We're sorry... This job has expired or been removed. It may have been filled or removed for some other reason. For your reference the original listing is shown at the bottom of this page.
Oracle • Boston, MA 02133
Job #2303310500
Job Description
Develops and executes programs and processes to reduce information security risk and strengthen Oracle's security posture.
Supports the strengthening of Oracle's security posture, focusing on one or more of the following: risk management; regulatory compliance; threat and vulnerability management; incident management and response; security policy development and enforcement; privacy; information security education, training and awareness (ISETA); digital forensics and similar focus areas.
Risk Management: Brings advanced level skills to assess the information security risk associated with existing and proposed business operational programs, systems, applications, practices and procedures in very complex, business-critical environments. May conduct and document very complex information security risk assessments. May assist in the creation and implementation of security solutions and programs.
Regulatory Compliance: Brings advanced level skills to manage programs to establish, document and track compliance to industry and government standards and regulations, e.g. ISO-27001, PCI-DSS, HIPAA, FedRAMP, GDPR, etc. Researches and interprets current and pending governmental laws and regulations, industry standards and customer and vendor contracts to communicate compliance requirements to the business. Participates in industry forums monitoring developments in regulatory compliance.
Threat and Vulnerability Management: Brings advanced level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required.
Incident Management and response: Brings advanced level skills to respond to security events, identifying possible intrusions and responding in line with Oracle incident response playbooks. May operate as Incident Commander on serious incidents.
Digital Forensics: Brings advanced level skills to conduct data collection, preservation and forensic analysis of digital media independently, where an advanced understanding of forensic techniques is required.
Other areas of focus may include duties providing advanced level skills and knowledge to manage Information Security Education, Training and Awareness programs. In a Corporate Security role, may manage the creation, review and approval of corporate information security policies.
Mentors and trains other team members.
Compiles information and reports for management.
Minimum of 8 years experience in information systems, business operations, or related fields, at least 5 years of which must be from at least one of the following: Information security risk management; information security program management; Industry/Government security compliance program management (ISO-27001, GDPR, HIPAA, FedRamp, etc.); threat and vulnerability management; incident management and response; security policy development and enforcement; privacy, information security education, training and awareness (ISETA), information security solutions development, etc. required.
Strong knowledge of: Cloud architecture and security principles. Risk Management Frameworks. *nix and Windows system administration.
Experience with: Logging and log analysis. Identity management principles and technology.
Preferred but not required qualifications include: Bachelor-level university degree in a relevant field from an accredited university, or equivalent. CISSP, CISM, CISA, CIPP or other equivalent certification. Comprehensive knowledge of security design for networks, databases, infrastructure, and cloud computing. Experience writing security incident and vulnerability reports for leadership and other stakeholders. Ability to effectively communicate and influence secure product and network design in a collaborative environment. Comprehensive knowledge of digital forensics. Strong knowledge of web technologies, middleware, database, OS, firewalls, network communication protocols and methods. Knowledge of encryption technologies and architectures. Expert level experience in evaluating and assessing security threats across a variety of environments and industries. Expert level understanding of secure networking principles, routers, switches and load balancers.
If you are a Colorado resident, Please Contact us or Email us at ~~~ to receive compensation and benefits information for this role. Please include this Job ID: 180694 in the subject line of the email.
Responsibilities
Key Responsibilities
• Perform hands-on activities including network, disk and memory forensics, log analysis, malware analysis and threat hunting.
• Assist with the development of processes and procedures to improve security operations functions, incident response times, analysis of incidents, and overall SOC functions.
• Develop scripts, processes and content to improve response capabilities.
• Chain of custody process and properly secure of evidence.
• Research industry trends, identify ongoing security threats, analyze new security testing tools, and provide recommendations on the need and usefulness of services and/or products.
• Evaluate and recommend new and emerging security solutions and technologies to issues.
• Effectively communicate security concepts with both technical and non-technical individuals.
• Provide information regarding intrusion events, security incidents, and other threat indications and warning information to teams and leadership as part of incident response.
• Deliver self-service security metric data of discovery, triage and trending analysis of team findings.
• Author post mortem reports to be provided to senior leadership following an intrusion or red team engagement.
• Participate in planning, designing, and executing tabletop exercises cross-functionally across Oracle for SaaS security incident planning.
• Help define Threat Hunting use cases.
• Participate in Red/Blue team activities.
Required Qualifications
• Bachelor's Degree in Computer Science, Information Assurance, Security, Management Information Systems, Risk Management, or equivalent work experience acceptable.
• 4+ years of related cybersecurity architecture, engineering, SOC work experience (monitoring, incident response, forensics).
