SOC Analyst

Posted Yesterday
Be an Early Applicant
Manila, First District NCR, National Capital Region
Junior
Information Technology • Security • Cybersecurity
The Role
The SOC Analyst at Cato Networks will monitor and respond to security incidents, analyze threats, communicate findings to customers, and contribute to security processes improvements. The role involves using advanced tools to triage incidents and ensure effective remediation in collaboration with clients.
Summary Generated by Built In

Welcome to the future of cloud networking and security!  

Cato Networks is the first company to converge enterprise networking and security into one centralized and global service that is delivered by cloud. Cato’s unique technology inspired a brand-new product category, later named “SASE” by Gartner. 

Cato is the brainchild of networking and security pioneers Shlomo Kramer (Check Point, Imperva) and Gur Shatz (Incapsula.) Cato Networks has raised $773 million dollars since 2015, achieving Centaur status with $200M+ in ARR, and a valuation of $3 billion dollars.

This is your opportunity to get on the rocket ship and join a company that is building a cutting-edge enterprise network and secure cloud platform and is on a fast track to becoming the worldwide market leader – don’t miss it!

Be part of Cato MDR (Managed Detection and Response) team that monitors Cato's customer networks to identify and respond to security threats. Monitor using our high-end threat-hunting system, triage the potential incidents and qualify them. Upon determining malicious activity, report it to the customer using a ticketing system, and recommend remediation actions. You'll follow up with the customer on the remediation progress until the threat is fully remediated.

Responsibilities

  • Monitor, Investigate, Analyze and Respond to Security Incidents
  • Carry out limited incident response for security incidents
  • Communicate incidents to customers and advise customers on remediation
  • Contribute to the development and improvement of security monitoring and incident response processes

Requirements:

  • Excellent communication skills in English (reading/writing)
  • Working in shifts (24x7 – including holidays)
  • 1-2 years in Networking Security roles, as a T1/T2 analyst in SOC (Security Operation Center)
  • Advantage – experience working in MSSP/MDR providers, delivering security monitoring for multiple customers
  • Experience working with SIEM, FW, IPS/IDS, Threat Intelligence solutions
  • Knowledge of networking architecture and protocols (TCP/IP, HTTP, DNS, TLS etc.) 
  • Basic experience in security assessment and incident management
  • Understanding the cyber-security landscape, common threats and attack scenarios 
  • Security Certification – Advantage - CEH, CSA, CompTIA Security+

Top Skills

Tcp/Ip
The Company
931 Employees
On-site Workplace
Year Founded: 2015

What We Do

WE ARE SASE

Similar Jobs

Questronix Logo Questronix

SOC Analyst

Information Technology • Consulting
Metro Manila, PHL
212 Employees

Questronix Logo Questronix

SOC Analyst

Information Technology • Consulting
Metro Manila, PHL
212 Employees

Questronix Logo Questronix

SOC Analyst

Information Technology • Consulting
Metro Manila, PHL
212 Employees

Questronix Logo Questronix

SOC Analyst

Information Technology • Consulting
Metro Manila, PHL
212 Employees

Similar Companies Hiring

Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
357 Employees
Jobba Trade Technologies, Inc. Thumbnail
Software • Professional Services • Productivity • Information Technology • Cloud
Chicago, IL
45 Employees
InCommodities Thumbnail
Renewable Energy • Machine Learning • Information Technology • Energy • Automation • Analytics
Austin, TX
234 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account