SOC Analyst

Posted Yesterday
Be an Early Applicant
Manila, First District NCR, National Capital Region
In-Office
Junior
Information Technology • Security • Cybersecurity
The Role
Join the Cato MDR team to monitor and respond to security threats, investigate incidents, and advise customers on remediation actions.
Summary Generated by Built In

Welcome to the future of cloud networking and security!  

Cato Networks is the first company to converge enterprise networking and security into one centralized and global service that is delivered by cloud. It is led by networking and security pioneer Shlomo Kramer (Check Point, Imperva) and early investor (Palo Alto Networks, Exabeem, Trusteer and more).  Cato’s unique technology inspired a brand-new product category, later named “SASE” by Gartner and a market expected to reach $25 billion by 2027.
This is your opportunity to get on the rocket ship and join a company that is building a cutting-edge enterprise network and secure cloud platform, and is on a fast track to becoming the worldwide market leader – don’t miss it!


Be part of Cato MDR (Managed Detection and Response) team that monitors Cato's customer networks to identify and respond to security threats. Monitor using our high-end threat-hunting system, triage the potential incidents and qualify them. Upon determining malicious activity, report it to the customer using a ticketing system, and recommend remediation actions. You'll follow up with the customer on the remediation progress until the threat is fully remediated.

Responsibilities

  • Monitor, Investigate, Analyze and Respond to Security Incidents
  • Carry out limited incident response for security incidents
  • Communicate incidents to customers and advise customers on remediation
  • Contribute to the development and improvement of security monitoring and incident response processes

Requirements:

  • Excellent communication skills in English (reading/writing)
  • Working in shifts (24x7 – including holidays)
  • 1-2 years in Networking Security roles, as a T1/T2 analyst in SOC (Security Operation Center)
  • Advantage – experience working in MSSP/MDR providers, delivering security monitoring for multiple customers
  • Experience working with SIEM, FW, IPS/IDS, Threat Intelligence solutions
  • Knowledge of networking architecture and protocols (TCP/IP, HTTP, DNS, TLS etc.) 
  • Basic experience in security assessment and incident management
  • Understanding the cyber-security landscape, common threats and attack scenarios 
  • Security Certification – Advantage - CEH, CSA, CompTIA Security+

#LI-HE1

Top Skills

Firewalls
Ids
Ips
SIEM
Threat Intelligence Solutions
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
931 Employees
Year Founded: 2015

What We Do

WE ARE SASE

Similar Jobs

In-Office
Taguig City, Metro Manila, National Capital Region, PHL
86261 Employees

RFA Logo RFA

SOC Analyst

Information Technology • Consulting
In-Office or Remote
Quezon City, Second District NCR, National Capital Region, PHL
528 Employees

Ciena Logo Ciena

Senior SOC Analyst

Cloud • Hardware • Internet of Things • Other • Software • Semiconductor • Utilities
In-Office
Manila, First District NCR, National Capital Region, PHL
9561 Employees
In-Office
Makati City, Southern Manila District, National Capital Region, PHL
2115 Employees

Similar Companies Hiring

Scrunch AI Thumbnail
Software • SEO • Marketing Tech • Information Technology • Artificial Intelligence
Salt Lake City, Utah
Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY
Standard Template Labs Thumbnail
Software • Information Technology • Artificial Intelligence
New York, NY
10 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account