infinit-o1d ago
New
New
SOC Analyst/Incident Response Analyst
CybersecurityIncident Response Analyst
0 views0 saves0 applied
Quick Summary
Overview
SOC/Incident Response Analyst This position is a first-line defense role operating during critical off-hour windows (nights and weekends). The team will be responsible for the initial triage and validation of security alerts generated by Customer’s SIEM, Okta, SentinelOne, Keeper, and Google…
Technical Tools
jirasplunk
SOC/Incident Response Analyst This position is a first-line defense role operating during critical off-hour windows (nights and weekends). The team will be responsible for the initial triage and validation of security alerts generated by Customer’s SIEM, Okta, SentinelOne, Keeper, and Google platforms. The primary objective is to investigate anomalies and escalate confirmed threats to the internal Incident Response (IR) team through PagerDuty. Core Responsibilities SIEM Alert Validation: Monitor Jira/BlinkOps for alerts pertaining to: Identity issues, compromised passwords, impossible travel, travel to restricted countries, Superadmin creation in Okta, Admin created in SentinelOne, Google admin account activity (creation/deletion), Splunk data deletion, HoneyCred access in Keeper, and suspected malicious access by Okta, Google, and other systems. Investigation: Perform manual investigation (running searches in Splunk, SentinelOne, and Client apps) to confirm alert details, determine False Positive/True Positive status, and engage the on-call IR lead. Manual IR Escalation: Identify True Positive events and provide the IR team with a handoff summary including impacted users, systems, and IP information. Skills Matrix Feature | Requirement Alert Triage: Able to investigate alerts through log entries and reconstruct user/system activity. SIEM Navigation: Competency in querying logs (training provided as needed). EDR Navigation: Ability to search SentinelOne to identify specific activity related to alerts. Communication: Ability to write clear summaries in Jira and PagerDuty. Escalation: Ability to escalate True Positives to IR through PagerDuty. Education Qualification and Experience The ideal candidate should have a Bachelor's Degree in IT, Computer Science or similar Have at least 1-2 years of experience in a similar role
Location & Eligibility
Where is the job
Pasay, Philippines
On-site at the office
Listing Details
- Posted
- May 12, 2026
- First seen
- May 13, 2026
- Last seen
- May 13, 2026
Posting Health
- Days active
- 0
- Repost count
- 0
- Trust Level
- 50%
- Scored at
- May 13, 2026
Signal breakdown
freshnesssource trustcontent trustemployer trust
External application · ~5 min on infinit-o's site
Please let infinit-o know you found this job on Jobera.
3 other jobs at infinit-o
View all →Explore open roles at infinit-o.
Similar Incident Response Analyst jobs
View all →Browse Similar Jobs
Product Security Engineer103Security Analyst89DevSecOps Engineer85Cloud Security Engineer59Application Security Engineer52Security Architect48Security Consultant42Security Operations Engineer39Soc Analyst33Threat Intelligence Analyst32Network Security Engineer30Grc Analyst27Security Researcher24Offensive Security Engineer20Security Program Manager16Penetration Tester14Soc Engineer14Digital Forensics Analyst12Compliance Security Analyst11Third-Party Risk Analyst11
Newsletter
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
A
B
C
D
No spam. Unsubscribe at any time.