The Oracle Cloud Infrastructure (OCI) builds and operates a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. OCI is committed to providing the best cloud products and services that enables our customers to be successful. We offer unique opportunities for smart, hands-on folks to grow OCI business using data, solve difficult problems across distributed highly available services and virtualized infrastructure.
As a key player in safeguarding our enterprise and cloud environments, you will be responsible for performing in-depth investigations and responding to a variety of security incidents across the organization. This is your chance to make a significant impact, enhance your expertise, and be a part of a 4 on-3 off 24/7 team that is committed to excellence and innovation. Join us and be a key player in protecting and securing the future of cloud technology and healthcare solutions. If you have a knack for analyzing complex security issues and thrive in a fast-paced environment, we want you on our team!
Basic Qualifications
- U.S. Citizenship on U.S. soil is required. This position requires you to be eligible to receive a federal security clearance which requires you to be a U.S. Citizen.
- Bachelor of Science degree in Computer Science, Computer Engineering, Software Engineering, Computer Information Systems, Information Systems, Information Technology or related field, or equivalent, relevant work experience
- A passion for cybersecurity and a continuous desire to learn.
- Effective communication skills for both written and verbal reports.
Preferred Qualifications
- Examine technical artifacts such as scripts, compiled malware, infrastructure relationships, and domain name structures.
- Prior experience in security-specific roles with strong analytic skills.
- Familiarity with a range of security tools including SIEM, EDR, AV, scan tools, forensic collection, processing, and analysis tools.
- Working knowledge of operating systems including Windows, Mac, and Linux.
- Experience with incident management is a plus.
- Working knowledge of the MITRE ATT&CK framework.
- Operate effectively in a remote setting, using technology and time management practices to maintain productivity.