13 Soc Engineer jobs in Vietnam
Information Security Analyst - Remote Monitoring
Posted 2 days ago
Job Viewed
Job Description
- Monitoring security alerts and events from various security systems (SIEM, IDS/IPS, EDR, firewalls).
- Investigating security incidents, identifying root causes, and recommending remediation actions.
- Performing vulnerability assessments and penetration testing.
- Implementing and managing security controls and best practices.
- Developing and maintaining security policies, procedures, and documentation.
- Responding to security incidents, including containment, eradication, and recovery.
- Conducting threat hunting activities to proactively identify and mitigate risks.
- Staying up-to-date with the latest cybersecurity threats, trends, and technologies.
- Educating employees on security awareness best practices.
- Ensuring compliance with relevant data protection regulations and standards.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 3 years of experience in information security or a related IT security role.
- Proficiency with SIEM, IDS/IPS, firewalls, and EDR tools.
- Strong understanding of network protocols, operating systems, and common security vulnerabilities.
- Experience with incident response and forensic analysis.
- Knowledge of security frameworks and compliance standards (e.g., ISO 27001, NIST).
- Excellent analytical and problem-solving skills.
- Strong written and verbal communication abilities.
- Ability to work independently and manage priorities effectively in a remote setting.
- Relevant security certifications such as CompTIA Security+, CISSP, CEH are a plus.
Information Security Analyst - Threat Detection & Incident Response
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and logs from various security tools (SIEM, IDS/IPS, EDR).
- Investigate potential security incidents and perform root cause analysis.
- Conduct digital forensics to understand the scope and impact of breaches.
- Develop and execute incident response plans and playbooks.
- Coordinate containment, eradication, and recovery efforts during security incidents.
- Analyze threat intelligence and proactively identify potential vulnerabilities.
- Collaborate with IT and other departments to implement security controls.
- Stay updated on the latest cybersecurity threats, vulnerabilities, and trends.
- Document incident details, actions taken, and lessons learned.
- Contribute to the improvement of security monitoring and incident response capabilities.
- Bachelor's degree in Computer Science, Cybersecurity, or IT.
- Minimum 4 years of experience in information security, focused on IR.
- Proficiency with SIEM, IDS/IPS, and EDR tools.
- Strong understanding of cybersecurity principles and threat landscapes.
- Experience with digital forensics and incident response methodologies.
- Excellent analytical, problem-solving, and communication skills.
- Relevant certifications (Security+, CEH, CISSP) are highly preferred.
- Ability to work independently and manage critical situations effectively.
Security Operations Specialist
Posted today
Job Viewed
Job Description
SmartDev is a leading provider of global software solution. SmartDev was established in 2014 and is a wholly owned subsidiary of Verysell Technologies Group (Switzerland).
SmartDev combines renowned Swiss quality with the Vietnamese passion to provide excellence and value. SmartDev brings together smart people both internally and externally to create partnerships that push boundaries and challenge the status quo.
**Job Description**:
- Ensure ICS solutions and infrastructure are designed, implemented, and managed in accordance with ICS policies, standards and baselines.
- Perform timely maintenance (e.g. patching) of the ICS solutions and infrastructure, including but not limited to Endpoint Detection and Response (EDR), web proxy, Data leakage Prevention (DLP) solutions.
- Support and troubleshoot issues on ICS solutions and infrastructure.
- Perform routine vulnerability scans on Audax enterprise network and track open vulnerability issues to closure within SLA.
- Handle user requests for ICS related exceptions, including but not limited to Data leakage prevention controls exceptions, web browsing exceptions.
- Oversee the user lifecycle management, including but not limited to user access provisioning, user access review, leaver management.
- Oversee firewall rules and/or network access control policies recertification process.
- Define and document processes for the in-scope security operations.
**Qualifications**:
- More than 5 years of security operations experience.
- Experience working with cloud native technologies and security products.
- Proven track record in user lifecycle management, vulnerability management and network security operations and review.
- Keen eye on identifying opportunities to improve on process efficiencies
- Strong problem solving, analytical skills and interpersonal skills.
- Strong communication skills -oral and written
**We are also looking for**:
- A hustler who is highly adaptable and able to perform in a fast-paced dynamic environment.
- A team player who champions ownership and upholds a collaborative work environment.
- An inquisitive learner who has the appetite for continuously improving and streamlining processes and the way we work.
Additional Information
BENEFITS:
- Good work environment and good colleague (parties, holidays, team building activities)
+ Competitive Salary
+ Commission
+ Other benefits to be discussed
- 20 annual leave days alongside Vietnamese public holidays
- Self-organize project team
- Work with high profile multinational companies
- PVI Premium Healthcare System
Senior Security Operations Engineer
Posted today
Job Viewed
Job Description
- Managing and optimizing security operations center (SOC) tools and technologies, including SIEM, IDS/IPS, EDR, and SOAR platforms.
