Security Analyst - VA/DC/MD or Seattle
Listed on 2026-02-24
-
IT/Tech
Cybersecurity, Security Manager
Security Analyst 4 - Location must be VA/DC/MD or Seattle
Reston, VA, United States
Seattle, WA, United States
- Job Identification 327029
- Job Category Information Security Engineer
- Job Type Regular Employee
- Does this position require a security clearance? No
- Years 3 to 5+ years
- Applicants Less than 10 applicants
- Additional Info Visa / work permit sponsorship is not available for this position
- Applicants are required to read, write, and speak the following languages English
* Location must be VA/DC/MD or Seattle. For this role, US Citizenship is a requirement due to the US Gov component.
Are you interested in securing a large-scale distributed SaaS environment? Oracle's SaaS Cloud Security team is building new technologies that operate at high scale in our broadly distributed multi‑tenant cloud environment. The SaaS Cloud Security team plays a key role in enabling Oracle's Security vision, minimizing security incident‑based losses and disruptions, facilitating efficient recovery from such incidents, and ensuring the implementation of controls to mitigate associated risk.
SaaS Cloud Security is looking for seasoned security analysts to join our efforts in reshaping the cloud services landscape across industry verticals and solve difficult problems by designing and building innovative new systems to revolutionize the security of Oracle's SaaS portfolio of products.
The SaaS Cloud Security organization is responsible for securing enterprise‑grade software services on behalf of our 25,000 customers, processing over 60 billion transactions per day.
We are building a global team of analysts that can work autonomously to carry out activities in the area of Incident Response to protect Oracle’s SaaS environments. The team collectively covers the breadth and depth of: monitoring for Indicators of Compromise, being up to date with the latest third‑party Threat Intelligence, responding to identified incidents including remediation, evidence collection and forensics.
The team will also support the continual improvement of processes and technology used for maximizing automation of detection and response for SaaS.
Key Responsibilities
- Serve as “Incident Commander” during security events. Driving the event to resolution.
- Perform hands‑on activities including network and host based log analysis, malware analysis and threat hunting.
- Assist with the development of processes and procedures to improve security operations functions, incident response times, analysis of incidents, and overall SOC functions.
- Develop scripts, processes and content to improve and automate response capabilities.
- Research industry trends, identify ongoing security threats, analyze new security testing tools, and provide recommendations on the need and usefulness of services and/or products.
- Evaluate and recommend new and emerging security solutions and technologies to issues.
- Effectively communicate security concepts with both technical and non‑technical individuals.
- Provide information regarding intrusion events, security incidents, and other threat indications and warning information to teams and leadership as part of incident response.
- Deliver self‑service security metric data of discovery, triage and trending analysis of team findings.
- Author security event reports for executive leadership following an intrusion or red team engagement.
- Participate in planning, designing, and executing tabletop exercises cross‑functionally across Oracle for SaaS security incident planning.
- Help define Threat Hunting use cases.
- Participate in Red/Blue team activities.
- 3‑4+ years of related cybersecurity operations, architecture, engineering, SOC work experience (monitoring, incident response, forensics).
- Strong understanding of typical intrusion life cycle, including privilege escalation, persistence, and lateral movement techniques.
- Strong understanding of host and network Incident Response processes, tasks, tools, and industry operational best practices.
- Understanding of MITRE ATT&CK™ knowledge base.
- Strong and hands‑on forensics experience/knowledge on Linux and Windows Operating Systems.
- Coding and automation experience…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).