Cleared Threat Intel Investigator
OracleAustralia-canberraUpdate time: March 22,2022
Job Description

The OCI Threat Intelligence Center is responsible for the tracking and monitoring of a range of threat actors from cybercrime to Advanced Persistent Threat (APT) groups impacting OCI and its customers. The scope and responsibility of this team includes attack analysis, tracking threat actor's indicators of compromise (IOCs) and their tactics, techniques, and procedures (TTPs), aiding in security incident response, executive communication, and customer outreach.

 

As a Threat Intelligence Investigator, you will primarily focus on the day-to-day actions of threat actors that are of most significant value to our public sector partners. You will be responsible for tracking numerous groups independently and lead operational activities when situations present themselves. You will engage directly with public-sector customers and be responsible for maintaining those relationships and producing deliverables upon request. You will also have a passion for cyber security, researching and remaining current on attack trends, and ability to adapt to an organic and fast paced environment is a must. 

 

The position is a security designated role. The candidate will be an Australian Citizen able to hold and maintain a Top Secret Positive Vetted Clearance.

Key Responsibilities


- Lead collection and analysis efforts of suspected advanced persistent threat campaigns across the OCI ecosystem, develop remediation plans, and drive incidents to resolution and attribution.
- Manage various communication streams including cross company and executive communications
- Work supporting Oracle Australia National Security, Corporate Affairs, and other key stakeholders on various key initiatives

- Keep up-to-date on geopolitical issues across the world and be able to translate them into potential and future cyber incidents involving Oracle and its ecosystem

- Be an advocate for the needs of customers and help change scope and direction of Threat Intelligence program when necessitated.
- Develop and maintain threat intelligence procedures and runbooks.

- Ingratiate into the larger Threat Intelligence community to create and maintain trust networks.


Preferred Qualifications


- 4-6 years of industry experience performing analytical and operational work and case management against advanced threats. Have worked at least 3-4 different APT groups across at least two different regions in the world.

- Experience in one or more of the following fields of work: National security, military, federal intelligence, law enforcement, criminology, and/or foreign areas and language
- A broad background in information security with experience in security operations, vulnerabilities and exploitation, network security, and cloud security. 

- Experience with variety of operating systems and threats that target them including Windows, UNIX/LINUX, and MacOS

- Experience performing open source research on a variety of topics
- Excellent verbal/non-verbal communication skills with proficient ability to deliver technical information to non-technical staff
- Previous Incident Response, Security Operations Center, and/or Forensic Analyst experience preferred
- Previous experience with malware analysis and/or reverse engineering capabilities highly desired
- Knowledge of common attack types/vectors and associated mitigations. 

- Knowledge of how to use structured queries to pull data from logs and be able to formulate signatures such as ability to use YARA, Snort, Suricata, Bro/Zeek successfully 

- BS or MS degree in Computer Science, Computer Engineering, Information Systems, Cyber Security, or equivalent experience

- Prior experience working on a global security team is a plus in industry or government

Responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate security policies and procedures.

Responsible for advanced planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures. Provides technical advice and direction to support the design and development of secure architectures. May participate in an incident management team, bringing advanced-level skills to respond to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as Incident Commander of serious incidents. Develops new methods, and playbooks, as well as sophisticated scripts, applications, and tools, and trains others in their use. May participate in an incident management team, responding to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as incident commander of serious incidents. Participates in developing new methods, playbooks throughout Oracle. Evaluates existing and proposed technical architectures for security risk, provides technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment, risk assessment, and threat modeling. Brings advanced-level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required, and where computer programming/scripting knowledge is required. Work with Senior management to develop and implement a multi-year security roadmap Focus on operational and strategic level tasks, and provide counsel and guidance to the junior level security operations engineers in the department.

Minimum of 8 years related experience in an information security role supporting security programs and security engineering/architecture in complex enterprise environments. Hands on experience with enterprise security architecture, engineering and implementation required. Knowledge of compliance program security controls, like ISO 27001, SOC 2, HITRUST, and FedRAMP, as applied to cloud SaaS, PaaS and IaaS operations. Familiarity with SDLC principles and scripting & programming languages (such as Terraform, Python, and Ruby). Strong knowledge of: Cloud architecture and security principles. Risk Management Frameworks. *nix and Windows system administration. Experience with: Logging and log analysis. Identity management principles and technology. Preferred but not required qualifications include: Bachelor-level university degree in a relevant field from an accredited university, or equivalent. Strong knowledge of web technologies, middleware, database, OS, firewalls, network communication protocols and methods. Knowledge of database security principles. Knowledge of encryption technologies and architectures. Expert level experience in evaluating and assessing security threats across a variety of environments and industries. Expert level understanding of secure networking principles, routers, switches and load balancers.

Get email alerts for the latest"Cleared Threat Intel Investigator jobs in Australia-canberra"