Security Analyst
Mexico
Oracle
Oracle offers a comprehensive and fully integrated stack of cloud applications and cloud platform services.Responsibilities:
· Monitoring, triaging, processing, and escalating security events received from multiple services and log sources
· Initial collection of evidence related to escalated security events
· Collection of evidence related to compliance audits
· Validation and regular review of processes and procedures
· Identification, escalation, and follow up on of false positives
· Routine audits of ACL and Security Lists
· Process initial mitigation and containment procedures
· Coordinate with service and operations teams to validate security events and anomalous activity
· Identify and recommend security event suppression, adjustment, modification, and tuning based on daily monitoring
· Document initial triage and escalation of security events and alerts
· Provide daily reports of security events and alerts
· Determine and report on possible cause of security events and alerts
· Operate security tools for continual monitoring and analysis of system/network activity to identify malicious activity
· Assist in the construction of security alerts and processes based on knowledge gained from daily monitoring and triage
· Notify designated managers, and responders of suspected cyber incidents including the event's history, status, and potential impact
· Monitor external data sources to maintain basic knowledge of threat conditions
· Recognize a possible security violation and take appropriate action to escalate the incident, as required
Knowledge
· Basic understanding of:
· Computer networking concepts and protocols, and network security methodologies
· Host/network access control mechanisms
· Intrusion detection methodologies and techniques
· How traffic flows across the network (TCP/IP, OSI, ITIL)
· System and application security threats and vulnerabilities
· Types of network communications (LAN, WAN, MAN, etc)
· File extensions (.zip, .sh, .pcap, .bat, .dll, .py, etc)
· Interpreted and compiled computer languages
· Common attack vectors
· Attack classes (passive, active, insider, distributed, etc)
· Incident response and handling methodologies
· Authentication, authorization, and access control methods
· Information technology (IT) security principles and methods
· Network traffic analysis methods
· Operating systems
· Cyber attackers
· Defense-in-depth principles
· System administration, network, and operating system hardening techniques
· Cyber attack stages
· Network security architecture concepts
· Windows/Unix ports and services
· Operating system command-line tools
· Network protocols
· Running knowledge of cyber threats and vulnerabilities
· Understanding security events related to:
· Operating system (Linux and Windows) logs
· Database logs
· VPN logs
· Knowledge of adversarial tactics, techniques, and procedures
· Understanding the use of the following:
· Network tools (ping, traceroute, nmap, etc)
· Host base tools (Tanium, basic Linux and Windows native tools)
· SIEM (Splunk, ELK, Lumberjack, Splunk Enterprise Security, etc)
· Understanding of cybersecurity and privacy principles and related organizational requirements
Skills
· Detecting host and network based intrusions via intrusion detection technologies
· Using protocol analyzers
· Recognizing and categorizing types of vulnerabilities and associated attacks
· Reading and interpreting signatures
· Conducting trend analysis
· Evaluating information for reliability, validity, and relevance
· Identifying cyber threats which may jeopardize organization and/or partner interests
· Preparing and communicating briefings
· Providing analysis to aid writing phased after action reports
· Using Boolean operators to construct simple and complex queries
· Using multiple analytic tools, databases, and techniques
· Using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches
· Utilizing virtual collaborative workspaces and/or tools (Zoom, JIRA, Confluence, Oradocs, Slack, etc)
· Performing packet-level analysis
· Utilizing a SIEM to detect, research, and perform initial triage of security events
· Exercising good judgement in escalating security events
Abilities
· Think critically
· Ability to think like threat actors
· Apply techniques for detecting host and network-based intrusions using intrusion detection technologies
· Interpret the information collected by network tools
· Recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists
· Effectively collaborate with virtual and remote teams
· Evaluate information for reliability, validity, and relevance
· Exercise judgment when policies are not well-defined
· Function effectively in a dynamic, fast-paced environment
· Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts, both internal and external to the organization, to leverage analytical and technical expertise
· Recognize and mitigate cognitive biases which may affect analysis.
Other Requirements and Expectations
· Other tasks and duties as assigned
· Work effectively within a remote team including effective, constant, and collaborative communication with all members of the NSGBU SOC
As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s problems. True innovation starts with diverse perspectives and various abilities and backgrounds.
When everyone’s voice is heard, we’re inspired to go beyond what’s been done before. It’s why we’re committed to expanding our inclusive workforce that promotes diverse insights and perspectives.
We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer a highly competitive suite of employee benefits designed on the principles of parity and consistency. We put our people first with flexible medical, life insurance and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by calling +1 888 404 2494, option one.
Disclaimer:
Oracle is an Equal Employment Opportunity Employer*. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
* Which includes being a United States Affirmative Action Employer
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Application security Audits Cloud Compliance Confluence ELK Incident response Intrusion detection ITIL Jira Linux Monitoring Network security Nmap Oracle PCAP Privacy SIEM SOC Splunk TCP/IP UNIX VPN Vulnerabilities Windows
Perks/benefits: Insurance Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Security Analyst jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Product Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Security Specialist jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open Windows-related jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open DevOps-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs