Cleared Threat Hunter (join-Ns2)
OracleWashington-seattleUpdate time: March 6,2021
Job Description

Preferred Qualifications

The Oracle Cloud Infrastructure (OCI) team can provide you the opportunity to build and operate a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment.  OCI is committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world’s biggest challenges. 

We offer unique opportunities for smart, hands-on engineers with the expertise and passion to solve difficult problems in distributed highly available services and virtualized infrastructure.  At every level, our engineers have a significant technical and business impact designing and building innovative new systems to power our customer’s business critical applications.  

 

https://cloud.oracle.com/cloud-infrastructure

 

Our team designs, engineers, and operates the security for our premier cloud services. We are reimagining the traditional enterprise thinking of security and creating an environment suitable for the most demanding and security conscience customers with our new large-scale distributed services. This team is here to protect the customers, protect our cloud and make sure it is best of breed.

 

We are looking for people with experience in threat hunting, determining indicators of compromise (IOCs), incident management, and red team/blue team activities for our IaaS, PaaS and SaaS environments. You will be part of a CSIRT team responsible for the investigation and reporting of product security incidents for all of Oracle cloud. This includes using tools to analyze and respond to threats, creating tools/scripts to aid in analysis, and responding in real time to security events. The position operates and tunes security-supporting tools, provides requirements for new security tools, and creates use cases for additional monitoring scenarios.

 

These are exciting times in our space - we are growing fast, still at an early stage, and working on ambitious new initiatives. An engineer at any level can have significant technical and business impact.

 

This role will be part of the Oracle’s Cloud Security Threat Management team. Multiple levels of experienced roles are available for this posting.

 

Responsibilities

 

  •           Coordinate the CSIRT efforts across multiple business units during response
  •           Perform hunting exercises using threat intelligence, analysis of anomalous log data and results of historical events and data to detect and response to threats
  •           Develop anomaly detection dashboards and reports to identify potential threats, suspicious activity, and intrusions
  •           Monitor for security indicators by correlating and analyzing a variety of application, network and host-based security logs and determining the correct remediation actions and escalation paths for each incident
  •           Assist with the development of processes and procedures to improve security operations functions, incident response times, analysis of incidents, and overall SOC functions
  •           Create repeatable processes for continuous testing and monitoring of IOCs following a proven methodology that you help define
  •           Develop scripts, processes and content to improve detective capabilities
  •           Knowledge of the chain of custody process and properly securing evidence
  •           Research industry trends, identify ongoing security threats, analyze new security testing tools, and provide recommendations on the need and usefulness of services and/or products
  •           Evaluate and recommend new and emerging security solutions and technologies to issues
  •           Effectively communicate security concepts with both technical and non-technical individuals
  •           Provide information regarding intrusion events, security incidents, and other threat indications and warning information to teams and leadership as part of incident response
  •           Deliver self-service security metric data of discovery, triage and trending analysis of team findings
  •           Author post mortem reports to be provided to senior leadership following an intrusion or red team engagement
  •           Participate in Red/Blue/Purple team activities

 

Qualifications

 

  •          Active Top Secret/SCI with Poly Security Clearance
  •           Bachelor’s Degree in Information Assurance, Security, Management Information Systems, Risk Management or equivalent work experience acceptable
  •           2-3+ years of related cybersecurity architecture, engineering, or SOC work experience (monitoring, detection, incident response, forensics)
  •           Ability to write scripts/code using Python, Perl, Powershell, or an equivalent language
  •           Excellent written and verbal communications, including presentation skills, are important to be successful in this role
  •           Proven ability to effectively communicate with all levels of the organization, as well as with external parties
  •           Experience with forensics tools such as X-Ways, F-Response, Volatility and Rekall
  •           Red/Blue team experience turning findings into actionable detections and mitigations
  •           Preferred knowledge of current advanced adversary TTP’s and experience responding to ATP attacks
  •           Understanding of privilege escalation, persistence, and lateral movement techniques
  •           Understanding of host and network Incident Response processes, tasks, and tools
  •           Excellent customer service skills required
  •           Knowledge of operational security tools and practices (e.g. IDS, firewalls, & 3rd-party security products)
  •           Ability to work independently with minimal direction and collaborate effectively with local and remote teams using a customer first mindset and approach
  •           Experience working in a large Cloud or Internet software company preferred.
  •           Be available on an on-call basis to respond to pending issues or problems arising during non-business hours and provide support and response
Responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate security policies and procedures.

Responsible for basic planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures. Assist in development of incident response capabilities, training, and tool validation. May research, evaluate, track, and manage information security threats and vulnerabilities in situations where analysis of well-understood information is required and where computer programming/scripting knowledge is required. May participate in an incident management team, responding to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may assist the Incident Commander during serious incidents. Participates in developing new methods, and playbooks, as well as basic scripts, applications, and tools. Research industry trends and constantly assess current controls and threat posture of new and existing products and services. Recommend and implement new security controls across Oracle’s line of business (LOB). Improve current processes and workflows to minimize manual efforts.

Minimum of 5 years related experience in an information security role, supporting security programs and security engineering/architecture in complex enterprise environments. Hands on experience with enterprise security architecture, engineering and implementation required. Knowledge of compliance program security controls, like ISO 27001, SOC 2, HITRUST, and FedRAMP, as applied to cloud SaaS, PaaS and IaaS operations. Familiarity with SDLC principles and scripting & programming languages (such as Terraform, Python, Ruby, etc.). Preferred but not required qualifications include: Bachelor-level university degree in a relevant field from an accredited university, or equivalent. Experience in developing secure, scalable cloud architectures and distributed systems. Experience with high-level software design and development and the design, use, and deployment of automation and orchestration frameworks. Demonstrable scripting or programming experience.

Oracle is an Affirmative Action-Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability, protected veterans status, age, or any other characteristic protected by law.

Get email alerts for the latest"Cleared Threat Hunter (join-Ns2) jobs in Washington-seattle"