Overview
Skills
Job Details
About the Role
We are seeking a Bilingual SOC Engineer (Japanese?English) to join our client?s Security Operations Center (SOC) team in Florida. The primary responsibility of this role is to act as the first line of defense for cybersecurity incidents?receiving alerts, logging details, performing initial triage, and forwarding incidents to the L2/L3 security engineering teams for further investigation and remediation.
This position requires strong communication skills in both Japanese and English, excellent attention to detail, and the ability to work in a fast-paced, security-focused environment.
Job Summary
? Monitor, triage, and escalate security alerts.
? Execute playbooks and document incidents.
? Collaborate with global GSOC teams and follow the Japanese Bank global SOC operating model.
? Experience in financial services or regulated environments preferred.
? Familiarity with NIST, MITRE ATT&CK, and GSOC workflows.
? Ability to work hybrid in USA (Tempe, or Tampa) offices preferred but willing to discuss other options (including but not limited to Tokyo).
? Business Operations Transfer (BOT) models preferred.
? Analysts will be required to have both English and Japanese language skills as well as cultural fluency.
Key Responsibilities
1. Incident Intake & Logging
l Receive, acknowledge, and record all security events and incidents in the incident management system.
l Validate incoming alerts to ensure accuracy and completeness.
l Document initial incident details and user reports in both English and Japanese as needed.
2. Initial Triage & Classification
l Perform first-level analysis of alerts from SIEM, IDS/IPS, firewalls, endpoint security tools, and other monitoring systems.
l Categorize incidents by severity, type, and priority following SOC guidelines.
l Identify false positives vs. true security events.
3. Coordination with L2/L3 Teams
l Escalate validated incidents to Level 2 and Level 3 security engineers with clear, concise documentation.
l Provide relevant logs, timelines, and context to ensure efficient hand-off.
l Track escalated incidents to ensure follow-through and timely response.
4. Communication & Reporting
l Communicate incident updates to internal teams and Japanese-speaking stakeholders as needed.
l Generate daily/weekly operational reports for SOC leadership.
l Maintain accurate records following compliance and audit requirements.
5. Operational Support
l Monitor security dashboards and alert queues in real time.
l Follow established SOC procedures, playbooks, and escalation protocols.
l Assist with continuous improvement of SOC processes and documentation.
Requirements
Required Skills & Qualifications
l Fluency in Japanese and English (spoken and written).
l 1?3 years of experience in Security Operations Center or IT operations environment (SOC Tier 1 preferred).
l Basic understanding of cybersecurity concepts: malware, intrusion attempts, vulnerability types, phishing, etc.
l Familiarity with SIEM tools (e.g., Splunk, QRadar, Sentinel, ArcSight).
l Knowledge of security monitoring tools, event logging, and ticketing systems (ServiceNow, Jira, Remedy, etc.).
l Strong analytical and problem-solving skills.
l Ability to work shifts, including nights or weekends if required by SOC operations.
Preferred Qualifications
l Security certifications such as CompTIA Security+, CySA+, CCNA Cyber Ops, JNSA, or equivalent.
l Experience supporting Japanese clients or working in a bilingual environment.
l Understanding of incident response frameworks (NIST, SANS).
l Familiarity with cloud platforms (AWS, Azure, Google Cloud Platform) is a plus.