Trend Micro Career Opportunities JDs
Trend Micro Career Opportunities JDs
Trend Micro Career Opportunities JDs
Qualifications:
Bachelor’s degree in Computer Science, Information Technology or related fields.
Knowledgeable in Windows Operating System
Excellent oral and written English communication skills
Willing to work on shifting schedules
Fresh graduates of Computer Science/Information Technology, Computer Engineering
or equivalent are welcome to apply
At least 1 year contact center experience is an advantage
TECHNICAL SUPPORT ENGINEER
Roles and Responsibilities:
Systems and networks are created everyday…but who will secure them? Help keep them safe.
Forty-eight out of the top fifty global corporations trust Trend Micro to secure their information
networks and systems. Our customers need security-minded product experts to support them in
making sure that they are safe.
Qualifications:
Qualifications:
Bachelor’s degree in Computer Science, Information Technology or related fields.
Required skill(s): Assembly Language, Scripts, Basic Programming.
Preferred skill(s): VB, Perl, C++.
Fresh Graduates are welcome
OPPORTUNITIES FOR EXPERIENCED PROFESSIONALS:
Responsibilities
Monitor and respond to incoming event queues for potential information security
incidents detected by SIEM system and user-reported incident claims.
Provide initial investigation, triage of potential incidents and security countermeasures,
containment, remediation and escalate or close events as applicable.
Document investigation results, ensuring relevant details are escalated to senior analysts
(L2) for final event analysis
Discover tactics, techniques and procedures (TTPs) from incident investigations and
develop new SIEM use cases for continuous security monitoring
Participate in continuous evaluation of security controls (technology or process) against
the current threats
Staying up to date with current vulnerabilities, attacks, and countermeasures
Rotational evenings and weekends work shift may be required
Minimum qualifications
Any Bachelor’s degree
Must be eager to pursue long-term interest in information security field and investigative
work
Must have good knowledge/experience in Windows and Linux operating systems security
Must have good verbal and written English communication skills
Knowledge in the current tactics, techniques and procedures (TTPs) being used to breach
an enterprise
Knowledge in Perl, Python or any scripting language (bash, PowerShell)
Basic knowledge in cloud computing platforms (AWS, Azure, GCP)
Must be available to work on-call or off hours as needed to sustain operations
CYBER SECURITY ANALYST L2/L3
As a Cyber Security Analyst L2/L3, you work to develop new and improve existing use cases to find potential
security breaches together with the Security Operations Center (SOC) team using SIEM. The role requires you to
have an uncanny ability to detect deviation from the norm and innate capability to investigate events leading to
and after security incidents have happened.
Responsibilities
Respond to important information security incidents detected by SIEM system and user-reported
incident claims
Provide guidance in security countermeasures and containment and remediation on L1 security analysts
and other internal teams
Discover tactics, techniques and procedures (TTPs) from incident investigations and develop new SIEM
use cases for continuous security monitoring
Must be able to tackle complex and vague scenarios
Initiate threat hunting efforts based on relevant and latest threat intelligence
Participate in continuous evaluation of security controls (technology or process) against the current
threats
Function as shift subject-matter experts (SMEs) on incident detection and analysis techniques, providing
guidance to junior analysts and making recommendations to organizational managers
Write security incident reports and update security incident metrics
Conduct security research and intelligence gathering on emerging threats and exploits.
Serve as a backup analyst for any potential coverage gaps to ensure business continuity
Rotational evenings and weekends work hours may be required
Minimum Qualifications
At least 2 years in handling SOC cases using SIEM platforms & log management systems
Knowledge in the current tactics, techniques and procedures (TTPs) being used to breach an enterprise
Case reporting and analytics: Ability to summarize and provide insights
Experience in Python or any scripting language (bash, PowerShell)
Knowledge in cloud environments (AWS, Azure; GCP)
TCAP training and certification
ACE 20x training and certification
Passed the CyDefe’s SOC Analyst Assessment Level 1 and 2
Can communicate ideas clearly and deliver effective presentation
Attention to detail and ability to follow rules, guidelines, and processes
Must be available to work on-call or off hours as needed to sustain operations
Preferred qualifications
Experience with computer forensics and incident response tools and other open-source security tools
found in SANS SIFT workstation
Experience with use case development using ArcSight ESM
Knowledge in containerization technologies (Docker, Kubernetes)
Capability to build and integrate SOC technology stack
REGIONAL CYBER SECURITY ENGINEER
Roles and Responsibilities:
Staying up-to-date with current vulnerabilities, attacks and countermeasures and have a
in-depth understanding of the following:
o Test lab security and risks
o Public cloud security and risks in IaaS, PaaS, and SaaS environment
Developing software applications to manage, investigate, and analyze security concerns
and security incidents
Conducting regular inspections of systems and network processes for any vulnerability,
and be able to perform security test assessments and risk analyses in both production
and test environments
Responding to incoming information security incidents detected by SIEM system and
user-reported incident claims as the L1 owner and be able to write security incident
reports and update security incident metrics
Collaborating closely with IT and SOC professionals to identify, investigate, and solve
security problems and providing documents for senior stuffs to review
Able to work within a team, independently and you are able to liaise effectively with our
internal and external clients onsite and online
First line response for datacenter and regional office technical incidents. These will include
but are not limited to handling endpoint, performance, hardware, network and
application issues.
Coordination of critical incident handling together with subject matter experts
Knowledge base maintenance
Meeting business objectives and team targets as per defined SLO
REQUIRED EXPERTISE
JOB DESCRIPTION
Handle product/SaaS Service operation, including alert handling, service implementation
and deliver solutions for SaaS in support of the following:
a. Cloud Migration
b. DevOps Support
c. Cloud Native Improvement
Closely collaborate with global R&D teams as shared owners of SaaS. This includes
understanding the service and providing recommendations on service performance,
reliability, security and scalability. Key expectations include, but are not limited to:
a. Maintaining SaaS SLO – MTTR, MTBF
b. Eliminating toil
c. 24/7 operation, including service operation and customer support
Lead or participate in continuous improvement and value creation projects. Key involvement
includes:
a. Solutions delivery and integration
b. Process creation and optimization
c. Cross-team investigation