Full Job DescriptionDevelops and executes programs and processes to reduce information security risk and strengthen Oracle’s security posture.
Job Description
Oracle is seeking a Principal security analyst to support systems and security operations of Database Engineering infrastructure. The position requires a proven track record in designing, implementing, and managing Public Cloud infrastructure, security architecture, vulnerability management, and internal security auditing and reporting. Security analysts are also responsible for keeping the company’s security systems up to date and creating documentation and planning for all security-related information, including incident response and disaster recovery plans. The position involves close collaboration with other teams to achieve collective security goals.
Responsibilities
Implementation of various aspects of architecture practices: business, application, data, security, infrastructure and governance, Logging/Monitoring aspects, Authorization
Coordinate Security and IT teams in analysis and implementation of security requirements in delivery projects.
Ability to analyze stakeholder requirements and convert them into secure and scalable Secure cloud solutions.
Review application architectures and implementation details for design flaws, incorrect security implementation, and missing security controls.
Drive and lead security processes, tools, methods, and knowledge, and security enhancements
Create threat models to communicate risks to engineers, project managers, and other technical teams.
Build out a new security control catalog, security policies, and procedures and assist in enforcing them.
Design and develop cloud security architectures and perform architecture design reviews
Use Static and Dynamic Analysis tools to support broad testing and vulnerability discovery in the CI/CD pipeline.
Conduct security assessments through vulnerability testing and risk analysis
Coordinate with Corporate Security teams and System Owners to ensure Corporate Security standards implemented
Perform security audit and risk assessment and generate reports of the security posture of systems
Build automation using Python/Ruby/Terraform/Ansible /Oracle Apex
Drive innovation and integration of new technologies into projects and activities
Provide domain-specific expertise, overall security leadership, and perspective to cross-organization projects, programs, and activities
Willing to learn new technologies and products
Knowledge, Skills
Experience in partnering with stakeholders companywide to establish, implement and maintain information security and reducing risk.
Experience in performing risk assessments and gap analysis, managing associated remediation plans
Knowledge of information security solutions including data loss prevention, intrusion detection and prevention, network security, and vulnerability management
In-depth knowledge of IT infrastructure systems
Experience in Business continuity programs (BCP) and Disaster Recovery (DR)
Knowledge of current and emerging security technologies
Excellent project management and planning skills
Experience in analyzing security system logs, security tools, and data.
Professional experience developing and implementing new security systems, security programs, protocols, and maintenance of existing systems
Experience in Public Cloud infrastructure management (OCI/AWS/AZURE/GCP)
Specialized knowledge and experience in Public Cloud Security Architecture (OCI/AWS/AZURE/GCP)
Excellent project management and planning skills
Strong automation skills in Python/Terraform/Ansible
Excellent communication skills via phone and email in English
Knowledge of PLSQL and Oracle Apex is desirable.
Qualifications required
6 to 10 years of experience in IT / Infrastructure Operations
4+ years successfully architecting and implementing DevOps/SRE/DevSecOps and security on public clouds (OCI/AWS/AZURE/GCP ).
4 to 8 Years of Security Operations
Security certifications/training (CISSP, ISM)
Bachelor’s degree in computer science, Computer Engineering, Software Engineering, or related areas is preferable.
Develops and executes programs and processes to reduce information security risk and strengthen Oracle’s security posture.
Supports the strengthening of Oracle’s security posture, focusing on one or more of the following: risk management; regulatory compliance; threat and vulnerability management; incident management and response; security policy development and enforcement; privacy; information security education, training and awareness (ISETA); digital forensics and similar focus areas.
Risk Management: Brings advanced level skills to assess the information security risk associated with existing and proposed business operational programs, systems, applications, practices and procedures in very complex, business-critical environments. May conduct and document very complex information security risk assessments. May assist in the creation and implementation of security solutions and programs.
Regulatory Compliance: Brings advanced level skills to manage programs to establish, document and track compliance to industry and government standards and regulations, e.g. ISO-27001, PCI-DSS, HIPAA, FedRAMP, GDPR, etc. Researches and interprets current and pending governmental laws and regulations, industry standards and customer and vendor contracts to communicate compliance requirements to the business. Participates in industry forums monitoring developments in regulatory compliance.
Threat and Vulnerability Management: Brings advanced level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required.
Incident Management and response: Brings advanced level skills to respond to security events, identifying possible intrusions and responding in line with Oracle incident response playbooks. May operate as Incident Commander on serious incidents.
Digital Forensics: Brings advanced level skills to conduct data collection, preservation and forensic analysis of digital media independently, where an advanced understanding of forensic techniques is required.
Other areas of focus may include duties providing advanced level skills and knowledge to manage Information Security Education, Training and Awareness programs. In a Corporate Security role, may manage the creation, review and approval of corporate information security policies.
Mentors and trains other team members.
Compiles information and reports for management.
Minimum of 8 years experience in information systems, business operations, or related fields, at least 5 years of which must be from at least one of the following: Information security risk management; information security program management; Industry/Government security compliance program management (ISO-27001, GDPR, HIPAA, FedRamp, etc.); threat and vulnerability management; incident management and response; security policy development and enforcement; privacy, information security education, training and awareness (ISETA), information security solutions development, etc. required.
Strong knowledge of: Cloud architecture and security principles. Risk Management Frameworks. *nix and Windows system administration.
Experience with: Logging and log analysis. Identity management principles and technology.
Preferred but not required qualifications include: Bachelor-level university degree in a relevant field from an accredited university, or equivalent. CISSP, CISM, CISA, CIPP or other equivalent certification. Comprehensive knowledge of security design for networks, databases, infrastructure, and cloud computing. Experience writing security incident and vulnerability reports for leadership and other stakeholders. Ability to effectively communicate and influence secure product and network design in a collaborative environment. Comprehensive knowledge of digital forensics. Strong knowledge of web technologies, middleware, database, OS, firewalls, network communication protocols and methods. Knowledge of encryption technologies and architectures. Expert level experience in evaluating and assessing security threats across a variety of environments and industries. Expert level understanding of secure networking principles, routers, switches and load balancers.
Innovation starts with inclusion at Oracle. We are committed to creating a workplace where all kinds of people can be themselves and do their best work. It’s when everyone’s voice is heard and valued, that we are inspired to go beyond what’s been done before. That’s why we need people with diverse backgrounds, beliefs, and abilities to help us create the future, and are proud to be an affirmative-action equal opportunity employer.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans status, age, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.