• Strong understanding of typical intrusion life cycle, including privilege escalation, persistence, and lateral movement techniques.
• Strong understanding of host and network Incident Response processes, tasks, tools, and industry operational best practices.
• Understanding of MITRE ATT&CK TM knowledge base.
• Strong and hands-on forensics experience/knowledge on Linux and Windows Operating Systems.
• Python scripting experience.
• Experience with problem solving and troubleshooting complex issues with an emphasis on root cause analysis.
• Understanding of traditional and microservice Application security architectures e.g. OWASP top 10 web application security risks, database security, authentication schemes.
• Excellent customer service skills required.
• Ability to both work independently with minimal direction and to collaborate effectively with local and remote teams with a strong customer focus.
• Excellent written and verbal communications, including presentation skills, are important to be successful in this role.
• Proven ability to effectively communicate with all levels of the organization, as well as with external parties.
Preferred Qualifications
• 2+ years of experience as a Digital Forensics Analyst.
• 2+ years of Python scripting experience.
• Advanced degree in computer science or related field.
• 8+ years of experience within the security department of a large cloud or Internet software company.
• Ideal candidate should possess at least two of the following certifications:
SANS GIAC Cyber Threat Intelligence (GCTI)
SANS GIAC Network Forensic Analyst (GNFA)
SANS GIAC Certified Forensic Analyst (GCFA)
SANS GIAC Certified Forensic Examiner (GCFE)
SANS GIAC Certified Incident Handler (GCIH)
SANS GIAC Certified Intrusion Analyst (GCIA)
SANS GIAC Reverse Engineering Malware (GREM)
Certified Information Systems Security Professional (CISSP)
Offensive Security Certified Professional (OSCP)
Detailed Description and Job Requirements
• Strong understanding of typical intrusion life cycle, including privilege escalation, persistence, and lateral movement techniques.
• Strong understanding of host and network Incident Response processes, tasks, tools, and industry operational best practices.
• Understanding of MITRE ATT&CK TM knowledge base.
• Strong and hands-on forensics experience/knowledge on Linux and Windows Operating Systems.
• Python scripting experience.
• Experience with problem solving and troubleshooting complex issues with an emphasis on root cause analysis.
• Understanding of traditional and microservice Application security architectures e.g. OWASP top 10 web application security risks, database security, authentication schemes.
• Excellent customer service skills required.
• Ability to both work independently with minimal direction and to collaborate effectively with local and remote teams with a strong customer focus.
• Excellent written and verbal communications, including presentation skills, are important to be successful in this role.
• Proven ability to effectively communicate with all levels of the organization, as well as with external parties.
About Us
Diversity and Inclusion:
An Oracle career can span industries, roles, Countries and cultures, giving you the opportunity to flourish in new roles and innovate, while blending work life in. Oracle has thrived through 40+ years of change by innovating and operating with integrity while delivering for the top companies in almost every industry.
In order to nurture the talent that makes this happen, we are committed to an inclusive culture that celebrates and values diverse insights and perspectives, a workforce that inspires thought leadership and innovation. .
Oracle offers a highly competitive suite of Employee Benefits designed on the principles of parity, consistency, and affordability. The overall package includes certain core elements such as Medical, Life Insurance, access to Retirement Planning, and much more. We also encourage our employees to engage in the culture of giving back to the communities where we live and do business.
At Oracle, we believe that innovation starts with diversity and inclusion and to create the future we need talent from various backgrounds, perspectives, and abilities. We ensure that individuals with disabilities are provided reasonable accommodation to successfully participate in the job application, interview process, and in potential roles. to perform crucial job functions.
That's why we're committed to creating a workforce where all individuals can do their best work. It's when everyone's voice is heard and valued that we're inspired to go beyond what's been done before.
Disclaimer:
Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.
Oracle is an Equal Employment Opportunity Employer ***** . All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
*** Which includes being a United States Affirmative Action Employer**
Oracle • Boston, MA 02133 • Yesterday
Oracle • Boston, MA 02133 • Yesterday
Oracle • Boston, MA 02133 • Yesterday
Oracle • Boston, MA 02133 • 3 Days Ago
Takeda Pharmaceutical • Boston, MA 02112 • Yesterday
Anduril Industries • Boston, MA 02298 • 3 Days Ago
Allied Universal • Boston, MA 02298 • 8 Days Ago
The Phoenix Group • Boston, MA 02298 • Today
StoneTurn • Boston, MA 02298 • 4 Days Ago
MBTA • Boston, MA 02298 • Mar 1
Paragon Systems Inc • Boston, MA 02298 • 8 Days Ago