Jobs for Veterans, Veteran Job Board | GiJobs.com

Post Jobs

Job Information

Oracle IT Security Analyst 3 in Bengaluru, India

IT Security Analyst 3

Preferred Qualifications

We are seeking a SOC Analyst to join the Oracle Engineering IT team responsible for securing systems, infrastructure, services and data. The Security Operations Center Analyst will use data collected from a variety of information security tools and sources (including intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within the enterprise and perform threat analysis as well as investigate and analyze all response activities related to potential security incidents within the enterprise.

The candidate must be able to routinely evaluate priorities based on the dynamic nature of the environment. The role requires close collaboration with peers across multiple geographic regions to discuss issues and cases and for performing troubleshooting activities. Partnership with multiple internal security teams is paramount for success and overall improvement of security operations.

  • Responsibilities Include:

*

  • Provide analytical support, respond to security incidents, draft comprehensive incident reports, document and execute lessons learned

  • Identify security events requiring immediate escalation and response

  • Document and communicate analysis of research and findings to peers and leadership

  • Monitor and analyze security events, network traffic, and security alerts across the enterprise

  • Perform advanced analysis of security events and alerts

  • Correlate events from multiple sources during investigations

o Assist with ongoing development and improvement of processes and response procedures to improve overall SOC functions

o Conduct investigations of potential intrusion attempts to determine remediation actions and escalation paths

o Facilitate meetings to collaborate with internal teams to identify, resolve, and mitigate issues

  • Perform incident response and handling following documented procedures

o Track investigation activities during an incident, including identifying next steps, spanning across multiple shifts

  • Monitor external data sources to maintain awareness of threat condition and determine which security issues may have an impact on the enterprise

  • Required Skills and Experience:

*

  • Knowledge of security controls including network security technologies (IDS, IPS, firewall, and WAF), OS hardening, file integrity monitoring, authentication,

  • Strong understanding of system and network security threats and vulnerabilities

  • Hands-on experience with TCP/IP and data packet capture analysis, networking fundamentals, common network services, network vulnerabilities and network attack patterns

  • Experience in security event monitoring and triage, incident response, and/or system/network auditing

o Hands-on experience using SIEM for data analysis and EDR tools for response purposes

o Familiarity with network and endpoint security applications and tools including network scanning tools, NIDS/HIDS, firewalls and web proxies

o Self-motivated, excellent analytical and problem solving and critical thinking skills

  • Exercise sound judgment calls for investigative purpose, including making the determination to close a case

  • o 2 years as a SOC Analyst

o 5 years in Information Technology preferably as a security engineer, system administrator, or network engineer

  • Bachelors degree in Computer Science, Computer Engineering, MIS, or related field

  • Effective time management skills by completing assignments or delivering updates within required deadlines

  • Preferred Skills and Experience:

*

  • Experience with Linux system administration, scripting, log parsing, vulnerability assessments/penetration testing, or vulnerability management

  • Scripting, programming knowledge and experience

o Familiarity with industry recognized frameworks including but not limited to MITRE ATT&CK, ADS, NIST 800, and CIS

o Recognized industry certification and/or continuing education programs are a major plus including GCIH, GCIA, CISSP, GCFA, GMON, GREM, GNFA

  • Advanced understanding of Unix & Windows functionality, access control, event logs and monitoring; application and network security

  • Working knowledge of forensics, incident response and threat hunting methodologies

  • Please note the above job description pertains to the current vacancy

  • Responsibilities Include:

*

  • Provide analytical support, respond to security incidents, draft comprehensive incident reports, document and execute lessons learned

  • Identify security events requiring immediate escalation and response

  • Document and communicate analysis of research and findings to peers and leadership

  • Monitor and analyze security events, network traffic, and security alerts across the enterprise

  • Perform advanced analysis of security events and alerts

  • Correlate events from multiple sources during investigations

o Assist with ongoing development and improvement of processes and response procedures to improve overall SOC functions

o Conduct investigations of potential intrusion attempts to determine remediation actions and escalation paths

o Facilitate meetings to collaborate with internal teams to identify, resolve, and mitigate issues

  • Perform incident response and handling following documented procedures

o Track investigation activities during an incident

  • Monitor external data sources to maintain awareness of threat condition and determine which security issues may have an impact on the enterprise

  • Required Skills and Experience:

*

  • Knowledge of security controls including network security technologies (IDS, IPS, firewall, and WAF), OS hardening, file integrity monitoring, authentication,

  • Strong understanding of system and network security threats and vulnerabilities

  • Hands-on experience with TCP/IP and data packet capture analysis, networking fundamentals, common network services, network vulnerabilities and network attack patterns

  • Experience in security event monitoring and triage, incident response, and/or system/network auditing

o Hands-on experience using SIEM for data analysis and EDR tools for response purposes

o Familiarity with network and endpoint security applications and tools including network scanning tools, NIDS/HIDS, firewalls and web proxies

o Self-motivated, excellent analytical and problem solving and critical thinking skills

  • Exercise sound judgment calls for investigative purpose, including making the determination to close a case

o 2 years as a SOC Analyst

o 5 years in Information Technology preferably as a security engineer, system administrator, or network engineer

  • Bachelors degree in Computer Science, Computer Engineering, MIS, or related field

  • Effective time management skills by completing assignments or delivering updates within required deadlines

  • Preferred Skills and Experience:

*

  • Experience with Linux system administration, scripting, log parsing, vulnerability assessments/penetration testing, or vulnerability management

  • Scripting, programming knowledge and experience

o Familiarity with industry recognized frameworks including but not limited to MITRE ATT&CK, ADS, NIST 800, and CIS

o Recognized industry certification and/or continuing education programs are a major plus including GCIH, GCIA, CISSP, GCFA, GMON, GREM, GNFA

  • Advanced understanding of Unix & Windows functionality, access control, event logs and monitoring; application and network security

  • Working knowledge of incident response

Detailed Description and Job Requirements

Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs.

Researches attempted efforts to compromise security protocols. Maintains security systems for routers and switches. Administers security policies to control access to systems. Maintains the company

  • s firewall. Uses applicable encryption methods. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.

Job duties are varied and complex; independent judgment needed. May have project lead role. Prefer 5 years relevant experience and BA/BS degree.

Job: Information Technology

Location: IN-IN,India-Bengaluru

Other Locations: IN-IN,India-Hyderabad

Job Type: Regular Employee Hire

Organization: Oracle

DirectEmployers