Security Operations Analyst

Information security analysts are vital in keeping a company’s data and sensitive information safe and protected from threats.

Also Called

Information Security Analyst
Information Security Specialist


Security Operations Analysts keep an organization’s computer and network systems safe. They plan and implement security measures that monitor and protect sensitive data and systems from cyber-attacks or infiltration. They also respond to computer security breaches and viruses.


Duties and Responsibilities:

These are some of the core duties and responsibilities of a Security Operations Analyst, however, specific tasks will depend on the type of business, organization, client, or project.


  • Develop information security plans, procedures, standards, policies, and best practices
  • Carry out an organization’s information security strategies
  • Recommend necessary enhancements as needed
  • Respond to and recover from security breaches
  • Install software such as firewalls and data encryption programs to protect sensitive information
  • Conduct periodic scans to test for vulnerabilities
  • Perform penetration testing to find issues in the system
  • Continuously monitor network and systems for any security breaches and investigate any breaches that may occur


Products/Technologies an Information Security Analyst may work with:

  • Fortinet
  • Kaspersky
  • Cisco
  • Check Point
  • Juniper
  • Symantec
  • Palo Alto


The average monthly salary of a Security Operations Analyst in Philippines ranges between Php 40,000 - Php 200,000 (median: Php 100,000).

0 to 2 years experience

P40,000 - P50,000

(median: P0)

  • 40000
  • 50000

3 to 5 years experience

P50,000 - P100,000

(median: P0)

  • 50000
  • 100000

6 to 10 years experience

P100,000 - P180,000

(median: P0)

  • 100000
  • 180000

More than 10 years

P90,000 - P160,000

(median: P0)

  • 90000
  • 160000


These are some of the skills & qualifications a Security Operations Analyst needs. These may vary depending on the specific requirements of the business or organization.


Technical Knowledge:

  • Firewalls
  • Anti-Virus and Anti-Malware software
  • IDP (Intrusion Detection & Prevention)
  • Content filtering
  • Penetration Testing
  • Risk assessment tools, technologies, and methods
  • Disaster recovery and computer forensic tools


Other Key Qualities/Abilities/Knowledge:

  • Good Communication - can communicate issues with other team members
  • Complex Problem Solving
  • Critical Thinking
  • Problem Sensitivity


Sample Certifications:

These are examples of certifications that some companies may look for/require

  • CISM (Certified Information Security Manager)
  • CISSP (Certified Information Systems Security Professional)
  • CEH (Certified Ethical Hacker)
  • HCISPP (Health Care Information Security and Privacy Practitioner)


Penetration Testing
Information Security
Anti Malware
Anti Virus
Intrusion Prevention Systems
Intrusion Detection and Prevention
Risk Assessment
Disaster Recovery
Incident Management
System Administration
Framework Design
IT Security
IT Infrastructure

Sign up now and get updated on the latest jobs, courses, events, and news about this career.


Upcoming Events

No events available

Explore more careers in IT Security