Full-Time SOC Analyst (Triage Specialist)
Applaudo Studios is hiring a remote Full-Time SOC Analyst (Triage Specialist). The career level for this job opening is Entry Level and is accepting Manila, Philippines based applicants remotely. Read complete job description before applying.
Applaudo Studios
Job Title
Posted
Career Level
Career Level
Locations Accepted
Share
Job Details
About you: You are someone who wants to influence your own development. You’re looking for a company where you have the opportunity to pursue your interests and be able to grow professionally. The SOC Analyst is a pivotal member of the Security Operations Center, acting as the first line of defense against cyber threats. The analyst is primarily responsible for triaging and analyzing raw security data, reviewing alarms and alerts, and determining their criticality.
Responsibilities:
- Continuously monitor and collect raw security data from various platforms.
- Review alarms and alerts, validate their accuracy, and enrich them with relevant data, including Indicators of Compromise (IoCs) and threat intelligence feeds.
- Leverage tools such as SIEM platforms (e.g., Chronicle, Splunk, IBM QRadar, FortiSIEM), EDR/XDR solutions (e.g., Trellix, CrowdStrike, SentinelOne, FortiXDR), and SOAR platforms (e.g., Chronicle, FortiSOAR, Splunk SOAR) to identify, analyze, and correlate security events.
- Identify high-risk events and potential incidents, prioritizing them based on criticality and organizational impact.
- Conduct initial investigations to categorize alerts, escalating unresolved or complex issues to the appropriate teams.
- Collaborate with stakeholders to ensure effective communication of incident details and risk assessments.
- Assist in managing, configuring, and optimizing security monitoring tools to improve detection capabilities and reduce noise.
- Support fine-tuning of detection rules and analytics to adapt to evolving threats.
- Maintain detailed and accurate records of incidents, including analysis findings and actions taken, in ticketing systems.
- Generate regular reports highlighting trends, high-risk events, and recommendations for process improvements.
Required Skills & Competencies:
- Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or a related discipline, or equivalent professional experience.
- At least 1 year of hands-on experience in a SOC role.
- Proven experience in working with SIEM and EDR/XDR solutions.
- Proven ability to perform incident triage and distinguish between false positives and actionable threats.
- Basic knowledge of network protocols (TCP/IP, DNS, HTTP/S) and operating systems (Windows, Linux).
- Strong analytical and critical thinking skills.
- Excellent communication skills, both verbal and written.
- Ability to work independently and under pressure while maintaining attention to detail.
- Advanced English (required).
- Desirable: CompTIA Security+
- Desirable: Certified SOC Analyst (CSA)
- Desirable: EC-Council Certified Incident Handler (ECIH)