Job Description:
We are looking for a Tactical Threat Analyst to work in a dynamic and exciting new position reporting to the Security Operations Center Manager. The analyst will work directly with members of a world class incident response and forensics team. Our team is comprised of individuals with strong knowledge in malware hunting and analysis, reverse engineering, multiple scripting languages, forensics and Threat Actors TTPs. In this customer facing role the analyst's main objective is to find evil, stop the bad guys and provide superior customer service to our customers globally. In your daily tasks you will review and investigate security events from our Fortinet's XDR platform as well as analysis of forensic data and end-point events, perform malware analysis, reverse engineering, and respond to multiple security incidents. In addition
Responsibilities:
Review incoming security events to perform initial triage of events primary from our FortiEDR technology
Identify and analyze events that appear highly suspicious and notifying customs of malware infections
As needed conduct host-based analysis and forensic functions on Windows, Linux, and Mac OS X systems
Work on escalated events and help to assist other team members
Assist in enhancing and tuning Fortinet's Cloud Services and Automated Incident Response (AIR) system
Review firewall, web, database, and other log sources to identify evidence and artifacts of malicious and compromised activity
Leverage our FortiEDR platform to conduct investigations to rapidly detect, analyze and contain security threats
Perform memory forensics and file analysis as needed
Monitor FortiGuard Labs data and open-source intelligence outlets to maintain proficiency in latest threat actor tactics and techniques
Preform reverse engineering of threat actor's malicious tools
Requirements:
5 to 8+ years' experience with incident response and or Forensics.
Experience with of at least one scripting language: Shell, Ruby, Perl, Python, etc
Strong knowledge of operating system internals, endpoint security experience an active directory a must
Demonstrate relevant experience as a contributing member of a security operations, threat intelligence or incident response team
Hands-on experience dealing with APT campaigns, attack Tactics, Techniques and Procedures (TTPs), memory injection techniques, static and dynamic malware analysis and malware persistence mechanism
Hands-on experience with memory forensics
Excellent written and verbal communication skills a must
Experienced with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open-source forensic tools a plus
Experience with malware analysis tools such as IDA Pro, OllyDbg, Immunity Debugger a plus
Reading and writing skills of non-English languages such as Chinese and Russian a plus
Analysis of Linux and MAC binary files and the understanding of MAC internals is a plus but not required.
Highly motivated, self-driven and able to work both independently and within a team
Able to work under pressure in time critical situations and occasional nights and weekends
Bachelor's Degree in Computer Engineering, Computer Science or related field GCFA, GCIH, GCFE, GREM or any other related GIAC certification a plus.
Fortinet is an Equal Opportunity Employer.
We will only notify shortlisted candidates.
Fortinet will not entertain any unsolicited resumes, please refrain from sending them to any Fortinet employees or Fortinet email aliases. Should any Agency submit any resumes to Fortinet, these resumes if considered, will be assumed to have been given by the Agency free of any related fees/charges.
#LI-JS1
Fortinet
We are looking for a Tactical Threat Analyst to work in a dynamic and exciting new position reporting to the Security Operations Center Manager. The analyst will work directly with members of a world class incident response and forensics team. Our team is comprised of individuals with strong knowledge in malware hunting and analysis, reverse engineering, multiple scripting languages, forensics and Threat Actors TTPs. In this customer facing role the analyst's main objective is to find evil, stop the bad guys and provide superior customer service to our customers globally. In your daily tasks you will review and investigate security events from our Fortinet's XDR platform as well as analysis of forensic data and end-point events, perform malware analysis, reverse engineering, and respond to multiple security incidents. In addition
Responsibilities:
Review incoming security events to perform initial triage of events primary from our FortiEDR technology
Identify and analyze events that appear highly suspicious and notifying customs of malware infections
As needed conduct host-based analysis and forensic functions on Windows, Linux, and Mac OS X systems
Work on escalated events and help to assist other team members
Assist in enhancing and tuning Fortinet's Cloud Services and Automated Incident Response (AIR) system
Review firewall, web, database, and other log sources to identify evidence and artifacts of malicious and compromised activity
Leverage our FortiEDR platform to conduct investigations to rapidly detect, analyze and contain security threats
Perform memory forensics and file analysis as needed
Monitor FortiGuard Labs data and open-source intelligence outlets to maintain proficiency in latest threat actor tactics and techniques
Preform reverse engineering of threat actor's malicious tools
Requirements:
5 to 8+ years' experience with incident response and or Forensics.
Experience with of at least one scripting language: Shell, Ruby, Perl, Python, etc
Strong knowledge of operating system internals, endpoint security experience an active directory a must
Demonstrate relevant experience as a contributing member of a security operations, threat intelligence or incident response team
Hands-on experience dealing with APT campaigns, attack Tactics, Techniques and Procedures (TTPs), memory injection techniques, static and dynamic malware analysis and malware persistence mechanism
Hands-on experience with memory forensics
Excellent written and verbal communication skills a must
Experienced with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open-source forensic tools a plus
Experience with malware analysis tools such as IDA Pro, OllyDbg, Immunity Debugger a plus
Reading and writing skills of non-English languages such as Chinese and Russian a plus
Analysis of Linux and MAC binary files and the understanding of MAC internals is a plus but not required.
Highly motivated, self-driven and able to work both independently and within a team
Able to work under pressure in time critical situations and occasional nights and weekends
Bachelor's Degree in Computer Engineering, Computer Science or related field GCFA, GCIH, GCFE, GREM or any other related GIAC certification a plus.
Fortinet is an Equal Opportunity Employer.
We will only notify shortlisted candidates.
Fortinet will not entertain any unsolicited resumes, please refrain from sending them to any Fortinet employees or Fortinet email aliases. Should any Agency submit any resumes to Fortinet, these resumes if considered, will be assumed to have been given by the Agency free of any related fees/charges.
#LI-JS1
Fortinet
Other Info
Philippines
Permanent
Full-time
Permanent
Full-time
Submit profile
Fortinet
About the company







Technology - Infrastructure, Full Time Analyst, Philippines, 2026
Citigroup
MetroManila, Manila, TaguigAgreement



Senior Manager, Major Accounts - Philippines
MetroManila, ManilaAgreement
Position tactical threat Analyst - philippines recruited by the company Fortinet at , Joboko automatically collects the salary of , finds more jobs on Tactical Threat Analyst - Philippines or Fortinet company in the links above
About the company