Avensys is a reputed global IT professional services company headquartered in Singapore. Our service spectrum includes enterprise solution consulting, business intelligence, business process automation and managed services. Given our decade of success we have evolved to become one of the top trusted providers in Singapore and service a client base across banking and financial services, insurance, information technology, healthcare, retail and supply chain. We are currently looking for L2 & L3 SOC Analyst for one of our clients based in Philippines a full-time opportunity and Hybrid setup either can be in Manila. This is an exciting opportunity to expand your skill set, achieve job satisfaction and upgrade your skills. More details as below. Job Details: Role : L2 & L3 SOC Analyst Skills : Digital Forensic Experience needed and a Must. Experience: 3- 5+years Location: Manila Setup - Hybrid, 2Xweek RTO L3 SOC Analyst 5+ Years of Cyber Security experience in a 24x7 SOC environment and handling L3 Security Issues or complex incidents (Issues that have been escalated by L2 SOC Analyst) Experienced using SIEM Tools (Splunk, Azure Sentinel etc.) Experienced in Cyber Incident Response, Security Monitoring, Malware Analysis, Reverse Engineering, Digital Forensics and Deep Investigation or DFIR (must have requirements) Analyze and respond to security events/threats from different security logs and other security threat data sources includes (endpoint analysis and other security platforms) Threat detection ,triage, and remediation using various security tools such as EDR, email security and IDS/IPS Understanding on common threat vectors (malware, email, and website analysis at a basic level). Experienced using EDR Tools (Carbon Black, Tanium, CrowdStrike, Defender etc) Must have shift lead experience or was able to manage a team L2 SOC Analyst 3-4+ Years of Cyber Security experience in a 24x7 SOC environment and handling L2 Security Issues (Issues that have been escalated by L1 SOC Analyst) Experienced using SIEM Tools (Splunk, Azure Sentinel etc.) Experienced in Cyber Incident Response, Security Monitoring, Malware Analysis, Reverse Engineering (must have requirements) Analyze and respond to security events/threats from different security logs and other security threat data sources includes (endpoint analysis and other security platforms) Threat detection ,triage, and remediation using various security tools such as EDR, email security and IDS/IPS Understanding on common threat vectors (malware, email, and website analysis at a basic level) Experienced using EDR Tools (Carbon Black, Tanium, CrowdStrike, Defender etc) Must have shift lead experience or was able to manage a team (can accept candidates w/o team management experience however, at a lower rate) Show more Show less