Security Engineer

Job Summary

The Security Engineer helps protect Benco’s Information Assets from internal and external threats by leveraging the security tools we have in place, and suggesting and implementing new tools, policies, and procedures.

Job Requirements

  • At least 2-years experience in building and maintaining security systems.
  • Hands-on administrative experience with SIEM solutions such as Splunk, EIQ, or LogRhythm.
  • Hands-on administrative experience with Windows Clients, Windows Servers, and Linux.
  • Hands-on administrative experience with Firewalls and Intrusion Detection and Intrusion Prevention Technologies. Cisco ASA Firewalls and FirePOWER experience a definite plus.
  • Experience using NetFlow and Packet Tracing tools such as WireShark.
  • A motivated, self-directed team player who is able to work under pressure and is passionate about Information Technology and Security.
  • Strong written and spoken English skills. This position will require that you communicate with co-workers at all levels of the organization.
  • Must be willing to work in Makati for afternoon shift schedules

Duties and Responsiblities

  • Monitor and Maintain Benco’s Security Information and Event Management (SIEM) Platform
  • Keep an accurate, updated inventory of monitored devices.
  • Configure alerting to ensure security issues are reported to Benco, while minimizing the amount of false alarms.
  • Act as a liaison between Benco and the SIEM Vendor.
  • Triage any alerts to determine the appropriate method and criticality of response.
  • Troubleshoot problems with the SIEM platform, and work with the vendor’s support to resolve.
  • Provide timely updates to Benco regarding security incidents
  • Potential Security Breaches
  • Proposals for new security initiatives or enhancements
  • Current threats that may impact Benco, and advice on how to avoid them
  • Engineer, implement, and monitory security measures for the protection of computer systems, networks, and information.
  • Prepare, document, and update standard operating procedures and policies.
  • System Configuration Standards
  • Acceptable Use Policies
  • Compliance and Regulatory Policies
  • Configure and troubleshoot infrastructure security devices
  • Intrusion Detection / Intrusion Prevention
  • File Integrity Monitoring
  • Firewalls

We’re so excited to hear from you!

Please let us know how we can help by filling out the form, and you’ll hear back from us within 24 hours.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

This website uses cookies to ensure you get the best experience on our website. Read our Policy Privacy and Cookie Privacy Got It