Cybersecurity Engineer II
7 days ago
Cybersecurity Engineer II page is loadedCybersecurity Engineer II Apply locations Philippines time type Full time posted on Posted 5 Days Ago job requisition id R4850Make a difference. Be happy. Grow your career. Exciting Opportunity on the Horizon – Join Our Talent Network Nordic is gearing up for an exciting new project and anticipate opening a role that could be a great fit for Cybersecurity professionals. While the position isn't officially open yet, we're starting to build a pipeline of interested candidates who want to be among the first to hear when it is. If you're curious, motivated, and looking to be part of something impactful, we’d love to hear from you. Expressing interest now means you'll be the first to know when the role goes live—and gives us a chance to get to know you early. The Role The Cybersecurity Engineer II responsibilities include monitoring, detecting, investigating, and responding to security incidents within our organization. The ideal candidate will also possess an Intermediate/working level of knowledge and skills in incident detection, analysis, response, and threat hunting as well as a solid understanding of cybersecurity principles and technologies. Provide support and guidance to IT for all customers and affiliate entities. Document work in the form of incident reports, policies, standards, network security diagrams, playbooks, and knowledge base articles in support of Payment Card Industry Compliance Data Security Standard (PCI-DSS), Health Information Trust Alliance (HITRUST), Health Insurance Portability and Accountability Act (HIPAA), and cybersecurity defense and protection due-diligence and due care. Nordic, Best in KLAS IT Services Firm and solely serving the healthcare industry, strives to empower healthcare providers to leverage technology and to realize digital transformation. All Nordic staff embrace Nordic’s maxims and mission to serve our customers who care so well for us. Key Responsibilities Monitoring and Detection Monitor security alerts and events from various sources, including but not limited to SIEM (Security Information and Event Management), antivirus software, intrusion detection systems, and log analysis tools, and cloud environments to identify potential security incidents. Conduct analysis of security events to determine their nature, scope, and potential impact on the organization's systems and data. Stay abreast of the latest cybersecurity threats, vulnerabilities, and trends to enhance the SOC's capabilities in threat detection and response by monitoring government, healthcare, and industry collaboration groups. Incident Response Conduct analysis of security incidents escalated from junior level analyst to determine the root cause, impact, and extent of the incident. Execute containment and mitigation strategies for confirmed security incidents, coordinating with relevant stakeholders and teams. Help coordinate incident response efforts, providing guidance and support to junior level analysts during incident investigations. Liaise with internal stakeholders, management, and external parties (if required) to ensure timely and effective resolution of security incidents. Prepare detailed incident reports, documenting the analysis, findings, actions taken, and recommendations for improvement. Contribute to the development and enhancement of incident response playbooks and standard operating procedures (SOPs) to enhance the efficiency and accuracy of incident response. Threat Hunting and Intelligence Analysis Participate in proactively threat hunting for potential security threats within the network and systems, using advanced tools and techniques. Analyze and interpret threat intelligence data to identify emerging threats and vulnerabilities, contributing to proactive defense measures. Support and Collaboration Collaborate with junior and senior SOC analysts and other IT security and operational teams to support incident response efforts. Assist in security awareness efforts and work with non-IT staff and leaders on cybersecurity-related issues. Provide assistance in implementing security measures or controls based on identified threats. Skills and Experience Intermediate/working knowledge of incident response and handling methodologies. Intermediate/working knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language (PL/SQL) and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code, etc.). Intermediate/working knowledge of adversarial tactics, techniques, and procedures. Intermediate/working understanding of threat hunting. Intermediate/working knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). Intermediate/working knowledge of cyber threats and vulnerabilities. Knowledge of network analysis tools to identify vulnerabilities. (e.g., fuzzing, Nmap, Nessus, etc.). Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). Knowledge of infrastructure and cloud technologies, including networking, virtualization, and containerization, to facilitate log collection. Knowledge of cloud platforms (AWS, Azure, or GCP) security features, configurations, and native security tools (e.g., AWS Security Hub, Azure Security Center). Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. Intermediate/working knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). Intermediate/working knowledge of system administration, network, and operating system hardening techniques. Intermediate/working knowledge of Windows/Unix ports and services. Intermediate/working knowledge of operating system command-line shells, scripting, and tools (e.g., bash, Pearl, PowerShell, etc.). Knowledge of computer networking concepts and protocols, OSI model and network security methodologies. Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN). Intermediate/working knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications. Knowledge of authentication, authorization, and access control methods. Basic/fundamental knowledge of applicable laws, statutes (HIPAA, Privacy Act, PCI/DSS, GDPR, etc.), executive guidelines/standards (DISA STIG, CIS controls, etc.), and/or administrative/criminal legal guidelines and procedures. Education and Experience requirements Generally, requires a Bachelor's degree and 5 years of related experience, a Master's degree and 3 years of related experience, or 8 years of related experience and no degree. Certifications required Licensure/Certifications Preferred:CompTIA Security+, CompTIA Network+, CISSP, CEH, SANS GPEN, SANS GCIH, Tenable Nordic is an equal opportunity employer. We are committed to creating an inclusive environment for all employees and applicants. We do not discriminate on the basis of race, color, religion, sex, national origin, age, disability, genetic information, marital or veteran status, or any other protected status under applicable federal, state, or local laws. We encourage individuals of all backgrounds to apply, including women, minorities, individuals with disabilities, and veterans. About Us Healthcare organizations are challenged to deliver higher quality care at a lower cost. Our award-winning team provides consulting services focused on strategy, technology, and operations, as well as managed services, that result in a stronger business with better patient outcomes. Ranked as a best place to work by nine publications, Nordic's culture provides our home office and consultants a supportive environment in healthcare that allows you to make a difference, be happy, and grow your career. #J-18808-Ljbffr
-
Cybersecurity Analyst I/II
2 weeks ago
, Zamboanga Peninsula, Philippines City of Daly City Full timePosition Overview Final Filing Date: Open Until Filled- Apply Immediately Interviews: TBD Resumes are not accepted in lieu of completing a City application. The main role for this position of Cybersecurity Analyst I/II will focus on Cybersecurity. The candidate that fills the role will assist in defining enterprise cybersecurity policies, standards,...