- Developing and implementing security operational procedures and playbooks.
- Leading incident response activities, including investigation, containment, eradication, and recovery.
- Conducting threat hunting and proactively identifying potential security breaches.
- Analyzing security alerts and events to identify and respond to malicious activities.
- Performing vulnerability assessments and working with IT teams to remediate findings.
- Developing and maintaining security monitoring and alerting capabilities.
- Contributing to the continuous improvement of security operations processes and efficiency.
- Providing technical leadership and guidance to the security operations team.
- Staying current with emerging threats, vulnerabilities, and security technologies.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 5 years of experience in security operations, incident response, or a related cybersecurity role.
- Proven experience with SIEM, IDS/IPS, EDR, and other security monitoring tools.
- Strong understanding of TCP/IP, networking protocols, and operating systems (Windows, Linux).
- Experience with cloud security (AWS, Azure, GCP) is highly desirable.
- Knowledge of threat intelligence platforms and frameworks (e.g., MITRE ATT&CK).
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong communication and collaboration abilities.
- Relevant certifications such as CISSP, GSEC, GCIH are a plus.
Senior Security Operations Analyst
Posted 2 days ago
Job Viewed
Job Description
Senior Security Operations Engineer
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Manage, configure, and maintain security operations tools and technologies (SIEM, SOAR, EDR, etc.).
- Monitor security alerts and events, performing initial triage and investigation.
- Develop and implement security automation scripts and workflows.
- Conduct threat hunting activities to proactively identify and neutralize threats.
- Lead the technical response to security incidents.
- Tune security detection rules and policies to reduce false positives and improve accuracy.
- Collaborate with other IT and security teams to implement security controls.
- Develop and maintain documentation for security tools and processes.
- Stay updated on emerging threats, vulnerabilities, and security technologies.
- Participate in security architecture reviews and recommend improvements.
- Bachelor's degree in Computer Science, Information Security, or a related field.
- Minimum of 6 years of experience in security operations or a related cybersecurity role.
- Proven experience with SIEM, SOAR, EDR, and other security operations technologies.
- Strong understanding of networking protocols, operating systems, and cloud security concepts.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation.
- Experience in incident response and digital forensics.
- Excellent analytical and problem-solving skills.
- Strong communication and teamwork abilities.
- Relevant security certifications (e.g., GSEC, GCIA, CEH) are a plus.
- Ability to work independently and effectively manage tasks in a remote environment.
Network Engineer/ Network Security Operations
Posted today
Job Viewed
Job Description
**Responsibility**
**- Firewall, Network and Router management**:
- Design, implement, configure, and maintain network infrastructure including routers, switches, firewalls, and other networking devices.
- Monitor and respond to security incidents, implementing preventive measures based on firewall logs.
- Implement and manage routing protocols to optimize and prevent potential security risks in network traffic. Monitor network traffic for signs of unauthorized access, malicious activity, or security breaches
- Configure and maintain firewall rules, VPN connections, and other network security devices to enforce security policies and protect against external threats.
- Troubleshoot and resolve routing issues to minimize downtime and enhance network reliability.
**- Vendor Technologies**:
- Possess in-depth knowledge and hands-on experience with at least 1 technology such as Cisco, Palo Alto, or Fortinet
- Demonstrate proficiency or willingness to learn in Cisco ACI for dynamic and automated network infrastructure.
**- Other**:Handle other tasks assigned by managers.
**Requirements**:
- Being a team player who can work effectively in an onsite, young, and dynamic team with a strong willingness to communicate, learn, and embrace challenges.
- Good English skills (both verbal and written)
- From 2 years of experience as a Network Engineer/ Network Security Engineer.
- Bachelor's or college degree in Computer Science, Information Technology, or a related field.
- Strong understanding of networking protocols, TCP/IP, and network architecture.
- Experience with security assessment tools, such as vulnerability scanners, penetration testing tools, and packet analyzers.
- Experience with Cisco ACI for policy-based networking and automation is preferred
- Proficient in firewall management with expertise in at least 1 technology: Cisco, Palo Alto, or Fortinet solutions.
- Strong understanding of network protocols, routing, and security best practices.
- Excellent analytical and troubleshooting skills.
- **Nice to have**_
- At least one of the Industry certifications such as CCNA, CCNP, PCNSA/PCNSE, or Fortinet NSE are highly desirable.
- Familiarity with automation tools (Terraform, Ansible) is a plus.
**What We Offer**:
- A dynamic work environment where you will have the opportunity to contribute to projects in the cybersecurity field.
- The chance to work closely with the CTO and CEO, improving your English language skills.
- Opportunities for continuous learning and professional development.
**Benefits**
- Competitive salary, negotiable based on skills and experience.
- Opportunity to join a fast-growing, dynamic, and global company.
- 13th and 14th-month salary, plus performance-based bonuses.
- Over 14 days of annual leave
- Access to social insurance, health insurance, and unemployment insurance upon signing an official labor contract.
