Skip to content

Job Information

Posting Date
02-Dec-2025
Requisition ID
2383
Location
Philippines
Region
Global
State/Province/City
Manila
Location Type
Hybrid
Business Unit
Business Professionals
Function
Technology
Full Time or Part Time
Full time

Description & Requirements

The Incident Response Analyst will provide detection, containment, and analysis of security events to protect the confidentiality, integrity, and availability of information systems per the firm's business objectives, regulatory requirements, and strategic goals.


Main responsibilities:


  • Provide Tier 2 incident response services to the global organization on behalf of the Information Security Team
  • Receive, process, and resolve tickets per defined SLA's
  • Analyze information garnered from monitoring systems, operational incidents, and other sources to determine the scope and impact of potential security incidents, and process accordingly
  • Critically assess current practices and provide feedback to management on improvement opportunities
  • Assist with the design and implementation of threat detection and prevention solutions identified as necessary for the protection of the Firm’s assets
  • Effectively utilize common IR toolsets, platforms, and processes, such as SIEM, log management, packet capture, and breach detection systems
  • Assist with forensic examinations and chain-of-custody procedures as directed by the Security Incident Response Engineers
  • Provide input into standards and procedures 
  • Report compliance failures to management for immediate remediation
  • Maintain assigned systems to ensure availability, reliability, and integrity, including the oversight of current and projected capacity, performance, and licensing
  • Provide status reports and relevant metrics to the Security Operations Manager
  • Contribute to the Firm's security-related information repositories and other marketing/awareness endeavors
  • Assist with the preparation of internal training materials and documentation
  • Participate in special projects as needed


Skills and experience:


  • A bachelor’s degree in Computer Science or strong equivalent experience
  • GSEC, GCIH, GCFE, GREM, CISSP or SSCP certifications are desirable but not required
  • Some professional experience in information security with a focus on incident response and forensics
  • Foundational knowledge of IR concepts and best practices, including forensics and chain-of-custody
  • Experience in common IR tools such as SIEM, log management, IDS, breach detection systems (APT/BDS/EDR), and packet capture    
  • Broad understanding of TCP/IP, DNS, common network services, and other foundational topics
  • Working knowledge of malware detection, analysis, and evasion techniques
  • Able to conduct static and dynamic analysis of malware to extract indicators of compromise, profile malware behavior, and provide recommendations for mitigating and detecting malware; able to analyze suspicious websites, script-based and malware code
  • Experience in vulnerability management tools such as Qualys, Nessus, or other vulnerability scanning discovery tools
  • Familiar with the threat landscape and the ability to adapt practices to evolving circumstances
  • Identify, analyze, and report threats within the enterprise by using information collected from a variety of sources (IDS/IPS, SIEM, AV), to protect data and networks; implement techniques to hunt for known and unknown threats based on available threat intelligence reports and knowledge of the attacker's TTPs
  • Able to gather and analyze facts, draw conclusions, define problems, and suggest solutions  
  • Maintain critical thinking and composure under pressure
  • Strong written and oral communication skills; able to convey complex concepts to non-technical constituents
  • Excellent written and spoken English communication skills
  • Able to maintain focus without direct supervision
  • Passionate in the practice and pursuit of IR excellence
  • Can demonstrate a disciplined and rigorous approach to incident handling
  • Willing to accommodate shift-based work for a global organization
  • Provide exemplary customer service by striving for first-call resolution and demonstrating empathy, respect, professionalism, and expertise
  • Experience in digital forensics on host or network and identification of anomalous behavior on the network or endpoint devices; familiar with host and network-based forensic tools such as EnCase, FTK, Sleuth Kit, X Ways, etc.


Reports to: Manager, Security Operations

Position type: Center Services

Development framework: Specialist

About us

At Baker McKenzie we are different in the way we think, work and behave. With our team of 13,000 people, including over 6,500 locally admitted lawyers, in over 70 offices worldwide, we have a passionately collaborative community of 60 nationalities and are committed to world-class career development to everyone in every job at every level. Baker McKenzie can offer you both the uncompromising commitment to excellence expected of a top firm paired with a passionately global and genuinely collaborative working environment.

Additional Information

Reasonable Accommodation statement:


If you require a reasonable accommodation during the application process, please let your recruitment contact know. We are committed to working with candidates to ensure an inclusive and accessible experience in accordance with applicable laws and our commitment to diversity.


Baker McKenzie is an Equal Opportunity Employer. We are committed to promoting diversity and inclusion for all. Our unique international culture is reflected in the drawing together of a worldwide family of individuals from diverse cultures and backgrounds in all of our offices. We encourage the best people - regardless of race, religion or belief if any, gender, gender identity, disability, sexual orientation or age - to fulfill their professional aspirations with us. We are committed to ensuring an inclusive and accessible experience for all candidates.