisations transform their governance, risk, and compliance activities into a tool that is able to anticipate and mitigate risk to drive business performance. In joining, you'll develop risk management solutions, compliance and ethics controls, business continuity planning, internal audit procedures, and a compliance framework.
To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.
As a Manager, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:
- Develop new skills outside of comfort zone.
- Act to resolve issues which prevent the team working effectively.
- Coach others, recognise their strengths, and encourage them to take ownership of their personal development.
- Analyse complex ideas or proposals and build a range of meaningful recommendations.
- Use multiple sources of information including broader stakeholder views to develop solutions and recommendations.
- Address sub-standard work or work that does not meet firm's/client's expectations.
- Use data and insights to inform conclusions and support decision-making.
- Develop a point of view on key global trends, and how they impact clients.
- Manage a variety of viewpoints to build consensus and create positive outcomes for all parties.
- Simplify complex messages, highlighting and summarising key points.
- Uphold the firm's code of ethics and business conduct.
*Roles & Responsibilities *
- Lead and manage Organisation's Security Operations Center (SOC).
- Responsible for incident identification, assessment, quantification, reporting, communication, mitigation and monitoring
- Responsible for compliance to SLA, process adherence and process optimization to achieve the SOC's operational objectives
- Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Center
- Perform threat management, threat modelling, identify threat vectors and develop use cases for security monitoring
- Responsible for integration of standard and non-standard logs into SIEM
- Creation of reports, dashboards, metrics for SOC operations and presentation to Executive Management and Cyber and Information security or Risk Management committees
- Develop and maintain an incident response program/plan consistent with incident response management processes and standards.
- Implement monitoring tools in the cloud
- Work with other SOC analysts to create security-related rules to provide alerts on any suspicious activities
- Conduct periodic threat simulation activities to evaluate the adequacy of deployed detective controls
- Establish and maintain a database of detected and reported information security incidents
- Provide support for forensic investigations related to Information security incidents and develop and share security event logging requirements with infrastructure and applications teams
- Liaise with stakeholders for timely isolation, containment and remediation of Indicators of Compromise (IOCs) related to validated threat intelligence information
Requirements
- A minimum of a degree in Computer Science / Engineering, Information
- Technology, Electrical Engineering or a related field of study from a recognised Professional Certification such as CISSP, CISM, CEH or GCIH will be an added advantage
- A Second degree is an added advantage
Minimum of Five (5) years of relevant IT work experience which may include Information Security, IT Infrastructure Management, IT Vendor Assessment and over two (2) years in a managerial role.
Education
(if blank, degree and/or field of study not specified)
Degrees/Field of Study required:
Degrees/Field of Study preferred:
Certifications
(if blank, certifications not specified)
Required Skills
Optional Skills
Desired Languages
(If blank, desired languages not specified)
Travel Requirements
Available for Work Visa Sponsorship?
Government Clearance Required?
Job Posting End Date
Security Incident Response Analyst
Posted today
Job Viewed
Job Description
Summary
Support the global Information Security Team by detecting, analyzing, and responding to security incidents. Help protect the firm's systems and data based on business needs and compliance requirements.
Key Responsibilities
- Handle Tier 2 security incidents and resolve tickets within SLA
- Analyze alerts and data to assess potential threats
- Recommend improvements to current security practices
- Help design and implement threat detection tools
- Use tools like SIEM, log management, and packet capture
- Assist with forensic investigations and evidence handling
- Maintain system reliability and performance
- Report issues and metrics to management
- Contribute to security awareness and documentation
- Join special projects as needed
Required Skills & Experience
- 4–5 years of relevant experience
- Strong background in digital forensics
Hands-on experience in:
- Incident Response
- Threat Detection
- Malware Analysis
- Forensics & Incident Handling
- Network Traffic Analysis
- SOAR & Threat Intelligence
- EDR & Vulnerability Management
- Cloud Forensics & Incident Response
- SIEM tools
Work Schedule:
Rotating shifts every 2 months
- APAC: 6am–3pm
- EMEA: 2pm–11pm
- WHEM: 10pm–7am (next day)
- Workdays: Sunday–Thursday or Monday–Friday
Incident Response Analyst
Posted today
Job Viewed
Job Description
The Incident Response Analyst will provide detection, containment, and analysis of security events to protect the confidentiality, integrity, and availability of information systems in accordance with the firm's business objectives, regulatory requirements, and strategic goals.
