Quest Technology Management
IT Senior Security Analyst Oracle
Quest Technology Management, Rocklin, California, United States, 95765
Job DescriptionThe Oracle Cloud Infrastructure (OCI) builds and operates a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. OCI is committed to providing the best cloud products and services that enables our customers to be successful. We offer unique opportunities for smart, hands-on folks to grow OCI business using data, solve difficult problems across distributed highly available services and virtualized infrastructure. We are seeking an experienced Senior Cybersecurity Analyst to join the Oracle Health Security Operations Center (SOC). In this role, you will be part of a highly skilled group of security professionals dedicated to safeguarding Oracle’s cutting-edge cloud infrastructure and health services. Our team is at the forefront of cybersecurity, excelling in the triage of intricate security issues, mastering the use of advanced security tools, and managing every aspect of the incident response lifecycle. This is your chance to make a significant impact, enhance your expertise, and be a part of a 4 on-3 off 24/7 team that is committed to excellence and innovation. Join us and be a key player in protecting and securing the future of cloud technology and healthcare solutions.
Basic Qualifications
U.S. Citizenship on U.S. soil is required. This position requires you to be eligible to receive a federal security clearance which requires you to be a U.S. Citizen.
Bachelor of Science degree in Computer Science, Computer Engineering, Software Engineering, Computer Information Systems, Information Systems, Information Technology or related field, or equivalent, relevant work experience.
Support on-call rotations.
Passion for security and a continuous desire to learn and grow in the field.
Preferred Qualifications
Recommended Security Certifications: CISSP, CISA, OSCP, CEH, GSEC, GCIH or similar.
Strong analytical skills and experience with a range of security tools, including SIEM, EDR, AV, scanning tools, and forensic collection, processing, and analysis tools.
Background in security incident management and digital forensics is highly desirable.
Proficiency in using and understanding the MITRE ATT&CK framework.
Working knowledge of cloud security and incident response.
ResponsibilitiesKey Responsibilities:
Lead and manage complex security investigations, including triage, containment/mitigation, scoping, threat hunting, collection, processing, analysis, remediation, after-action reporting and documentation.
Provide guidance and mentorship to junior analysts, enhancing their skills and contributing to a cohesive and efficient team.
Operate security tools, including but not limited to SIEM platforms, Intrusion Detection Systems (IDS), Firewalls, Anti-Malware solutions, and Endpoint Detection and Response (EDR) systems.
Craft custom signatures and alerts to enhance detection capabilities.
Maintain a thorough understanding of the current threat landscape, including emerging attacker tactics, techniques, and procedures (TTPs), and translate them into actionable security measures.
Work closely with security engineering teams to improve monitoring, detection, and security tooling.
Collect, process, and analyze various artifacts, including logs, IOCs, and host/instance-based artifacts, that are unavailable through standard security tools.
Examine technical artifacts, such as scripts, compiled malware, infrastructure relationships, and domain name structures, to identify and mitigate threats.
Provide high-quality written and verbal reports as required.
Operate effectively in a remote setting, using technology and time management practices to maintain productivity.
#J-18808-Ljbffr
Basic Qualifications
U.S. Citizenship on U.S. soil is required. This position requires you to be eligible to receive a federal security clearance which requires you to be a U.S. Citizen.
Bachelor of Science degree in Computer Science, Computer Engineering, Software Engineering, Computer Information Systems, Information Systems, Information Technology or related field, or equivalent, relevant work experience.
Support on-call rotations.
Passion for security and a continuous desire to learn and grow in the field.
Preferred Qualifications
Recommended Security Certifications: CISSP, CISA, OSCP, CEH, GSEC, GCIH or similar.
Strong analytical skills and experience with a range of security tools, including SIEM, EDR, AV, scanning tools, and forensic collection, processing, and analysis tools.
Background in security incident management and digital forensics is highly desirable.
Proficiency in using and understanding the MITRE ATT&CK framework.
Working knowledge of cloud security and incident response.
ResponsibilitiesKey Responsibilities:
Lead and manage complex security investigations, including triage, containment/mitigation, scoping, threat hunting, collection, processing, analysis, remediation, after-action reporting and documentation.
Provide guidance and mentorship to junior analysts, enhancing their skills and contributing to a cohesive and efficient team.
Operate security tools, including but not limited to SIEM platforms, Intrusion Detection Systems (IDS), Firewalls, Anti-Malware solutions, and Endpoint Detection and Response (EDR) systems.
Craft custom signatures and alerts to enhance detection capabilities.
Maintain a thorough understanding of the current threat landscape, including emerging attacker tactics, techniques, and procedures (TTPs), and translate them into actionable security measures.
Work closely with security engineering teams to improve monitoring, detection, and security tooling.
Collect, process, and analyze various artifacts, including logs, IOCs, and host/instance-based artifacts, that are unavailable through standard security tools.
Examine technical artifacts, such as scripts, compiled malware, infrastructure relationships, and domain name structures, to identify and mitigate threats.
Provide high-quality written and verbal reports as required.
Operate effectively in a remote setting, using technology and time management practices to maintain productivity.
#J-18808-Ljbffr