GSOC L3 - Manila

Taguig, Metro Manila, Philippines. Warsaw, Masovian Voivodeship, Poland, 03

GSOC L3 - Manila

  • 202600937
  • Taguig, Metro Manila, Philippines
  • Warsaw, Masovian Voivodeship, Poland
Ver favoritos

Description

As part of the Cyber Defence team in the Global Security Operations Centre, you will provide oversight of triage, investigation of security alerts and potential security incidents. After a threat or incident is identified, L3 analyst will be responsible in determination of response that should be put into action to mitigate its damage and prevent its spread.

Fast and effective identification and triage of potential incidents is essential for us to protect our critical data and assets, and you will be at the forefront of this exciting area of Cyber Security, protecting the business and our interests daily.

You will need to have a good technical aptitude, a calm approach under pressure, excellent communicative skills to technical and nontechnical audiences, and have a genuine passion for security.

The Role

Technical:
▪ Oversee the monitoring, investigation, containment, and eradication to cyber security threats against our business.
▪ Lead the GSOC team in seeking out potential security issues through log analysis, and use of tools such as SIEM, UEBA, EDR, etc.
▪ Responsible in determination of response that should be put into action to mitigate damage and prevent spread of security threats.
▪ Escalate high priority or high severity alerts/incidents to escalations team and make sure they are monitored and handled according
to prescribed processes.
▪ Ensure that there is a timely response to any cyber incidents to minimise the impact to the business, including interacting with
different technical teams and business areas where needed.
▪ Represent GSOC to incident stand-up calls to assist GSOC Manager.
▪ Using the latest threat intelligence to adapt your approach to detect the latest threats.
▪ Ensure the team is working efficiently by identifying tuning opportunities, creating automation playbooks, and optimal use of
technology.
▪ Review and provide technical advice on tuning recommendations submitted by Level 1s and Level 2s. Also, to improve the
businesses’ security posture against attackers and threats through fine tuning and rule creation.
▪ Escalation point to provide process and/or technical advice for Level 1 and Level 2 analysts.
▪ Perform quality audit for tickets that were handled by Level 2s ensure incidents were handled according to prescribed processes.
▪ Attend handover calls to support Level 1s and Level 2s, provide advice (process/technical aspect) on alerts/incidents for
consultation.
▪ May also be asked to lead teams/sub teams within the GSOC, as needed.
▪ Provide on-call support (in rotation with other L3 Analysts). Will be called only when a high priority or high severity alert/incident
arise.


Non-Technical:
▪ Ensures there is a balanced capacity and workforce to maintain delivery of a 24 x 7 SOC service.
▪ Create and produce required regular report for leadership team and meaningful reports to articulate security posture, trends, and
patterns.
▪ Assist L3 Manager to generate raw data for KPIs, submit calculations, record results, and recommend measures to maintain quality
performance.
▪ Line management responsibilities for Level 1s and Level 2s such as performing necessary mentoring, coaching, and corrective
actions.
▪ Help Level 2 analysts to deliver training to mature skills of new joiners or colleagues.
▪ Conduct regular review of knowledgebases, processes, and runbooks to ensure they are up to date.
▪ Regularly contribute to the SOC playbooks and knowledgebase with findings from investigations such as different attacker tools,
tactics, and procedures which can be applied to future investigations.

Internal:
▪ Strong relationships will be needed with other SOC team members around the globe.
▪ You will need to work with technical contacts throughout the business to remediate incidents.
▪ You will need to brief the security leadership team on key incidents.
▪ You may need to work with other business functions such as Governance Risk & Compliance, Legal, or Audit from time to time

Qualifications

The Requirement

 You will be working as part of a 24/7 SOC across different locations and therefore you must be a true team player, with the
ability and desire to engage with different internal stakeholders and colleagues to deliver the very highest standards of service
and support.
▪ 6+ Years’ Experience working as part of a mature cyber defence centre or security operations centre.
▪ To be effective, you need to have great troubleshooting skills, the ability to research problems and the ability to effectively
communicate during stressful times, while keeping a cool, calm, and friendly approach when dealing with stakeholders and
colleagues.
▪ Solid time management skills and be dependable.
▪ Hands on experience of using a SIEM, UEBA, and EDR as a Level 3 security analyst.
▪ Leading Investigations and comfortable talking to stakeholders and colleagues on both a technical and non-technical level.
▪ Great verbal and written communication skills, and the ability to write reports in a structured methodology.
▪ MSc in a security field or equivalent experience working within a security related function.
▪ To be inquisitive, with a strong sense of personal responsibility for learning and self-development.
▪ Being able to identify common attack techniques within the context of specific technologies.
▪ Working knowledge of networking protocols/technologies (e.g. TCP, IP, HTTP/HTTPS).
▪ Working knowledge of Unix, Linux, and Windows operating systems.
▪ Exposure to attack and penetration methods and tools.
▪ Working knowledge or ability to build scripts, tools, or methodologies to enhance our incident investigation and processes (such
as Python, PowerShell, Wireshark, etc.).
▪ Have experience of advanced investigation techniques able to demonstrate 1 or 2 of the following:
• Network forensic acquisition and analysis (using tools such as Deep Packet Analysis, Wireshark, NetWitness)
• End-point forensic acquisition and analysis (using tools such as EnCase, X-Ways, Axiom, IEF, FTK)
• Memory Analysis
• Analysis of various security logs (endpoint, security appliances, SIEM)
• Reverse Malware Engineering
Beneficial:
▪ Any relevant security certifications (CISSP, CISM, SSCP, OCSP, Security+, CySA+, CASP+, GREM, GCIA, etc.).
▪ Any relevant network certifications (Network +, CCNA, etc.).
▪ Knowledge of other key IT fields (such as Web Applications, databases, Active Directory, network security systems such as
web proxies, firewalls & data loss protection)

WTW is an Equal Opportunity Employer

 

Contato não solicitado

Quaisquer currículos/perfis de candidatos não solicitados enviados através do nosso site ou para contas de e-mail pessoais de colaboradores da Willis Towers Watson são considerados propriedade da Willis Towers Watson e não estão sujeitos ao pagamento de taxas de agência. Para ser uma Agência de Recrutamento ou Empresa de Seleção autorizada pela Willis Towers Watson, é necessário que a agência tenha um contrato formal e escrito vigente, assinado por um recrutador autorizado da Willis Towers Watson, além de manter uma relação ativa de trabalho com a organização. Currículos devem ser enviados de acordo com nosso processo de envio de candidatos, o qual inclui participação ativa na vaga específica. Da mesma forma, para nossas Agências de Recrutamento/Empresas de Seleção autorizadas, caso o processo de envio de candidatos não seja seguido, nenhuma taxa será paga pela Willis Towers Watson. A Willis Towers Watson é um empregador que promove a igualdade de oportunidades. Se você gostaria de ter suas informações de contato salvas para consideração futura, por favor envie um e-mail: agency.inquiries@willistowerswatson.com.

Nossos Escritórios

Nossos colegas atendem mais de 140 países e mercados ao redor do mundo. Isso confere uma dimensão global a tudo o que fazemos e cria muitas oportunidades transformadoras para colaborar e crescer. Explore o mapa abaixo para ver aonde sua carreira pode te levar.