Responsibilities
- Provide Tier 2 incident response services to the global organization on behalf of the Information Security Team
- Receive, process, and resolve tickets per defined SLA's
- Analyze information garnered from monitoring systems, operational incidents, and other sources to determine the scope and impact of potential security incidents, and process accordingly
- Critically assess current practices and provide feedback to management on improvement opportunities
- Assist with the design and implementation of threat detection and prevention solutions identified as necessary for the protection of Firm assets
- Effectively utilize common IR toolsets, platforms, and processes, such as SIEM, log management, packet capture, and breach detection systems
- Assist with forensic examinations and chain-of-custody procedures as directed by the Security Incident Response Engineers
- Provide input into standards and procedures
- Report compliance failures to management for immediate remediation
- Maintain assigned systems to ensure availability, reliability, and integrity, including the oversight of current and projected capacity, performance, and licensing
- Provide status reports and relevant metrics to the Security Operations Manager
- Contribute to the Firm's security-related information repositories and other marketing/awareness endeavors
- Participate in special projects as needed
Skills and Experience
Education
- Possess a Computer Science Bachelor's Degree or substantial equivalent experience
Special Requirements, Licenses, and Certifications (desirable but not required):
- GSEC, GCIH, GCFE, GREM
- CISSP or SSCP
Experience
- Some professional experience in information security with a focus on incident response and forensics
- Foundational knowledge of IR concepts and best practices, including forensics and chain-of-custody
- Experience with common IR tools such as SIEM, log management, IDS, breach detection systems (APT/BDS/EDR), and packet capture.
- Broad understanding of TCP/IP, DNS, common network services, and other foundational topics
- Working knowledge of malware detection, analysis, and evasion techniques
- Able to conduct static and dynamic analysis of malware to extract indicators of compromise, profile malware behavior, and provide recommendations for mitigating and detecting malware; Able to analyze suspicious websites, script-based and malware code
- Experience with vulnerability management tools such as Qualys, Nessus, or other vulnerability scanning discovery tools
- Broad familiarity with the threat landscape and the ability to adapt practices to evolving circumstances
- Identify, analyze, and report threats within the enterprise by using information collected from a variety of sources (IDS/IPS, SIEM, AV), to protect data and networks. Implement techniques to hunt for known and unknown threats based on available threat intelligence reports and knowledge of the attacker's TTPs
- Able to gather and analyze facts, draw conclusions, define problems, and suggest solutions
- Maintain critical thinking and composure under pressure
- Strong written and oral communication skills. Ability to convey complex concepts to non-technical constituents.
- Proficiency in oral and written English
- Capable of assisting with the preparation of internal training materials and documentation
- Able to be productive and maintain focus without direct supervision
- Passionate in the practice and pursuit of IR excellence
- Can exhibit a disciplined and rigorous approach to incident handling
- Willing to accommodate shift-based work for a global organization
- Provide exemplary customer service by striving for first-call resolution and demonstrating empathy, respect, professionalism, and expertise
- Experience with digital forensics on host or network and identification of anomalous behavior on the network or endpoint devices. Familiar with host and network-based forensic tools such as EnCase, FTK, Sleuth Kit, X Ways, etc.
Incident Response Specialist
Posted today
Job Viewed
Job Description
We are looking for a skilled Incident Response Specialist to lead the investigation and resolution of high-priority and escalated security incidents. In this role, you will work closely with internal teams to improve the bank's cybersecurity defenses and ensure timely response to threats.
What You'll DoIncident Handling & Investigation
- Lead investigations of complex or escalated security incidents.
- Perform deep-dive forensic analysis, including root cause and post-incident reviews.
- Act as an escalation point for other analysts during critical security events.
- Analyze incidents to assess impact, risk, and potential data compromise.
Threat Containment & Response
- Lead threat containment, eradication, and recovery efforts.
- Identify malware behavior, compromised systems, and data infiltration attempts.
- Provide guidance to teams on remediation and recovery strategies.
- Communicate response plans clearly to asset owners and other stakeholders.
Threat Intelligence & Analysis
- Use threat intelligence to assess scope and impact of attacks.
- Analyze network traffic, malware, and suspicious behaviors to support investigations.
- Support Threat Hunting and SOC Tool teams with new detection methods.
Documentation & Playbooks
- Document incidents thoroughly from detection to resolution.
- Develop, update, and test incident response procedures and playbooks.
- Participate in simulations and response drills to ensure readiness.
Collaboration & Support
- Work with Infrastructure & Operations teams to resolve incidents.
- Collaborate with the SOC Manager and Incident Response Lead to improve processes.
- Review system metrics and monitoring data to identify trends and anomalies.
Tool Management & Continuous Improvement
- Evaluate, recommend, and troubleshoot security tools and technologies.
- Contribute to improving SOC policies, procedures, and overall maturity.
- Stay informed about new threats, vulnerabilities, and compliance requirements.
Additional Responsibilities
- Perform other tasks as assigned by the CTMD Head.
- Education: Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- Experience: Proven experience in incident response, malware analysis, and threat detection.
Technical Skills:
Strong understanding of network, system, and application security.
