Post Job Free
Sign in

Japanese Cyber Security Operation Center Analyst

Company:
J-K Network Services
Location:
Quezon, Philippines
Posted:
April 10, 2025
Apply

Description:

Shared Service Company in the Philippines.

A fortune 500 Company currently holding The leading company brands and products used in 130 countries world wide.

Position: Japanese Cyber Security Operation Center Analyst Industry: Shared Services Salary: up to Php 90,000 + 4,600 ALLOWANCE Location: Taguig Work Arrangement: Hybrid BENEFITS: High basic salary 4,600 Allowance Hybrid Other benefits will discuss on the Job Offer stage Requirements: JLPT N1-N5 Passer 1 year of experience in Information Security or 2 years of experience in system or network administration.

1 year working within a SOC team is a plus.

Knowledge of information security principles and best practices.

Familiarity with tools and techniques used in incident detection and response.

Experience with Microsoft security products is a plus.

E.g.

Microsoft Defender for Endpoint.

University degree in Computer Sciences, Information Systems, or related field or relevant experience Fluent English - written and spoken Reading/Speaking Japanese language would be useful Analytical/problem solving ability Understanding of fundamentals of OS and Networking Good understanding EDR/XDR solutions, SIEM platforms and Ticketing systems Knowledge of security santandar (e.g.

NIST 800-61) and MITRE ATT&CK framework Ability to work under constantly changing conditions and tight deadlines Communications skills and capable of focusing on the important and the details.

Scripting abilities are a plus (Powershell or Python desirable) Responsibilities: Respond to low and medium Security Incidents, mainly but not exclusively to Phishing, Malware and Web Attacks related Security Incidents.

Assess, triage, categorize and prioritize Security Incidents and escalate to higher tiers when severity is elevated.

Derive immediate mitigation measures for containment, eradication, and recovery of Security Incident in line with internal SLAs and track progress.

Coordinate Incident Response task forces with different IT functions and end users according to established playbooks.

Estimate the scope of impacted asset, ensure that remediation is properly address to all scope identified during the Analysis stage.

Collect forensics malicious payloads, forensics artifacts and IOCs according to SOPs and for further analysis by SOC personnel.

Provide basic malware analysis using sandboxing solutions.

Support Security Incident Managers during relevant security incidents by following their ad-hoc instructions during the incident handling.

Contribution to the creation, maintenance and improvement of Security Incident playbooks and SOPs in scope of Incident Response daily activities.

Monitor Security Industry trends on new threats and share knowledge with rest of the team.

Recruitment process: Validation HR Interview Technical Interview Language / Culture Fit Interview

Apply