Shire Veteran Jobs

Job Information

Oracle Senior SOC Data Engineer in BRNO, Czech Republic

Job Description

Responsibilities:

  • Validation and regular review of processes and procedures

  • Support and develop our security tools including Splunk ES, Tanium etc

  • Coordinate with service and operations teams to validate security events and anomalous activity

  • Identify and recommend security event suppression, adjustment, modification, and tuning based on daily monitoring

  • Operate security tools for continual monitoring and analysis of system/network activity to identify malicious activity

  • Assist in the construction of security alerts and processes based on knowledge gained from daily monitoring and triage

  • Monitor external data sources to maintain basic knowledge of threat conditions

  • Leverage various frameworks to develop detections and dashboards (MITRE ATT&CK, CYBER KILL CHAIN, etc)

  • Support Responders with investigations as needed

  • Coordinate with the Response and Penetration Test teams to construct and implement detections based on new or observed threats within the environments

  • Identify and analyze anomalies in our infrastructure and applications logs

Knowledge

  • Solid understanding of:

  • SIEM and Data engineering

  • Computer networking concepts and protocols, and network security methodologies

  • Host/network access control mechanisms

  • Intrusion detection methodologies and techniques

  • How traffic flows across the network (TCP/IP, OSI, ITIL)

  • System and application security threats and vulnerabilities

  • Types of network communications (LAN, WAN, MAN, etc)

  • File extensions (.zip, .sh, .pcap, .bat, .dll, .py, etc)

  • Interpreted and compiled computer languages

  • Common attack vectors

  • Attack classes (passive, active, insider, distributed, etc)

  • Incident response and handling methodologies

  • Authentication, authorization, and access control methods

  • Information technology (IT) security principles and methods

  • Network traffic analysis methods

  • Operating systems

  • Cyber attackers

  • Defense-in-depth principles

  • System administration, network, and operating system hardening techniques

  • Cyber attack stages

  • Network security architecture concepts

  • Windows/Unix ports and services

  • Operating system command-line tools

  • Network protocols

  • Running knowledge of cyber threats and vulnerabilities

  • Understanding security events related to:

  • Operating system (Linux and Windows) logs

  • Database logs

  • VPN logs

  • Knowledge of adversarial tactics, techniques, and procedures

  • Understanding the use of the following:

  • Network tools (ping, traceroute, nmap, etc)

  • Host base tools (Tanium, basic Linux and Windows native tools)

  • SIEM (Splunk, ELK, Lumberjack, Splunk Enterprise Security, etc)

Skills

  • SIEM and Data engineering

  • Recognizing and categorizing types of vulnerabilities and associated attacks

  • Evaluating information for reliability, validity, and relevance

  • Identifying cyber threats which may jeopardize organization and/or partner interests

  • Preparing and presenting briefings

  • Using Boolean operators to construct simple and complex queries

  • Using multiple analytic tools, databases, and techniques

  • Utilizing a SIEM to detect, research, and perform initial triage of security events

  • Exercising good judgement in escalating security events

Abilities

  • Think critically

  • Ability to think like threat actors

  • Apply techniques for detecting host and network-based intrusions using intrusion detection technologies

  • Interpret the information collected by network tools

  • Recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists

  • Effectively collaborate with virtual and remote teams

  • Evaluate information for reliability, validity, and relevance

  • Exercise judgment when policies are not well-defined

  • Function effectively in a dynamic, fast-paced environment

  • Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts, both internal and external to the organization, to leverage analytical and technical expertise

Career Level - IC3

Responsibilities

Responsible for basic planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures.

Assist in development of incident response capabilities, training, and tool validation.

May research, evaluate, track, and manage information security threats and vulnerabilities in situations where analysis of well-understood information is required and where computer programming/scripting knowledge is required.

May participate in an incident management team, responding to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may assist the Incident Commander during serious incidents. Participates in developing new methods, and playbooks, as well as basic scripts, applications, and tools.

Research industry trends and constantly assess current controls and threat posture of new and existing products and services.

Recommend and implement new security controls across Oracle’s line of business (LOB).

Improve current processes and workflows to minimize manual efforts.

About Us

As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s problems. True innovation starts with diverse perspectives and various abilities and backgrounds.

When everyone’s voice is heard, we’re inspired to go beyond what’s been done before. It’s why we’re committed to expanding our inclusive workforce that promotes diverse insights and perspectives.

We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity.

Oracle careers open the door to global opportunities where work-life balance flourishes. We offer a highly competitive suite of employee benefits designed on the principles of parity and consistency. We put our people first with flexible medical, life insurance and retirement options. We also encourage employees to give back to their communities through our volunteer programs.

We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by calling +1 888 404 2494, option one.

Disclaimer:

Oracle is an Equal Employment Opportunity Employer*. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.

* Which includes being a United States Affirmative Action Employer

DirectEmployers