- Hands-on experience with SOC tools, threat intelligence platforms, and forensic tools.
Soft Skills:
Clear communication with both technical and non-technical stakeholders.
- Strong analytical, problem-solving, and decision-making abilities.
- Ability to perform under pressure and manage escalated incidents.
- Knowledge: Familiarity with regulatory requirements and cybersecurity frameworks (e.g., ISO, NIST, etc.).
Incident Response Analyst
Posted today
Job Viewed
Job Description
Job Description:
Security Alert Triage
- Continuously monitoring security alerts generated by various security tools via SecOps and messaging apps (firewalls, intrusion detection systems, etc.)
- Analyzing alerts to determine their severity, legitimacy (potential false positives), and potential organizational impact.
- Prioritizing alerts based on a predefined risk assessment framework.
Initial Investigation
- Conducting basic investigations on prioritized alerts to gather additional context and evidence.
- Utilizing security tools and threat intelligence feeds to enrich their understanding of the incident.
Incident Classification and Reporting
- Classifying incidents based on predefined categories (e.g., phishing, malware, unauthorized access attempt).
- Documenting the incident details, including timeline, potential impact, and initial investigation findings.
- Reporting the incident to relevant internal stakeholders (security team leads, IT management).
Initial Containment
- Implementing basic containment actions based on the incident type (e.g., isolating compromised systems, disabling user accounts).
- This may involve following established playbooks or procedures for specific threats.
Job Qualifications:
Education: Bachelor's degree in computer science, Computer Engineering, Information Technology, Electronic and Communications Engineering, course with specialization in Cybersecurity, and another related course
Relevant Experience: Fundamental knowledge of Cybersecurity Concepts and Frameworks
Knowledge/Training: Service Management Framework, MITRE Framework, SIEM, SOAR, Network and Endpoint Security Tools
Certification/License: CompTIA Security+, Certified Blue Team, or any other Security Operations Related Certification is an advantage
Work Condition: Able to work onsite in Makati. The role will be part of a 24/7 shifting schedule.
Incident Response Analyst
Posted today
Job Viewed
Job Description
Hiring for Incident Response Analyst
Full-time
Location: Taguig City
Set-up: Hybrid (8x RTO per month)
Schedule: Shifting every 2 months (Day, Mid, Night)
___
JOB SUMMARY:
To provide detection, containment, and analysis of security events to protect the confidentiality, integrity, and availability of information systems per the firm's business objectives, regulatory requirements, and strategic goals.
___
JOB RESPONSIBILITIES:
- At least 4 years of relevant experience
- 1-2 years forensic analysis
Job Types: Full-time, Permanent
Pay: Up to Php120,000.00 per month
Application Question(s):
- Are you amenable to work on hybrid set-up in Taguig?
Experience:
- Incident response: 4 years (Preferred)
- Forensic analysis: 2 years (Preferred)
Work Location: In person
Be The First To Know
About the latest Security operations center soc analyst Jobs in Philippines !
Incident Response Analyst
Posted today
Job Viewed
Job Description
Responsibilities:
- Provide Tier 2 incident response services to the global organization on behalf of the Information Security Team
- Receive, process, and resolve tickets per defined SLA's
- Analyze information garnered from monitoring systems, operational incidents, and other sources to determine the scope and impact of potential security incidents, and process accordingly
- Critically assess current practices and provide feedback to management on improvement opportunities
- Assist with the design and implementation of threat detection and prevention solutions identified as necessary for the protection of Firm assets
- Effectively utilize common IR toolsets, platforms, and processes, such as SIEM, log management, packet capture, and breach detection systems
- Assist with forensic examinations and chain-of-custody procedures as directed by the Security Incident Response Engineers
- Provide input into standards and procedures
- Report compliance failures to management for immediate remediation
- Maintain assigned systems to ensure availability, reliability, and integrity, including the oversight of current and projected capacity, performance, and licensing
- Provide status reports and relevant metrics to the Security Operations Manager
- Contribute to the Firm's security-related information repositories and other marketing/awareness endeavors
- Participate in special projects as needed
Requirements:
- Possess a Computer Science Bachelor's Degree or substantial equivalent experience
- At least
4- 5 years
relevant experience - L2/L3 support with full IR lifecycle experience
(Preparation, identification, containment, eradication/remediation, recovery, lessons learned/follow-up)
What we offer:
- Direct, fulltime and permanent work engagement
- Hybrid Work Arrangement: 8 times RTO per month. Must be amenable to render overtime, work on weekends and/or PH holidays if needed.
