Job Posting Date: July 11, 2017 Requisition #: 54060645-E06 Job Category: Information Technology Job Level: Individual Contributor Employment Type: Management Business Unit: Information Technology and Supply Chain Schedule: Full-time City: Concord
Based in San Francisco, Pacific Gas and Electric Company, a subsidiary of PG&E Corporation (NYSE:PCG), is one of the largest combined natural gas and electric utilities in the United States. And wedeliver some of the nation’s cleanest energy to our customers in Northern and Central California. For PG&E, ‘Together, Building a Better California’ is not just a slogan. It’s the very core of our mission and the scale by which we measure our success. We knowthat the nearly 16 million people who do business with our company count on our more than 24,000 employees for far more than the delivery of utility services. They, along with every citizen of the state we call home, also expect PG&E to help improve theirquality of life, the economic vitality of their communities, and the prospect for a better future fueled by clean, safe, reliable and affordable energy.
Pacific Gas and Electric Company is an Affirmative Action and Equal Employment Opportunity employerthat actively pursues and hires a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, sex, age, religion, physical or mental disability status, medical condition, protectedveteran status, marital status, pregnancy, sexual orientation, gender, gender identity, gender expression, genetic information or any other factor that is not related to the job.
Pacific Gas and Electric Company, a subsidiary ofPG&E Corporation (NYSE:PCG), is one of the largest combined natural gas and electric utilities in the United States. Based in San Francisco, with 23,000 employees, the company delivers some of the nation’s cleanest energy to 16 million people in Northern andCentral California. Pacific Gas and Electric Company is an AA/EEO employer that actively pursues and hires a diverse workforce.
The Cybersecurity function is led by PG&E’s Vice President – Chief Information Security Officer and is responsible forcybersecurity and risk management across the organization.
The Security Intelligence and Operations Center (SIOC) is responsible for ensuring that PG&E proactively identifies and assesses threats to its network and data, monitors its network formalicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.
This is a challenging and fast paced position in PG&E’s SecurityIntelligence and Operations Center (SIOC) which is responsible for detecting, analyzing and responding to any suspicious cyber security activity across PG&E’s business and operational networks. The SOC is a critical team within PG&E’s broader InformationSecurity team which is led by PG&E’s Vice President – Chief Information Security Officer.
This position is for the following shift: Monday- Friday night shift: 10:00 p.m. – 6:30 a.m. PST
MinimumQualifications * Bachelor’s degree in Computer Science or related field, or equivalent work experience * Formal IT Security/Network Certification such as CompTIA Security +, Cisco CCNA, SANS GIAC Certified Intrusion Analyst (GCIA) * 6 years ofInformation Technology experience, with at least 4 years of experience in information security working within security operations, security intelligence or equivalent functions * Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT),Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC) experience * Candidate must have familiarity with regulatory requirements, such as NERC/CIP, NIST SP 800, SOX, etc
Desired: * Deep knowledge of TCP/IPNetworking and knowledge of the OSI model * Deep knowledge of OS management and Network Devices * Deep knowledge of Intrusion Detection/Prevention Systems * Deep knowledge of Antivirus Systems * Significant experience monitoring threats via aSIEM console * Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs * Excellent problem solving, critical thinking, andanalytical skills – ability to de-construct problems * Strong customer service skills and decision-making skills * Significant experience with packet analysis (Wireshark) and Malware analysis preferred * Working knowledge of PG&E infrastructurepreferred * IBM QRadar and Dell SecureWorks experience preferred * Utility Industry experience * Experience with scripting in Perl/Python/Ruby * Experience with both desktop-based and server-based forensics * Reverse engineering skills * Strong sense of professionalism and ethics. * Acts with integrity and communicates honestly and openly * Ability to build rapport and cooperation among teams and internal stakeholders * Respects others and demonstrates fair treatment to all *Methodical and detail oriented * Self motivated * Actively seeks to enhance the group through the sharing of knowledge
* Perform hunting for malicious activity across the network and digital assets * Respond tocomputer security incidents and conduct threat analysis * Identify and act on malicious or anomalous activity * Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network * Perform detailedinvestigation and response activities for potential security incidents * Provide accurate and priority driven analysis on cyber activity/threats * Perform payload analysis of packets * Detonate malware to assist with threat research *Recommends implementation of counter-measures or mitigating controls * Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment *Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity * Develop innovative monitoring and detection solutions using PG&E tools and other skillsets suchas scripting * Mentor junior staff in cybersecurity techniques and processes * Create and continuously improve standard operating procedures used by the SOC * Resolve or coordinate the resolution of cyber security events * Monitor incoming eventqueues for potential security incidents * Create, manage, and dispatch incident tickets * Monitor external event sources for security intelligence and actionable incidents * Maintain incident logs with relevant activity * Documentinvestigation results, ensuring relevant details are passed to senior analysts and stakeholders * Participate in root cause analysis or lessons learned sessions * Write technical articles for knowledge sharing * Establish and maintain excellentworking relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units