IT Security Engineer 2

BENGALURU, KARNATAKA, India

Oracle

Oracle offers a comprehensive and fully integrated stack of cloud applications and cloud platform services.

View company page

  We are seeking a Security Operations Centre (SOC) analyst to provide monitoring and analysis capability for 24/7 Security Operations Centre (SOC) operations. The Analyst will conduct analysis of security events to include validation, remediation and where needed issue and reporting of events of interest based. As part of the Security Operations Centre, you will be part of a global Security Operations team identifying security events and coordinating the response for the relevant technical support groups, businesses at risk and service recovery teams. As a member of this fast-paced team, you will implement controls to protect the infrastructure and employees against internal and external malicious charges and infiltration.

The security analyst is responsible to supervise and help maintain the security posture of the IT environments.  These responsibilities include analyzing data in order to identify computer charges and malware infections, responding to security incidents, documentation, analytical investigation and recommended proactive security threat countermeasures.  Using innovative network behavior and anomaly detection tools, the analyst will examine, identify, and understand the nature of cyber-threats such as viruses, worms, bots, root kits and Trojan horses.

Required Qualifications

  •  Minimum 2 years meaningful experience in a Security Operations Centre, Security Engineering, or related cyber security role with some experience in  at least one of the following: information security risk management; information security program management; Industry/Government security compliance and audit; threat and vulnerability management; incident management and response; security policy development and enforcement; privacy, information security education, training and awareness (ISETA), information security solutions development, etc.
  • Intermediate understanding of Windows, Linux, or standard network processes and protocols
  • Excellent written and verbal communications in English are vital to be successful in this role.
  • Ability to optimally communicate security concepts with both technical and non-technical individuals !

Preferred Qualifications:

  We are looking for a Bachelor’s Degree in Computer Science, Information Assurance, Security, Management Information Systems, Risk Management or equivalent work experience

  • Intermediate scripting using Python, Perl, Bash, PowerShell, or an equivalent 
  • Preferred knowledge of current sophisticated adversary TTP’s and experience responding to APT charges
  • Knowledge of operational security tools and practices (e.g. SIEM, IDS, firewalls, & 3rd-party security products) !

 

Career Level - IC2

Responsibilities:

 We are looking for a candidate who will Supervise all Oracle Infrastructure for intrusions by perform hunting exercises using threat intelligence, analysis of anomalous log data and results of historical events and data to detect and respond to threats.

  1. Develop anomaly detection dashboards and reports to identify potential threats, suspicious activity, and intrusions
  2. Supervise for security indicators by correlating and analyzing a variety of application, network and host-based security logs and resolving accurate remediation actions and critical issue paths for each incident
  3. Develop scripts to support the automation of the detection and incident response process
  4. Evaluate and recommend new and emerging security solutions and technologies
  5. Deliver self-service security metric data of discovery, triage and trending analysis of team findings

As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s problems. True innovation starts with diverse perspectives and various abilities and backgrounds.

When everyone’s voice is heard, we’re inspired to go beyond what’s been done before. It’s why we’re committed to expanding our inclusive workforce that promotes diverse insights and perspectives.

We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity.

Oracle careers open the door to global opportunities where work-life balance flourishes. We offer a highly competitive suite of employee benefits designed on the principles of parity and consistency. We put our people first with flexible medical, life insurance and retirement options. We also encourage employees to give back to their communities through our volunteer programs.

We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by calling +1 888 404 2494, option one.

Disclaimer:

Oracle is an Equal Employment Opportunity Employer*. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.

* Which includes being a United States Affirmative Action Employer

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: APT Automation Bash Cloud Compliance Computer Science Firewalls IDS Incident response Linux Malware Monitoring Oracle Perl PowerShell Privacy Python Risk management Scripting SIEM SOC Threat intelligence Vulnerability management Windows

Perks/benefits: Career development Insurance Team events

Region: Asia/Pacific
Country: India
Job stats:  8  3  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.