- Shifting Schedule
- Competitive Base Pay per month
- Up to 14
th
month pay - 30 days PTO
- Others, to be discussed once candidate reached the offer stage
Incident Response Analyst
Posted today
Job Viewed
Job Description
Position: Incident Response Analyst
Work Setup: Hybrid – 8x RTO per month
Work Location: (Insert company / confidential if needed)
Schedule: Rotating shifts (changes every 2 months)
- APAC: 6:00 AM – 3:00 PM
- EMEA: 2:00 PM – 11:00 PM
- WHEM: 10:00 PM – 7:00 AM (next day)
- Sunday–Thursday or Monday–Friday
- Note:
Must be amenable to render overtime, work on weekends and Philippine holidays when neededAbout the Role
We're looking for a highly analytical Incident Response Analyst to join our global Information Security Team. This role is responsible for detecting, investigating, and mitigating security incidents to protect the organization's systems and data. You'll collaborate with security engineers, analysts, and stakeholders worldwide to maintain a secure and resilient IT environment.
Key Responsibilities
- Provide Tier 2 incident response support, analyzing alerts and investigating potential security breaches.
- Receive, process, and resolve security tickets within defined SLAs.
- Use monitoring tools and log data to determine the scope and impact of incidents.
- Support forensic analysis and evidence handling following chain-of-custody procedures.
- Operate and maintain security tools such as SIEM, IDS/IPS, EDR, and breach detection systems.
- Assist in designing and implementing new threat detection and prevention measures.
- Create incident reports and maintain documentation of security events and resolutions.
- Participate in audits, compliance reviews, and improvement of security processes.
- Provide status reports and metrics to the Security Operations Manager.
- Collaborate on security awareness initiatives and contribute to incident response playbooks.
Qualifications
Education:
- Bachelor's degree in Computer Science, Information Technology, or equivalent experience.
Experience:
- Professional experience in Information Security, particularly in Incident Response or Digital Forensics.
- Hands-on experience with SIEM, log management, vulnerability scanners (Qualys, Nessus), and endpoint detection tools.
- Solid understanding of network protocols (TCP/IP, DNS), malware analysis, and threat-hunting techniques.
- Experience analyzing network or host-based forensic data using tools like EnCase, FTK, or Sleuth Kit.
- Strong problem-solving, analytical, and documentation skills.
- Excellent written and verbal English communication skills.
Certifications (Preferred):
- GCFE, GCFA, GCTI, GREM, GPEN, GWAPT, CISSP, or SSCP
Job Type: Full-time
Pay: Php65, Php100,000.00 per month
Education:
- Bachelor's (Preferred)
Experience:
- Incident Response: 4 years (Preferred)
- Threat Detection: 4 years (Preferred)
- Malware Analysis: 4 years (Preferred)
Work Location: In person
Incident Response Analyst
Posted today
Job Viewed
Job Description
Position: Incident Response Analyst
Work Setup: Hybrid – 8x RTO per month
Work Location: BGC, Taguig
Schedule: Rotating shifts (changes every 2 months)
- APAC: 6:00 AM – 3:00 PM
- EMEA: 2:00 PM – 11:00 PM
- WHEM: 10:00 PM – 7:00 AM (next day)
Sunday–Thursday or Monday–Friday
Note: Must be amenable to render overtime, work on weekends and Philippine holidays when needed
We're looking for a highly analytical Incident Response Analyst to join our global Information Security Team. This role is responsible for detecting, investigating, and mitigating security incidents to protect the organization's systems and data. You'll collaborate with security engineers, analysts, and stakeholders worldwide to maintain a secure and resilient IT environment.
Key Responsibilities- Provide Tier 2 incident response support, analyzing alerts and investigating potential security breaches.
- Receive, process, and resolve security tickets within defined SLAs.
- Use monitoring tools and log data to determine the scope and impact of incidents.
- Support forensic analysis and evidence handling following chain-of-custody procedures.
- Operate and maintain security tools such as SIEM, IDS/IPS, EDR, and breach detection systems.
- Assist in designing and implementing new threat detection and prevention measures.
- Create incident reports and maintain documentation of security events and resolutions.
- Participate in audits, compliance reviews, and improvement of security processes.
- Provide status reports and metrics to the Security Operations Manager.
- Collaborate on security awareness initiatives and contribute to incident response playbooks.
Education:
- Bachelor's degree in Computer Science, Information Technology, or equivalent experience.
Experience:
- Professional experience in Information Security, particularly in Incident Response or Digital Forensics.
- Hands-on experience with SIEM, log management, vulnerability scanners (Qualys, Nessus), and endpoint detection tools.
- Solid understanding of network protocols (TCP/IP, DNS), malware analysis, and threat-hunting techniques.
- Experience analyzing network or host-based forensic data using tools like EnCase, FTK, or Sleuth Kit.
- Strong problem-solving, analytical, and documentation skills.
- Excellent written and verbal English communication skills.
Certifications (Preferred):
- GCFE, GCFA, GCTI, GREM, GPEN, GWAPT, CISSP, or SSCP