Vulnerability Management II Engineer II
Mandaluyong City, Philippines
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
Vertiv
Vertiv is a global leader in critical digital infrastructure for data centers, telecom, and other environments, offering end-to-end power and cooling.Join a High-Performance Culture That Drives Innovation and Excellence
At Vertiv, we don’t just hire talent—
we cultivate leaders who drive innovation and engage teams to push the limits of what’s possible. As a global leader in critical digital infrastructure, we are scaling up to meet the demands of AI, data centers, and next-gen technology—and we need bold, high-performing individuals like YOU to take us to the next level.
Why Vertiv?
- High-Performance Culture: We empower you to think big, execute with excellence, and deliver impact. Our performance-driven mindset rewards those who challenge the status quo and drive meaningful change. Over 50 CEO Awards are given annually to recognize top talent moving the needle forward.
- Leadership Without Limits: Leadership at Vertiv goes beyond just titles—it’s about accountability, trust, and ownership. Our leaders engage and drive with collaboration, innovation, and customer-centric thinking, setting the foundation for an action-focused culture.
- Limitless Growth & Learning: We believe in continuous development. Whether through rotational programs or high-impact projects, you’ll have the opportunity to expand your expertise and grow your career.
- A Place for Everyone: Our commitment to Inclusion ensures that all employee’s unique strengths and perspectives are valued. Your voice matters, your growth is prioritized, and your success is celebrated.
POSITION SUMMARY
The Security Operations Engineer plays a critical role in designing, implementing, and securing various corporate-wide security products, including but not limited to Microsoft Defender, Halcyon, and Qualys. This individual will evaluate the configuration of existing systems and assist with redesigning, repairing, and reconfiguring as necessary to ensure a secure enterprise environment. They will comprehend the use cases and intended purposes of each tool and provide recommendations to leadership regarding necessary product enhancements. During and after incidents, they will analyze cause and impact, identifying corrective actions required to eliminate and prevent future occurrences. Additionally, they will collaborate with leadership, IT teams, application owners, and asset owners to ensure that all systems maintain healthy, secure, and effective agents, policies, and configurations.
RESPONSIBILITIES
- Design, maintain, and implement security products like Microsoft Defender, Halcyon, and Qualys.
- Evaluate agent updates and manage versioning
- Develop security standards, policies, baselines, and best practices for security in alignment with established frameworks like NIST (CSF), CIS, ISO 27001, and GDPR
- Consistently enhance supported tools by recommending product improvements, optimizing processes, and integrating advanced technologies.
- Automate administrative tasks using PowerShell, Microsoft Graph API, and Power Automate.
- Identify misconfigurations and determine the scope of impact; develop and present resolution options while considering system-level impacts and outage mitigation.
- Develop, examine, and upkeep of both current and proposed processes, procedures, and associated documentation within the team.
- Partner with other security teams to ensure that new solutions and changes to existing solutions integrate into a complex environment maintaining all three parts of the CIA triad.
- Collaborate with application and technology teams to diagnose issues, develop solutions, implement appropriate security measures, and automate processes to protect system data from internal and external threats.
- Engage with vendors to proactively address open tickets and resolve issues in a timely manner.
- Strong communicator who can articulate complex concepts to both technical and non-technical audiences
- Develop and maintain accurate reporting through automation while still accommodating situation-based ad-hoc requests
- Facilitate data and conduct regular auditing in alignment with current business standards and process enhancements
- Stay current with vendor roadmaps and emerging security technologies.
- Represent the team in technical forums, audits, and executive briefings.
- Perform other duties as assigned.
QUALIFICATIONS
- Bachelor's degree in computer science, MIS, Cybersecurity, or a related field of study.
- 5+ years of experience designing and maintaining antimalware and other security tools.
- Expertise with Microsoft Defender for Endpoint (MDE) including anti-virus, EDR, and policy creation.
- Experience with integrating MDE with a Security Event and Incident Management (SEIM) tool.
- Experience tuning MDE alerts and monitoring.
- Knowledge of role-based access control for the Microsoft Defender suite and Microsoft Entra.
- Strong hands-on experience with PowerShell scripting, Microsoft Graph, and automation frameworks.
- Excellent problem-solving skills with the ability to diagnose and troubleshoot technical issues.
- Skilled in conducting thorough root cause analysis to identify underlying issues.
- Excellent communication skills both written and oral using the English language.
- Ability to work comfortably and successfully in a fast-paced environment with frequent changes in priorities and ability to influence others or manage indirectly.
- 8+ years of experience designing and maintaining EDR/XDR, VMDR, SIEM, SOAR and other security tools.
- Experience with Halcyon anti-ransomware
- Experience with Defender Application Control policies
- Experience with the design and administration of Qualys
- Experience with Google SecOps
The successful candidate will embrace Vertiv’s Core Principals & Behaviors to help execute our Strategic Priorities.
OUR CORE PRINCIPALS: Safety. Integrity. Respect. Teamwork. Diversity & Inclusion.
OUR STRATEGIC PRIORITIES
- Customer Focus
- Operational Excellence
- High-Performance Culture
- Innovation
- Financial Strength
OUR BEHAVIORS
- Think Big and Execute
- Act With Urgency
- Own It
- Drive Continuous Improvement
- Promote Transparent and Open Communication
- Learn and Seek Out Development
- Foster a Customer-First Mindset
- Lead by Example
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: APIs Audits Automation CIA Computer Science EDR GDPR ISO 27001 Monitoring NIST PowerShell Qualys Scripting SecOps SIEM SOAR Vulnerability management XDR
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.