- Investment in professional tech training.
- Annually teambuilding activities
- Free parking and on-site food and coffee.
- Work hours: Monday to Friday, 9:00 am - 6:00 pm.
**or contact Zalo**:
Loại hình công việc: Toàn thời gian
Be The First To Know
About the latest Soc engineer Jobs in Vietnam !
Lead Security Operations Center (SOC) Analyst
Posted 1 day ago
Job Viewed
Job Description
Key responsibilities include developing and refining incident response procedures, managing security information and event management (SIEM) systems, and utilizing various security tools and technologies for threat hunting and forensic analysis. You will analyze security alerts, investigate potential breaches, and coordinate mitigation efforts. The Lead SOC Analyst will also play a crucial role in threat intelligence gathering and dissemination, staying abreast of the latest cyber threats, vulnerabilities, and attack vectors.
We are looking for a candidate with a Bachelor's degree in Computer Science, Information Security, or a related field, coupled with at least 5-7 years of experience in SOC operations and incident response. Professional certifications such as CISSP, GCIA, GCIH, or CEH are highly desirable. Strong knowledge of network protocols, operating systems, and common attack methodologies (e.g., phishing, malware, DDoS) is essential. Experience with scripting languages (Python, PowerShell) for automation and experience with cloud security principles are also important. The ideal candidate possesses excellent analytical and problem-solving skills, strong leadership qualities, and the ability to effectively communicate complex security issues to various stakeholders. This remote position demands a proactive mindset, meticulous attention to detail, and the capability to manage critical security incidents under pressure.
Senior Security Operations Center (SOC) Analyst
Posted 1 day ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts from various sources, including SIEM, IDS/IPS, EDR, and threat intelligence platforms.
- Analyze security events to identify potential threats, breaches, and vulnerabilities.
- Investigate and respond to security incidents, including containment, eradication, and recovery efforts.
- Develop and refine incident response playbooks and procedures.
- Perform deep-dive forensic analysis on compromised systems to understand attack vectors and impact.
- Proactively hunt for threats within the network environment using advanced detection techniques.
- Analyze threat intelligence feeds and indicators of compromise (IOCs) to enhance security posture.
- Configure and tune security tools and technologies to optimize detection capabilities.
- Generate detailed reports on security incidents, findings, and recommendations.
- Collaborate with internal teams and external partners during incident response activities.
- Stay current with the latest cybersecurity threats, attack techniques, and defensive measures.
- Provide mentorship and guidance to junior SOC analysts.
- Contribute to the continuous improvement of SOC processes and tools.
- Develop and maintain documentation for security policies, procedures, and configurations.
- Participate in on-call rotations for critical incident response.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5 years of experience in a Security Operations Center (SOC) environment or incident response role.
- Proven experience with SIEM tools (e.g., Splunk, QRadar, LogRhythm) and security analytics.
- In-depth knowledge of various cybersecurity threats, vulnerabilities, and attack methodologies.
- Hands-on experience with incident response, digital forensics, and malware analysis.
- Familiarity with network security protocols, tools (e.g., Wireshark, tcpdump), and concepts.
- Experience with endpoint detection and response (EDR) solutions.
- Strong understanding of threat intelligence principles and platforms.
- Relevant certifications such as CISSP, GIAC (GCIH, GCFA), or CompTIA Security+ are highly desirable.
- Excellent analytical and problem-solving skills.
- Strong communication and interpersonal skills, with the ability to articulate technical details clearly.
- Ability to work independently and manage multiple priorities in a fast-paced environment.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Proficiency in a second language is advantageous but not required.
Senior Security Operations Center (SOC) Analyst (Remote)
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from SIEM, IDS/IPS, and other security tools.
- Detect, analyze, and respond to security incidents and threats.
- Perform deep-dive investigations into suspicious activities and potential breaches.
- Develop and refine SOC playbooks and standard operating procedures.
- Conduct forensic analysis of security incidents.
- Analyze threat intelligence and correlate it with security events.
- Contribute to the continuous improvement of SOC tools and processes.
- Collaborate with incident response and threat intelligence teams.
- Document incident details, actions taken, and lessons learned.
- Mentor and guide junior SOC analysts.
- Bachelor's degree in Cybersecurity, Computer Science, or a related field.
- Minimum of 5-7 years of experience working in a Security Operations Center (SOC) environment.
- In-depth knowledge of cybersecurity principles, threats, and attack vectors.
- Proficiency with SIEM platforms (e.g., Splunk, QRadar, LogRhythm).
- Experience with IDS/IPS, EDR solutions, and network traffic analysis.
- Strong understanding of incident response methodologies and frameworks.
- Excellent analytical and critical thinking skills.
- Effective communication and documentation skills.
- Relevant certifications such as GIAC, CISSP, or CCSP are highly advantageous.
- Proven ability to work autonomously and as part of a remote team.