Logo
Pacific Gas And Electric Company

Senior Cloud Cyber Incident Responder

Pacific Gas And Electric Company, Concord, California, us, 94527


Requisition ID # 159198Job Category: Information TechnologyJob Level: Individual ContributorBusiness Unit: Information TechnologyWork Type: HybridJob Location: ConcordDepartment OverviewThe Cybersecurity function is led by PG&E’s Senior VP and Chief Information Officer and is responsible for cybersecurity and risk management across the organization.The Security Intelligence and Operations Center (SIOC) is responsible for ensuring that PG&E proactively identifies and assesses threats to its user and operational network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.Position SummaryThe ideal candidate for this position will be knowledgeable regarding cyber security standards and technologies, specifically focused on infrastructure within cloud environments. This position will provide the opportunity to work in an environment with a focus on threat identification, incident response, and cyber threat intelligence fusion. Candidate will be a part of a highly collaborative, dynamic, responsive, and agile team providing incident response and cyber defense services to on-prem and cloud infrastructure. Additionally, this position will help organize and plan cyber incident response exercises and workshops, collaborating and building relationships with different functional areas of the business, and writing after-action reports.This role is primarily responsible for system-based defense to support forensic analysis of compromised devices, endpoint log analysis, development, delivery, and enforcement of response and remediation activities across the organization. Candidate will also be responsible for development of advanced mitigations to ensure defensive resiliency. Daily activities will include collection and analysis of potentially compromised systems, malware analysis, root cause analysis, and remediation efforts. In this role, the candidate will work cross-functionally in a diverse teaming environment with various internal points of contacts and handoffs.The role is hybrid and is expected to be in-person at least three days per week in the SIOC in Concord, CA.PG&E is providing the salary range that the company in good faith believes it might pay for this position at the time of the job posting. This compensation range is specific to the locality of the job. The actual salary paid to an individual will be based on multiple factors, including, but not limited to, specific skills, education, licenses or certifications, experience, market value, geographic location, and internal equity.

Although we estimate the successful candidate hired into this role will be placed between the entry point and the middle of the range, the decision will be made on a case-by-case basis related to these factors.

This job is also eligible to participate in PG&E’s discretionary incentive compensation programs.A reasonable salary range is:Bay Area Minimum: $122,000Bay Area Maximum: $194,000Job ResponsibilitiesMaintain knowledge of adversary activities, including intrusion tactics, attack techniques and operational procedures.Investigate and respond to escalated potential cybersecurity incidents.Forensic analysis of potential evidence.Analysis of potentially malicious files.Analysis of security event logs from a variety of sources.Network packet capture analysis.Lead incident response efforts, coordinating resources as needed.Work alongside other cyber teams to recommend and facilitate security control improvements, refine security operations workflows.Plan and organize incident response exercises and workshops.Documentation of after-action reports including summarization for executive review.Provide guidance to junior analysts.Share on-call responsibility outside of business hours, onsite and remote.QualificationsMinimum:High School or GED-General Educational Development Diploma.4 years experience in IT-Information Technology security, including working in Security Operations Centers.

Desired:Bachelor’s Degree in Computer Science or job-related discipline or equivalent experience.Previous experience supporting cyber defense analysis of cloud networks in AWS, Azure, or GCP.Formal IT Security/Network Certification, such as WCNA, CompTIA Security +, Cisco CCNA, SANS GCIH, GMON, GCFA, GCFE, GREM, GICSP, GCFR, GCTD, or other relevant certifications.Utility Industry experience.Previous experience working with various SIEM technologies.Experience with scripting in Python/PowerShell.Malware reverse engineering skills.

#J-18808-Ljbffr