Incident Response Analyst
Clark Freeport Zone, Pampanga
Thrive
Thrive is a leading provider of outsourced IT infrastructure. Our managed services provide customers with a strategic advantage as they secure, scale, and succeed.About Us
Thrive is a rapidly growing technology solutions provider focusing upon Cloud, Cyber Security, Networking, Disaster Recovery and Managed Services. Our corporate culture, engineering talent, customer-centric approach, and focus upon ânext generationâ services help us stand out amongst our peers. Thrive is on the look-out for individuals who donât view their weekdays spent at âa jobâ, but rather look to develop valuable skills that ignite their passion and lead to a CAREER. If youâre attracted to a âwork hard, play hardâ environment, seeking the guidance, training, and experience necessary to build a lucrative career, then welcome to THRIVE!!Â
Position Overview
With a growing client base, Thrive is continuing to build out its security team. We are looking to hire an Incident Response Analyst to take a role within our Security Operation Center. The analyst will assist with continuously monitoring and improving our customers' security posture, while preventing, detecting, analyzing, and responding to cybersecurity incidents utilizing technology and well-defined processes and procedures. The ideal candidate will have a passion for information security and will value what a professionally managed Security monitoring solution can bring to our client needs.âŻÂ
Primary Responsibilities
Process investigation requests from SOC Analysts who perform security event monitoring using Security Information and Event Management (SIEM) from multiple sources, including but not limited to, events from network and host-based intrusion detection/prevention systems, network infrastructure logs, systems logs, applications, and databases.Â
Investigate intrusion attempts, differentiate false positives from true intrusion attempts, and perform in-depth analysis of exploitsÂ
Lead incident response and threat hunting efforts for confirmed High Priority security incidents and follow through until resolutionÂ
Utilize threat intelligence to identify and investigate potential security threatsÂ
Develop playbooks for incident response and incident management processes, including threat triage, incident investigation, and incident resolutionÂ
Conduct regular reviews of playbooks to ensure they are current and effectiveÂ
Work with cross-functional teams to ensure that playbooks are aligned with the overall security strategy and goalsÂ
Participate in tabletop exercises and drills to test and validate playbooksÂ
Monitor and evaluate security incidents to identify opportunities for improving playbooksÂ
Keep up to date with current security threats and trends to ensure that playbooks are relevant and effectiveÂ
Actively investigate the latest security vulnerabilities, advisories, incidents, and TTPs (tactics, techniques, and procedures) and work with the Security Engineering team to recommend use casesÂ
Proactive monitoring, threat hunting, and response of known and/or emerging threatsÂ
Carry out Thriveâs information security strategy both internally and externally for 400+ clientsÂ
Analyze data from our SOC, SIEM and EDR platforms and determine if further analysis is neededÂ
Work within Thriveâs security standards and best practices and recommend future enhancementsÂ
Stay abreast of security events and techniques to keep our clients protectedÂ
Qualifications
Demonstrates comprehension of best security practicesÂ
Has advanced knowledge of the following systems and technologies:âŻÂ
SIEM (Security Information and Event Management)âŻÂ
TCP/IP, computer networking, routing, and switchingâŻÂ
IDS/IPS, penetration and vulnerability testingâŻÂ
Firewall and intrusion detection/prevention protocolsâŻÂ
Windows, UNIX, and Linux operating systemsâŻÂ
Network protocols and packet analysis toolsâŻÂ
EDR, Anti-virus, and anti-malwareâŻÂ
Content filteringâŻâŻÂ
Email and web gateway.âŻÂ
Malware, Network, or System AnalysisÂ
Professional experience in an Incident Response RoleÂ
Ability to collaborate and communicate security issues to clients, peers, and managementÂ
Strong analytical and problem-solving skillsÂ
Adaptability and resilience in rapidly evolving situationsÂ
Ability to be a part of an on-call rotation, occasionally working nights, and weekends to support High Priority Security IncidentsÂ
Required Skills:Â
Technical proficiency in networking, operating systems, and security technologiesÂ
Familiarity with security tools like SIEM, IDS/IPS, EDR, and forensic analysis toolsÂ
Understanding of incident response procedures and methodologiesÂ
Understanding of frameworks such as MITRE ATT&CK and the Cyber Kill chain, Â
Familiarity with TCP/IP network protocols, application layer protocols (e.g., HTTP, SMTP, DNS, etc.)Â
Experience in responding to and investigating cloud, system, or network intrusionsÂ
Excellent Written and Verbal Communication SkillsÂ
Expertise in forensics, malware analysis, and network intrusion responseÂ
Preferred Skills
Knowledge of common Windows and Linux/Unix system calls and APIsÂ
Knowledge of programming languagesÂ
Knowledge of internal file structures for file formats commonly associated with malwareÂ
Knowledge or experience in Detection EngineeringÂ
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index đ°
Tags: APIs Cloud Cyber Kill Chain DNS EDR Exploits Firewalls Forensics IDS Incident response Intrusion detection IPS Linux Malware MITRE ATT&CK Monitoring Security strategy SIEM SMTP SOC Strategy TCP/IP Threat intelligence TTPs UNIX Vulnerabilities Windows
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.