IT Security Analyst - Hybrid/WFH

Pasig, National Capital Region
Posted 21 days ago
Logo TASQ Staffing Solutions
Company:
TASQ Staffing Solutions
Company Description:
Founded by experts with more than 70 years of collective experience in the staffing solutions industry, TASQ understands the unique challenges in the talent acquisition space and is committed to being the trusted partner of companies in their pursuit of hiring the best people to fill their manpower needs. Composed of highly skilled team members who have worked with organizations ranging from small-to-medium entities to large-scale enterprises (including Fortune 500 companies), TASQ is fully capable of meeting staffing demands at all levels and across different industries.
Contract Type:
Full Time
Experience Required:
1 year
Education Level:
Bachelor’s Degree
Number of vacancies:
1

Job Description

TASQ is looking to fill a hybrid/WFH position for a Security Operations Center Level 1 Analyst ASAP.

The pre-screening interview will take place over the phone.

About the job Security Operations Center Level 1 Analyst

Role summary

The SOC Analyst Level 1 will report in a hybrid work - either work remotely routing through the Internet or will report to the office as required.
And provide technical, administrative, and procedural support for the company's Group and its clients information security program to protect the confidentiality, integrity, and availability of information systems in accordance with the company's Groups business objectives, regulatory requirements, and strategic goals.
Specific responsibilities

Monitoring & Detection:
SIEM Tools: Experience with Security Information and Event Management (SIEM) platforms (e.g., Splunk, QRadar, AlienVault, Rapid7) to monitor, analyse, and respond to alerts.
Log Analysis: Ability to review logs from various sources (firewalls, IDS/IPS, endpoint protection) to detect anomalies and potential threats.Provide first-level contact to clients by manning virtual phones to receive called-in requests
Incident Triage & Response:
Initial Analysis: Conduct first-level triage of alerts, determining the nature of incidents, their severity, and potential impact.
Escalation: Understand when to escalate incidents based on predefined criteria, involving senior analysts when necessary.
Playbook Execution: Follow incident response playbooks and procedures for common threat scenarios like phishing, malware detection, and unauthorized access.
Threat Intelligence & Reporting:
Threat Awareness: Basic understanding of the latest threats, vulnerabilities, and attack methods.
Documentation: Consistent and thorough documentation of incidents, resolutions, and actions taken.
Collaboration: Clear communication with internal teams and external stakeholders for incident coordination.
Skillset & Qualifications:

Technical Skills: Basic knowledge of network protocols, TCP/IP, firewalls, and endpoint security solutions.
Ideally certified with entry-level qualifications like CompTIA Security+, Certified SOC Analyst (CSA), or GIAC Security Essentials (GSEC). Soft Skills:
Strong analytical thinking, attention to detail, and effective communication, especially in high-pressure situations.
Experience Level:

Work Background: Typically, 1-2 years of IT or cybersecurity-related experience; recent graduates with strong foundational knowledge and a willingness to learn may also be considered.
Requirements:

Stable 10mbps Internet connectivity minimum to properly perform required tasks
Backup connectivity same capacity to ensure continuity in the event of primary connectivity unavailability
Everything is hosted in the cloud AND within the client/partner environment online