Oracle IT Security Analyst 4 in Troy, Michigan

Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs.

Researches attempted efforts to compromise security protocols. Maintains security systems for routers and switches. Administers security policies to control access to systems. Maintains the company*s firewall. Uses applicable encryption methods. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.

Job duties are varied and complex; independent judgment needed. May have project lead role. Prefer 5 years relevant experience and BA/BS degree.

Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans status or any other characteristic protected by law.


As part of Global IT sThreat Management team within Risk Management, you will be part of a globalMalware Incident Response team identifying security events and coordinating theresponse for the relevant technical support groups, businesses at risk and servicerecovery teams. As a member of this fast paced team, you will execute controlsto protect the infrastructure and employees against internal and externalmalicious attacks and infiltration.

The security analyst isresponsible to monitor and help maintain the security posture of the Global ITenvironments. These responsibilities include hunting for maliciousactivity not detected via other security controls, correlating that informationwith threat intelligence, leading the incident response related to thosedetections, or figuring out how to mitigate these risks/threats in thefuture.

Using cutting edgenetwork behavior and anomaly detection tools, the analyst will examine,identify, and understand the nature of cyber-threats such as viruses, worms,bots, root kits and Trojan horses. The security analyst will be spending hoursor days looking down rabbit holes that may dead-end only having to start backover from the start. A determined and self-motivated person is a necessity.

In addition, it may benecessary to work directly with employees to collect, analyze and submit virussamples to our vendors, help remediate malware infections and prevent furtherdamage. The analyst will be expected to participate in security projecttasks on an as needed basis, and interact directly with Security organizationsand multiple Lines of Businesses globally.

Executes securitycontrols to prevent hackers from infiltrating company information orjeopardizing e-commerce programs.

Performs both dynamicand static analysis of malware samples to determine source of the malware,additional IOCs, and creating tactics, techniques, and procedures of threatactors.

*DetailedDescription *

Researches attemptedefforts to compromise security protocols and malicious activity. Analyzesmalware using both dynamic and static tools. Attempts to identify gaps indetections of security sensors by implementing latest exploits. Staying currentwith latest threats and risks.

Job Requirements

Leading contributorindividually and as a team member, providing direction and mentoring to others.Work is non-routine and very complex, involving the application of advancedtechnical/business skills in area of specialization. Prefer 8 years relevantexperience and BA/BS degree.

*Additional Details *


Work directlywith end users to identify, isolate and pull malware on the end-points.

Identify,analyze, and document malicious network or system activity and determinesophistication, priority, and threat level of computer security relatedattacks.

Key contributorin various facets of incident response including notification, escalationresponse, and post incident review.

Experiencemanaging, responding to and resolving situations caused by malicious attacks.

Ability toanalyze information to identify network threats such as scans, malware, orcomplex attacks.

Perform analysison logs, traffic flows, and other activities to identify malicious activity.

Enhance existingincident response methods, tools and processes which provide the organizationvalue by reducing risk.

Performs dynamicand static analysis of malware using automated tools or disassembler/debugger.

Contributetowards improving incident response delivery by leveraging lessons learned.


Eight years ITexperience which includes networking, end-point security suites, and 4 years ofIT Security experience

Four yearsexperience in working with SIEM, logs, and other events.

Three years ofsecurity incident response/malware analysis.

Two yearsmalware identification, reversing, and analysis.

Thoroughunderstanding of malware infection vectors, identification and remediationtechniques on multiple operating systems including Windows, OS X, and Linux.

Experience insecurity aspects of multiple platforms, operating systems, software,communications and network protocols or an equivalent combination of educationand work experience.

Ability to workwith huge data sets using command line tools

Capable ofscripting using Python, Perl, Ruby, etc, or programming in general.

Experience inutilizing the Cyber Kill Chain or Attacker Lifecycle phases.

Experience ingathering and managing threat intelligence

Understanding ofnetflows, networking protocols and infrastructure designs; including routing,firewall functionality, host and network intrusion detection systems,encryption, load balancing, and other network infrastructure.

Securityprocesses and technologies including threat analysis, security monitoring andsecurity technologies like IDS/IPS, Malware and DDoS prevention technologies.

Experience in followingincident response procedures and standards, strong communication skills andability to articulate events to senior management.

Extremecapability for network behavior and anomaly detection experience

Excellentcommunication skills, analytical ability, strong judgment and leadershipskills, and the ability to work effectively with IT management and staffs.

Dedicated andself driven desire to research current information security landscape andthreats.

Vulnerabilityscanning, pentesting, and code analysis experience a plus.


CertifiedInformation Systems Security Professional (CISSP) certified/qualified orability to actively work towards obtaining certification.

GIAC CertifiedIncident Handler (GCIH) or demonstrated skills and ability to obtaincertification.

CertifiedEthical Hacker (CEH) or demonstrated skills and ability to obtaincertification.

Job: *Information Technology

Organization: *Oracle

Title: IT Security Analyst 4

Location: United States

Requisition ID: 18000L2E