IT/Cyber Security Operations Analyst II

Microchip Technology Inc.

Negotiable
Remote3-5 Yrs ExpBachelorFull-time
Share

Remote Details

Open CountryPhilippines

Language RequirementsEnglish

This remote job is open to candidates in specific countries. Please confirm if you want to continue despite potential location restrictions

Job Description

Description

The IT Security Operations/Cyber Security Analyst II at Microchip Technology Inc is responsible for protecting the company's information systems and networks from cyber threats. Key duties include proactive threat hunting, monitoring, detecting, analyzing, and responding to security incidents, managing multi-vendor security tools, and implementing preventive measures. The role also involves developing security strategies to enhance the company's security posture and requires close collaboration with IT teams, management, and other stakeholders to maintain a robust and compliant cybersecurity framework.


Key Responsibilities:


  • Utilize the latest threat intelligence to detect emerging threats.
  • Enhance team efficiency by identifying tuning opportunities, creating automation playbooks, and optimizing technology use.
  • Review and provide technical advice on tuning recommendations to improve security posture.
  • Serve as an escalation point for process and technical advice.
  • Conduct quality audits on incident tickets to ensure compliance with processes.
  • Conduct detailed investigations of security alerts, including those escalated by Level 1 SOC Analysts.
  • Analyze technical details to determine whether an anomaly is a potential security threat.
  • Manage incidents and response processes, ensuring timely and accurate resolution.
  • Perform advanced analysis of incidents, evaluating their sophistication and potential impact.
  • Provide technical guidance to Level 1 Analysts to help resolve complex incidents.
  • Ensure the quality of reports and maintain high standards of accuracy in incident management.
  • Lead teams or sub-teams as needed.
  • Provide on-call support for high-priority o high-severity incidents.
  • Ensure balanced capacity and workforce for 24/7 SOC service delivery.
  • Assist in generating raw data for KPIs, submit calculations, record results, and recommend quality performance measures.
  • Deliver training to enhance the skills of new and existing team members.
  • Contribute to SOC playbooks and knowledgebase with findings from investigations to inform future responses.



Qualifications and Experience:


  • Bachelor’s degree in Computer Science, Information Assurance, Information Security Systems, or a related field.
  • Minimum of 3 years of experience in a Cyber Security role.
  • Highly desirable certifications: CompTIA SEC+, CYSA +,or similar credentials.
  • Relevant system and network certifications (e.g., A+, Network +,CCNA).



Technical Skills:


  • Understanding of network and endpoint security solutions, including firewalls, proxies, antivirus, and IDS/IPS concepts.
  • Proficient in networking protocols/technologies (e.g., TCP, IP, HTTP/HTTPS).
  • Experience with SIEM, UEBA, and EDR as a Level 2 security analyst.
  • Proficiency in OSINT techniques and tools (e.g., Maltego, Shodan, Spider Foot) for threat hunting.
  • Advanced knowledge of Unix, Linux, and Windows operating systems.
  • Experience with attack and penetration testing methodologies and vulnerability assessment tools (e.g., Metasploit, Burp Suite, Nmap, Nessus, Qualys).
  • Ability to build scripts, tools, or methodologies to enhance incident investigation and processes(e.g., Python, PowerShell, Wireshark).
  • Knowledgeable with Web application security
  • Possesses a strong understanding of AI applications in threat detection and response, with experience in leveraging AI and machine learning algorithms to enhance security measures and automate threat analysis. Emphasizes the importance of understanding fundamental principles and not relying solely on AI.




Investigation and Analysis Skills:


  • Advanced investigation techniques, including:


  • Network forensic acquisition and analysis (e.g., Wireshark, Packet Tracer, Open Source Tools).
  • Endpoint forensic acquisition and analysis (e.g., EnCase, X-Ways, Axiom ,IEF, FTK).
  • Memory analysis.
  • Analysis of various security logs (e.g., endpoint, security appliances, SIEM, Windows event, syslog).
  • Reverse malware engineering.
  • Email header analysis.
  • Vulnerability report analysis and remediation.



Communication and Leadership:


  • Strong verbal and written communication skills, with the ability to write structured reports.
  • Comfortable leading investigations and communicating with stakeholders and colleagues on both technical and non-technical levels.
  • Strong sense of personal responsibility for learning and self-development.

Requirements

Please refer to job description.

Linux
Preview

Boss

HR ManagerMicrochip Technology Inc.

Active within seven days

Posted on 20 March 2025

Report this job

Bossjob Safety Reminder

If the position requires you to work overseas, please be vigilant and beware of fraud.

If you encounter an employer who has the following actions during your job search, please report it immediately

  • withholds your ID,
  • requires you to provide a guarantee or collects property,
  • forces you to invest or raise funds,
  • collects illicit benefits,
  • or other illegal situations.