-
Engineer II
7 days ago
Bangsamoro, Philippines MINISTRY OF TRANSPORTATION AND COMMUNICATION Full time ₱300,000 - ₱600,000 per yearEngineer II in BARMM For full job description please see PDF file on Civil Service Commission site by clicking on this job ad. To apply, please kindly follow the procedure described in the PDF file.
-
Cybersecurity GRC Analyst
7 days ago
, , Philippines Copeland LP Full time(such as apply with LinkedIn) and capture some of your activity on the careers site. It doesn’t record any personal details. For more information, please read our and .Cybersecurity GRC Analyst page is loaded## Cybersecurity GRC Analystlocations: Quezon City, Manila, Philippinestime type: Full timeposted on: Posted Todayjob requisition id: JR We are a...
-
Cybersecurity Project Manager
3 weeks ago
, , Philippines Ciena Full timeOverview As the global leader in high-speed connectivity, Ciena is committed to a people-first approach. Our teams enjoy a culture focused on prioritizing a flexible work environment that empowers individual growth, well-being, and belonging. We’re a technology company that leads with our humanity—driving our business priorities alongside meaningful...
-
Lead Enterprise Cybersecurity Engineer
3 days ago
, Metro Manila, Philippines Dexcom Full timeAbout Dexcom Dexcom Corporation (NASDAQ DXCM) is a pioneer and global leader in continuous glucose monitoring (CGM). Dexcom began as a small company with a big dream: To forever change how diabetes is managed. To unlock information and insights that drive better health outcomes. Here we are 25 years later, having pioneered an industry. And we're just getting...
-
, Metro Manila, Philippines GCash Full timeCybersecurity and Fraud Management Product Owner Join to apply for the Cybersecurity and Fraud Management Product Owner role at GCash . Do you want to make Filipinos’ lives better every day? At GCash, we aim to stay at the forefront of the FinTech industry by creating innovative, meaningful, and convenient financial solutions for the nation! Join the G...
-
Presales Engineer
3 days ago
, Laguna, Philippines Fujitsu Full timeTalent Acquisition Specialist at Fujitsu | End to End Recruiting, Human Resources Development Presales handling Security solutions such as Palo Alto Networks, Fortinet, Cisco, F5 Networks and other Cybersecurity solutions. Design and provide solutions to be proposed and implemented for client's cybersecurity requirements. Key Responsibilities Develop and...
-
Analyst II
2 weeks ago
Philippines Microchip Technology Full time $90,000 - $120,000 per yearAre you looking for a unique opportunity to be a part of something great? Want to join a 17,000-member team that works on the technology that powers the world around us? Looking for an atmosphere of trust, empowerment, respect, diversity, and communication? How about an opportunity to own a piece of a multi-billion dollar (with a B) global organization? We...
-
Security Engineer
2 weeks ago
Philippines Globe Telecom Full timeAt Globe, our goal is to create a wonderful world for our people, business, and nation. By uniting people of passion who believe they can make a difference, we are confident that we can achieve this goal.Job DescriptionResponsible for implementing and deploying cybersecurity capabilities, enabling secure-by-default practices. Collaborates with architects and...
-
Equipment Contracts Coordinator II
2 days ago
Philippines STAFFVIRTUAL (a brand of Virtoren Services, Inc.) Full time ₱696,000 - ₱708,000 per yearJob Title: Contracts Coordinator IIAbout the Client: Our client offers a comprehensive, human-centric suite of technology services, ranging from IT and cybersecurity to printers, copiers, and print. These solutions are designed to simplify operations, enhance efficiency, and support modern workplace needs. Whether its a one-time purchase or a fully managed...