Recent Searches

You haven't searched anything yet.

33 Security Analyst 2 Jobs in Austin, TX

SET JOB ALERT
Details...
Oracle
Austin, TX | Full Time
$100k-121k (estimate)
2 Months Ago
PIMCO
Austin, TX | Full Time
$91k-115k (estimate)
Just Posted
gtt
Austin, TX | Full Time
$108k-135k (estimate)
5 Days Ago
Apex Systems
Austin, TX | Full Time
$93k-112k (estimate)
4 Days Ago
Electric Power Engineers
Austin, TX | Full Time
$103k-135k (estimate)
1 Month Ago
Oracle
Austin, TX | Full Time
$100k-121k (estimate)
1 Month Ago
Office of the Attorney General of Texas
Austin, TX | Full Time
$82k-100k (estimate)
1 Month Ago
Auctane Careers
Austin, TX | Full Time
$94k-113k (estimate)
2 Months Ago
Dutech Systems
Austin, TX | Full Time
$83k-104k (estimate)
5 Months Ago
Oracle
Austin, TX | Full Time
$76k-95k (estimate)
2 Months Ago
PIMCO Ltd. - Pacific Investment Management Company
Austin, TX | Full Time
$100k-126k (estimate)
1 Day Ago
PIMCO
Austin, TX | Full Time
$100k-126k (estimate)
2 Days Ago
Apex Systems
Austin, TX | Full Time
$64k-77k (estimate)
2 Weeks Ago
Security Analyst 2
Oracle Austin, TX
$100k-121k (estimate)
Full Time | Software & Cloud Computing 2 Months Ago
Save

sadSorry! This job is no longer available. Please explore similar jobs listed on the left.

Oracle is Hiring a Security Analyst 2 Near Austin, TX

Responsibilities:

·Monitoring, triaging, processing, and escalating security events received from multiple services and log sources

·Initial collection of evidence related to escalated security events

·Collection of evidence related to compliance audits

·Validation and regular review of processes and procedures

·Identification, escalation, and follow up on of false positives

·Routine audits of ACL and Security Lists

·Process initial mitigation and containment procedures

·Coordinate with service and operations teams to validate security events and anomalous activity

·Identify and recommend security event suppression, adjustment, modification, and tuning based on daily monitoring

·Document initial triage and escalation of security events and alerts

·Provide daily reports of security events and alerts

·Determine and report on possible cause of security events and alerts

·Operate security tools for continual monitoring and analysis of system/network activity to identify malicious activity

·Assist in the construction of security alerts and processes based on knowledge gained from daily monitoring and triage

·Notify designated managers, and responders of suspected cyber incidents including the event's history, status, and potential impact

·Monitor external data sources to maintain basic knowledge of threat conditions

·Recognize a possible security violation and take appropriate action to escalate the incident, as required

Knowledge

·Basic understanding of:

·Computer networking concepts and protocols, and network security methodologies

·Host/network access control mechanisms

·Intrusion detection methodologies and techniques

·How traffic flows across the network (TCP/IP, OSI, ITIL)

·System and application security threats and vulnerabilities

·Types of network communications (LAN, WAN, MAN, etc)

·File extensions (.zip, .sh, .pcap, .bat, .dll, .py, etc)

·Interpreted and compiled computer languages

·Common attack vectors

·Attack classes (passive, active, insider, distributed, etc)

·Incident response and handling methodologies

·Authentication, authorization, and access control methods

·Information technology (IT) security principles and methods

·Network traffic analysis methods

·Operating systems

·Cyber attackers

·Defense-in-depth principles

·System administration, network, and operating system hardening techniques

·Cyber attack stages

·Network security architecture concepts

·Windows/Unix ports and services

·Operating system command-line tools

·Network protocols

·Running knowledge of cyber threats and vulnerabilities

·Understanding security events related to:

