DescriptionDevelops and executes programs and processes to reduce information security risk and strengthen Oracle’s security posture.
Supports the strengthening of Oracle’s security posture, focusing on one or more of the following: risk management; regulatory compliance; threat and vulnerability management; incident management and response; security policy development and enforcement; privacy; information security education, training and awareness (ISETA); digital forensics and similar focus areas.
Risk Management: Brings advanced level skills to assess the information security risk associated with existing and proposed business operational programs, systems, applications, practices and procedures in very complex, business-critical environments. May conduct and document very complex information security risk assessments. May assist in the creation and implementation of security solutions and programs.
Regulatory Compliance: Brings advanced level skills to manage programs to establish, document and track compliance to industry and government standards and regulations, e.g. ISO-27001, PCI-DSS, HIPAA, FedRAMP, GDPR, etc. Researches and interprets current and pending governmental laws and regulations, industry standards and customer and vendor contracts to communicate compliance requirements to the business. Participates in industry forums monitoring developments in regulatory compliance.
Threat and Vulnerability Management: Brings advanced level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required.
Incident Management and response: Brings advanced level skills to respond to security events, identifying possible intrusions and responding in line with Oracle incident response playbooks. May operate as Incident Commander on serious incidents.
Digital Forensics: Brings advanced level skills to conduct data collection, preservation and forensic analysis of digital media independently, where an advanced understanding of forensic techniques is required.
Other areas of focus may include duties providing advanced level skills and knowledge to manage Information Security Education, Training and Awareness programs. In a Corporate Security role, may manage the creation, review and approval of corporate information security policies.
Mentors and trains other team members.
Compiles information and reports for management.
Minimum of 8 years experience in information systems, business operations, or related fields, at least 5 years of which must be from at least one of the following: Information security risk management; information security program management; Industry/Government security compliance program management (ISO-27001, GDPR, HIPAA, FedRamp, etc.); threat and vulnerability management; incident management and response; security policy development and enforcement; privacy, information security education, training and awareness (ISETA), information security solutions development, etc. required.
Strong knowledge of: Cloud architecture and security principles. Risk Management Frameworks. *nix and Windows system administration.
Experience with: Logging and log analysis. Identity management principles and technology.
Preferred but not required qualifications include: Bachelor-level university degree in a relevant field from an accredited university, or equivalent. CISSP, CISM, CISA, CIPP or other equivalent certification. Comprehensive knowledge of security design for networks, databases, infrastructure, and cloud computing. Experience writing security incident and vulnerability reports for leadership and other stakeholders. Ability to effectively communicate and influence secure product and network design in a collaborative environment. Comprehensive knowledge of digital forensics. Strong knowledge of web technologies, middleware, database, OS, firewalls, network communication protocols and methods. Knowledge of encryption technologies and architectures. Expert level experience in evaluating and assessing security threats across a variety of environments and industries. Expert level understanding of secure networking principles, routers, switches and load balancers.
ResponsibilitiesAre you interested in securing a large-scale distributed SaaS environment? Oracle's SaaS Cloud Security team is building new technologies that operate at high scale in our broadly distributed multi-tenant cloud environment. The Security Incident Response team plays a key role in enabling Oracle's Security vision, minimizing security incident-based losses and disruptions, facilitating efficient recovery from such incidents, and ensuring the implementation of controls to mitigate associated risk.
The Security Incident Response Analyst is responsible for all facets of a security incident involving Oracle SaaS Cloud assets. This includes triaging and assessing risk of incidents, performing real-time analysis, managing workload of technical staff and partner teams during investigations/incidents, and communicating with various levels of Oracle including executives, legal, compliance, etc. In addition to incident response, analysts drive the creation of policies and procedures, incident playbooks, and response workflows.
Position Overview
SaaS Cloud Security is looking for a seasoned security analysts with Top Secret Clearance to join our efforts in reshaping the cloud services landscape across industry verticals and solve difficult problems by designing and building innovative new systems to revolutionize the security of Oracle's SaaS portfolio of products. The SaaS Cloud Security organization is responsible for securing enterprise-grade software services on behalf of our 25,000 customers, processing over 60 billion transactions per day.
We are building a team of analysts and engineers to support our US Government customers, that can work autonomously to carry out activities in the areas of detection and response to protect the Oracle SaaS environment. The team will be able to, collectively cover, the breadth and depth of: monitoring for Indicators of Compromise (IOC), being up to date with latest third-party Threat Intelligence (TI), responding to identified incidents including attack remediation, evidence collection and forensics. The team will also support the continual improvement of processes and technology used for maximizing automation of detection and response for SaaS.
As a Security Incident Response analyst and a member of the SaaS Cloud Security organization you will triage and assess security concerns, develop remediation plans, and drive security incidents to resolution; respond to intrusion attempts, identify the full scope of impact and attack vector, and manage various communication streams including cross company and executive communications.
Key Responsibilities
- Triage and assess security concerns, develop remediation plans, and drive security incidents to resolution
- Respond to intrusion attempts, identifying full scope of impact and attack vector
- Manage various communication streams including cross company and executive communications
- Facilitate post incident reviews, document root causes, and actively work with impacted teams addressing resolution actions
- Collaborate with Oracle operations, engineering and partner security teams during all phases of the incident response lifecycle
- Develop and maintain incident response procedures and runbooks
- Develop scripts and processes to improve detective capabilities and automation
- Research industry trends, identify ongoing security threats, analyze new security testing tools, and provide recommendations on the need and usefulness of such services and products
- Support other security functions and teams to ensure holistic implementation of security controls, technologies, practices, and programs
Qualifications
Bachelor’s Degree in Information Assurance, Computer Security, Management Information Systems, Risk Management or related field
5+ years of related cybersecurity architecture, engineering, and/or SOC work experience (monitoring, detection, incident response, forensics)
Ability to script/code using Python, Perl, or an equivalent language
Understanding of common security concerns and associated threat actor tactics
A broad background in information security with experience in security operations, vulnerabilities and exploitation, network security, and cloud security.
Excellent written and verbal communications, including presentation skills
Proven ability to effectively communicate with all levels of the organization, as well as customers and external parties
Be available on an on-call basis to respond to pending issues or problems arising during non-business hours and provide support and response
CISSP, GIAC or infrastructure / security architecture certifications are preferred
*US Citizenship and currently hold a Top Secret (TS)/SCI I clearance for Critical-Sensitive Positions