Principal SOC Engineer
OracleEs-spainUpdate time: April 7,2022
Job Description
The Principal SOC Engineer Role is tasked with monitoring our security tools, performing triage and investigation of notable events, and executing our processes. This role will also be responsible for contributing to the SOC Security Tools and Detections roadmaps, and will collaborate with the SOC Management team and external teams on key initiatives.
Responsibilities:
- Monitoring, triaging, processing, and escalating security events received from multiple services and log sources
- Initial collection of evidence related to escalated security events
- Collection of evidence related to compliance audits
- Validation and regular review of processes and procedures
- Identification, escalation, and follow up on of false positives
- Routine audits of ACL and Security Lists
- Process initial mitigation and containment procedures
- Coordinate with service and operations teams to validate security events and anomalous activity
- Identify and recommend security event suppression, adjustment, modification, and tuning based on daily monitoring
- Document initial triage and escalation of security events and alerts
- Provide daily reports of security events and alerts
- Determine and report on possible cause of security events and alerts
- Operate security tools for continual monitoring and analysis of system/network activity to identify malicious activity
- Assist in the construction of security alerts and processes based on knowledge gained from daily monitoring and triage
- Notify designated managers, and responders of suspected cyber incidents including the event's history, status, and potential impact
- Monitor external data sources to maintain basic knowledge of threat conditions
- Recognize a possible security violation and take appropriate action to escalate the incident, as required
- Leverage various frameworks to develop detections and dashboards (MITRE ATT&CK, CYBER KILL CHAIN, etc)
- Support Responders with investigations as needed
- Coordinate with the Response and Penetration Test teams to construct and implement detections based on new or observed threats within the environments
- Collaborate with Data Engineering and Response in the tuning of detections and baseline logs to improve alerting and dashboards to distinguish alerts from benign activity
- Identify and analyze anomalies in our infrastructure and applications logs
Knowledge
- Solid understanding of:
- Computer networking concepts and protocols, and network security methodologies
- Host/network access control mechanisms
- Intrusion detection methodologies and techniques
- How traffic flows across the network (TCP/IP, OSI, ITIL)
- System and application security threats and vulnerabilities
- Types of network communications (LAN, WAN, MAN, etc)
- File extensions (.zip, .sh, .pcap, .bat, .dll, .py, etc)
- Interpreted and compiled computer languages
- Common attack vectors
- Attack classes (passive, active, insider, distributed, etc)
- Incident response and handling methodologies
- Authentication, authorization, and access control methods
- Information technology (IT) security principles and methods
- Network traffic analysis methods
- Operating systems
- Cyber attackers
- Defense-in-depth principles
- System administration, network, and operating system hardening techniques
- Cyber attack stages
- Network security architecture concepts
- Windows/Unix ports and services
- Operating system command-line tools
- Network protocols
- Running knowledge of cyber threats and vulnerabilities
- Understanding security events related to:
- Operating system (Linux and Windows) logs
- Database logs
- VPN logs
- Knowledge of adversarial tactics, techniques, and procedures
- Understanding the use of the following:
- Network tools (ping, traceroute, nmap, etc)
- Host base tools (Tanium, basic Linux and Windows native tools)
- SIEM (Splunk, ELK, Lumberjack, Splunk Enterprise Security, etc)
- Understanding of cybersecurity and privacy principles and related organizational requirements
Skills
- Detecting host and network based intrusions via intrusion detection technologies
- Using protocol analyzers
- Recognizing and categorizing types of vulnerabilities and associated attacks
- Reading and interpreting signatures
- Conducting trend analysis
- Evaluating information for reliability, validity, and relevance
- Identifying cyber threats which may jeopardize organization and/or partner interests
- Preparing and presenting briefings
- Providing analysis to aid writing phased after action reports
- Using Boolean operators to construct simple and complex queries
- Using multiple analytic tools, databases, and techniques
- Using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches
- Utilizing virtual collaborative workspaces and/or tools (Zoom, JIRA, Confluence, Oradocs, Slack, etc)
- Performing packet-level analysis
- Utilizing a SIEM to detect, research, and perform initial triage of security events
- Exercising good judgement in escalating security events
Abilities
- Think critically
- Ability to think like threat actors
- Apply techniques for detecting host and network-based intrusions using intrusion detection technologies
- Interpret the information collected by network tools
- Recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists
- Effectively collaborate with virtual and remote teams
- Evaluate information for reliability, validity, and relevance
- Exercise judgment when policies are not well-defined
- Function effectively in a dynamic, fast-paced environment
- Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts, both internal and external to the organization, to leverage analytical and technical expertise
- Recognize and mitigate cognitive biases which may affect analysis.
Other Requirements and Expectations
- Other tasks and duties as assigned
- Work effectively within a remote team including effective, constant, and collaborative communication with all members of the NSGBU SOC
Responsible for advanced planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures. Provides technical advice and direction to support the design and development of secure architectures. May participate in an incident management team, bringing advanced-level skills to respond to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as Incident Commander of serious incidents. Develops new methods, and playbooks, as well as sophisticated scripts, applications, and tools, and trains others in their use. May participate in an incident management team, responding to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as incident commander of serious incidents. Participates in developing new methods, playbooks throughout Oracle. Evaluates existing and proposed technical architectures for security risk, provides technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment, risk assessment, and threat modeling. Brings advanced-level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required, and where computer programming/scripting knowledge is required. Work with Senior management to develop and implement a multi-year security roadmap Focus on operational and strategic level tasks, and provide counsel and guidance to the junior level security operations engineers in the department.
Minimum of 8 years related experience in an information security role supporting security programs and security engineering/architecture in complex enterprise environments. Hands on experience with enterprise security architecture, engineering and implementation required. Knowledge of compliance program security controls, like ISO 27001, SOC 2, HITRUST, and FedRAMP, as applied to cloud SaaS, PaaS and IaaS operations. Familiarity with SDLC principles and scripting & programming languages (such as Terraform, Python, and Ruby). Strong knowledge of: Cloud architecture and security principles. Risk Management Frameworks. *nix and Windows system administration. Experience with: Logging and log analysis. Identity management principles and technology. Preferred but not required qualifications include: Bachelor-level university degree in a relevant field from an accredited university, or equivalent. Strong knowledge of web technologies, middleware, database, OS, firewalls, network communication protocols and methods. Knowledge of database security principles. Knowledge of encryption technologies and architectures. Expert level experience in evaluating and assessing security threats across a variety of environments and industries. Expert level understanding of secure networking principles, routers, switches and load balancers.
As part of Oracle's employment process candidates will be required to successfully complete a pre-employment screening process. This will involve identity and employment verification, professional references, education verification and professional qualifications and memberships (if applicable).
Get email alerts for the latest"Principal SOC Engineer jobs in Es-spain"