·Operating system (Linux and Windows) logs

·Database logs

·VPN logs

·Knowledge of adversarial tactics, techniques, and procedures

·Understanding the use of the following:

·Network tools (ping, traceroute, nmap, etc)

·Host base tools (Tanium, basic Linux and Windows native tools)

·SIEM (Splunk, ELK, Lumberjack, Splunk Enterprise Security, etc)

·Understanding of cybersecurity and privacy principles and related organizational requirements

Skills

·Detecting host and network based intrusions via intrusion detection technologies

·Using protocol analyzers

·Recognizing and categorizing types of vulnerabilities and associated attacks

·Reading and interpreting signatures

·Conducting trend analysis

·Evaluating information for reliability, validity, and relevance

·Identifying cyber threats which may jeopardize organization and/or partner interests

·Preparing and presenting briefings

·Providing analysis to aid writing phased after action reports

·Using Boolean operators to construct simple and complex queries

·Using multiple analytic tools, databases, and techniques

·Using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches

·Utilizing virtual collaborative workspaces and/or tools (Zoom, JIRA, Confluence, Oradocs, Slack, etc)

·Performing packet-level analysis

·Utilizing a SIEM to detect, research, and perform initial triage of security events

·Exercising good judgement in escalating security events

Abilities

·Think critically

·Ability to think like threat actors

·Apply techniques for detecting host and network-based intrusions using intrusion detection technologies

·Interpret the information collected by network tools

·Recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists

·Effectively collaborate with virtual and remote teams

·Evaluate information for reliability, validity, and relevance

·Exercise judgment when policies are not well-defined

·Function effectively in a dynamic, fast-paced environment

·Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts, both internal and external to the organization, to leverage analytical and technical expertise

·Recognize and mitigate cognitive biases which may affect analysis.

Other Requirements and Expectations

·Other tasks and duties as assigned

·Work effectively within a remote team including effective, constant, and collaborative communication with all members of the NSGBU SOC

Job Summary

JOB TYPE

Full Time

INDUSTRY

Software & Cloud Computing

SALARY

$100k-121k (estimate)

POST DATE

02/10/2024

EXPIRATION DATE

04/08/2024

WEBSITE

oracle.com

HEADQUARTERS

DALLAS, TX

SIZE

>50,000

FOUNDED

1977

TYPE

Private

CEO

SARAH SMITH

REVENUE

$10B - $50B

INDUSTRY

Software & Cloud Computing

Related Companies
About Oracle

NetSuite develops a cloud-based platform that offers enterprise resource planning and e-commerce services to enterprises.

Show more

Oracle
Full Time
$98k-118k (estimate)
Just Posted
Oracle
Full Time
$90k-118k (estimate)
Just Posted
Oracle
Intern
$82k-100k (estimate)
Just Posted

The job skills required for Security Analyst 2 include Cybersecurity, Analysis, IT Security, Incident Response, SIEM, Linux, etc. Having related job skills and expertise will give you an advantage when applying to be a Security Analyst 2. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Security Analyst 2. Select any job title you are interested in and start to search job requirements.

For the skill of  Cybersecurity
Fidelity Technology Group, LLC
Full Time
$92k-116k (estimate)
1 Month Ago
For the skill of  Analysis
Allcat Claims Service
Remote | Full Time
$59k-73k (estimate)
Just Posted
For the skill of  IT Security
Apex Systems
Full Time
$64k-77k (estimate)
2 Weeks Ago
Show more

The following is the career advancement route for Security Analyst 2 positions, which can be used as a reference in future career path planning. As a Security Analyst 2, it can be promoted into senior positions as an Information Security Analyst IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Security Analyst 2. You can explore the career advancement for a Security Analyst 2 below and select your interested title to get hiring information.

Auctane Careers
Full Time
$94k-113k (estimate)
2 Months Ago
Dutech Systems
Full Time
$83k-104k (estimate)
5 Months Ago
Oracle
Full Time
$76k-95k (estimate)
2 Months Ago