Security Operations Analyst

PH003 - TAGUIG CITY,Philippines(PH003)

DXC Technology

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds.

View all jobs at DXC Technology

Apply now Apply later

Job Description:

Roles and Responsibilities:

The day-to-day tasks of a SOC Analyst are dynamic and require a keen eye for detail and a proactive mindset. Core responsibilities can be categorized as follows:

  • Continuous Monitoring and Analysis: At the heart of the SOC Analyst's role is the constant monitoring of security alerts and network traffic. They utilize a variety of tools, including Security Information and Event Management (SIEM) systems, Intrusion Detection Systems (IDS), and firewalls, to identify suspicious activity and potential security breaches.
  • Incident Triage and Investigation: When an alert is triggered, the analyst is responsible for the initial triage to determine its validity and potential impact. This involves investigating the nature of the threat, identifying affected systems, and distinguishing between false positives and genuine incidents.
  • Threat Response and Mitigation: Upon confirming a credible threat, the SOC Analyst takes immediate action to contain and neutralize it. This may involve isolating affected endpoints, blocking malicious IP addresses, or deploying other countermeasures to prevent further damage.
  • Reporting and Documentation: Detailed and accurate documentation is crucial. SOC Analysts maintain records of security incidents, including the timeline of events, actions taken, and the ultimate resolution. This information is vital for post-incident analysis, compliance audits, and improving future security measures.
  • Staying Ahead of the Curve: The threat landscape is constantly changing. A significant part of a SOC Analyst's job is to stay informed about the latest cyber threats, vulnerabilities, and attack vectors. This includes actively researching emerging trends and participating in continuous learning and professional development.

The SOC Analyst Tiers: A Path of Progression

The SOC environment is often structured in tiers, offering a clear career path for analysts to grow their skills and responsibilities:

  • Tier 1 (Triage Analyst): This is typically an entry-level position. Tier 1 analysts are responsible for the initial monitoring of alerts, performing basic analysis, and escalating more complex incidents to senior analysts. They are the first line of defense, filtering the noise to identify potential threats.
  • Tier 2 (Incident Responder): Tier 2 analysts possess a deeper understanding of security principles and tools. They conduct more in-depth investigations into escalated incidents, perform forensic analysis, and develop and implement remediation plans. They often work closely with other IT teams to resolve security issues.

Basic Qualifications:
• Bachelor's degree in a relevant field or equivalent combination of education and experience
• Typically, 2+ years of relevant work experience
• Proficiencies in information security and risk assessment
• A continuous learner that stays abreast with industry knowledge and technology

Other Qualifications:
• Advanced degree in a relevant field is a plus
• Relevant certifications such as CompTIA Security+, CEH, or equivalent are a plus

At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: Audits CEH Compliance CompTIA Firewalls IDS Intrusion detection Monitoring Risk assessment SIEM SOC Vulnerabilities

Perks/benefits: Career development Team events

Region: Asia/Pacific
Country: Philippines

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.