Key Responsibilities
Incident Handling & Investigation
Serve as first-line and mid-tier incident handler for security events impacting Oracles infrastructure applications or customers.
Perform triage scoping and evidence collection in alignment with Oracles Incident Response Standard & Plan.
Analyze logs alerts and telemetry from SIEM SOAR and endpoint tools to determine impact root cause and containment strategies.
Collaborate with Oracle Cloud Infrastructure (OCI) product security and LoB SOC teams to coordinate response actions.
Document findings timeline and technical artifacts in accordance with Oracles legal and compliance requirements.
Incident Management Support
Support the Incident Commander and Director of Incident Response in orchestrating enterprise-wide security event response.
In designated cases serve as acting Incident Managercoordinating cross-functional calls tracking workstreams and ensuring timely communication and escalation.
Draft and maintain incident situation reports (SITREPs) and executive summaries to ensure leadership visibility throughout events.
Track incident metrics lessons learned and corrective actions to drive continuous improvement of the IRF.
Crisis Readiness & Simulation
Participate in and help facilitate tabletop exercises simulation drills and readiness assessments.
Maintain proficiency with Oracles IR tools playbooks and escalation procedures.
Provide feedback on playbook optimization tooling integration and process automation.
Cross-Functional Collaboration
Partner with Legal Security Communications Privacy and Product Security to ensure coordinated response and aligned narratives.
Work with the Customer Trust teams to support accurate and timely reporting and attestations when customer or regulatory impact is identified.
Support the ICC mission to ensure consistent transparent and unified response across all Lines of Business.
Qualifications
6-10 years of experience in cybersecurity operations incident response or threat analysis.
Demonstrated experience investigating and containing cybersecurity incidents in enterprise or cloud environments.
Familiarity with log analysis forensics malware triage and threat intelligence tools and workflows.
Understanding of cloud architectures (OCI AWS Azure or GCP) and modern attack vectors.
Strong communication and documentation skills with ability to summarize complex technical issues clearly for executive audiences.
Calm and structured approach to crisis management; capable of maintaining composure and precision under pressure.
Preferred Qualifications
Bachelors degree in Cybersecurity Computer Science or related field.
Certifications such as GCIH GCFA CEH or CISSP preferred.
Experience in large-scale or federated enterprise environments.
Familiarity with legal privacy or regulatory aspects of incident management (e.g. GDPR SEC HIPAA NIS2).
Responsible for advanced planning design and build of security systems applications environments and architectures; oversees the implementation of security systems applications environments and architectures and ensures compliance with information security standards and corporate security policies and procedures.
Provides technical advice and direction to support the design and development of secure architectures.
May participate in an incident management team bringing advanced-level skills to respond to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches and oversees root cause analysis. Coordinates incidents with other business units and may act as Incident Commander of serious incidents. Develops new methods and playbooks as well as sophisticated scripts applications and tools and trains others in their use.
May participate in an incident management team responding to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches and oversees root cause analysis. Coordinates incidents with other business units and may act as incident commander of serious incidents. Participates in developing new methods playbooks throughout Oracle.
Evaluates existing and proposed technical architectures for security risk provides technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment risk assessment and threat modeling.
Brings advanced-level skills to research evaluate track and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required and where computer programming/scripting knowledge is required.
Work with Senior management to develop and implement a multi-year security roadmap
Focus on operational and strategic level tasks and provide counsel and guidance to the junior level security operations engineers in the department.
Career Level - IC4
Required Experience:
Staff IC
As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when eve ... View more