About Security Bank
We are the Philippines’ largest independent bank, having won countless awards over the years including the most prestigious industry award in both 2015 and 2016—the Bank of the Year – Philippines by The Banker.
We’re changing how people bank. From the moment customers enter our branches to their experience online, we make them feel valued and empowered.
Now, with more than 300 branches spanning the country, BetterBanking has become the gold standard in improving the banking lives of millions of Filipinos. But we’re far from done.
In our constant pursuit of excellence and improvement, we create teams that support our business and each other.
As an IT Forensic Manager, you will be responsible for the investigation of misbehavior on computer systems by collecting and analyzing computer-related evidence. You will retrieve data that have been encrypted or electronically stored on a commercial or personal computer. You will work with the Security Operations Center Engineer and Vulnerability Manager to investigate wrongdoings or activities to protect data against criminals or attackers.
How you'll contribute
- Determine the best methods of requesting and collecting data and devices as part of ongoing investigations.
- Determine the best methods to acquire and analyze data, determining the most appropriate hardware and software tools to be used.
- As a subject matter expert, provide guidance and consultation to most effectively and efficiently provide requested services.
- Provide expert opinion on the development and revision of Standard Operating Procedures (SOP) to provide the most up-to-date techniques and technology in supporting digital forensics services.
- Provide direct technical support to investigation, litigation, and forensic analyst, to collect, preserves, process, analyze, and interpret digital evidence from a broad range of electronic data storage media.
- Manage digital forensics examinations/investigations through the entire lifecycle (case planning, intake, acquisition, examination, presentation, and disposition).
- Conduct forensic examinations of computers and media from a variety of sources with the goal of developing or presenting forensically sound evidence.
- Conduct research of IP addresses, domain names, and other cyber activity to provide investigative leads.
- Apply industry-accepted principles in retrieving, recovering, and preserving digital evidence.
- Research and maintains proficiency in tools, techniques, and trends.
- Serve as a source of technical counsel and advice for forensic collection and processing activities and possess the ability to lead forensic investigations in the field or laboratory.
- Collaborate with and provide technical guidance and assistance to other forensic analysts, law enforcement officers, legal staff/experts, network and system administrators, program/project leads, and customers to recommend methods and procedures for recovery, preservation/prevention of spoliation, storage, processing, and presentation of digital evidence.
- Support the development of workflow and procedures documents maintaining chain of custody of evidentiary documents
- Prepare clear and comprehensive notes and reports of examination activities and findings and assists in the draft of quality assurance and standard operating procedures.
- Aid in identifying, monitoring, investigating, and analyzing network intrusions.
- Use experience and knowledge of a wide variety of advanced computer technologies, encryption schemes, and forensic theories to conduct an analysis of submitted evidence.
- Use forensic tools and investigate methods to find specific electronic data, including internet use history, word processing documents, images, and other files.
- Ensure to use the technical skills to hunt for files and information that have been deleted, hidden, or lost.
- Transfer the evidence into a format that can be used for legal purposes and often testify in court themselves.
- Use hacking and intrusion techniques with computer testing and computer system diagnostics
What we’re looking for:
- Bachelor's Degree in Computer Science/Information Technology
- Digital forensic certifications: CFCE, CCE, GCFA, GCFE, EnCE, ACE, CCME, or similar certification
- At least 4 years of experience in computer forensics
- Familiar with standard computer operating systems (Windows, Linux, Unix, Macintosh, DOS, etc.), networks, and hardware as well as security software and document -creation applications
- Expertise in hacking and intrusion techniques and prior experience with security testing and computer system diagnostics.
- Have excellent analytical skills, to be highly conscious of details, and to be able to multi-task efficiently
- Extensive experience of using forensic tools
- Exposure to cloud forensics
- Documented experience in acquiring and analyzing data.