Share this Job

Expert Threat Intelligence Analyst

Concord, CA, US, 94518

Requisition ID # 30378 

Job Category : Information Technology 

Job Level : Individual Contributor

Business Unit: Customer Care

Job Location : Concord

Department Overview

The Cybersecurity function is led by PG&E’s Chief Information Security Officer and is responsible for cybersecurity and risk management across the organization.

 

The Security Intelligence and Operations Center (SIOC) is responsible for ensuring that PG&E proactively identifies and assesses threats to its network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.

 

Position Summary

This is a challenging and fast passed position in PG&E’s Security Intelligence and Operations Center (SIOC) which is responsible for detecting, analyzing and responding to any suspicious cyber security activity across PG&E's business and operational networks as well as actor and campaign attribution, metrics collection, intelligence collection and distribution. 

 

Qualification:

 

Minimum: 

  • Bachelor’s degree in Cybersecurity, Intelligence, or a related field or equivalent work experience; or a combination of education, training, and relevant work experience.
  • 6 years of Technical Intelligence, Information Technology or USG Science and Technology experience, to include experience in technical security working with network or endpoint threat tools, technical analysis tools, security operations, or equivalent functions

 
Desired: 

  • Bachelors Degree in Computer Science or job-related discipline
  • Government intelligence community
  • Experience in the utility industry                                       
  • Experience working in cross agency task forces
  • Self-motivated
  • Actively seeks to enhance the group through the sharing of knowledge
  • Ability to function independently
  • Ability to assess threat information and determine its value to PG&E as threat intelligence
  • Ability to lead internal efforts around process improvement
  • Ability to independently work with intelligence providers

 
Knowledge, Skills, and Abilities: 

  • Deep knowledge of log, network, and system forensic investigation techniques
  • Deep knowledge of diverse operating systems, networking protocols, and systems administration
  • Deep knowledge of commercial forensic tools
  • Deep knowledge of common indicators of compromise and of methods for detecting these incidents
  • Deep knowledge of IT core infrastructure and cyber security components/devices
  • Deep knowledge of TCP/IP Networking and knowledge of the OSI model
  • Deep knowledge of OS management and Network Devices
  • Deep knowledge of Intrusion Detection/Prevention Systems
  • Deep knowledge of Antivirus Systems
  • Significant experience monitoring threats via a SIEM console
  • Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
  • Strong technical understanding of vulnerabilities and how attackers can exploit vulnerabilities to compromise systems
  • Knowledge of vulnerability sources such as the NVD, OSNVD, and commercial vendors
  • Knowledge of public intelligence sources such as ICS-CERT, FBI Infragard, HSIN
  • Knowledge of paid intelligence sources such as FireEye, Recorded Future, and Digital Shadows
  • Ability to work effectively with an incomplete data set; willing to apply logic and academic rigor to make sound analytical assessments
  • A quick study of new technologies, industries, threats, and scenarios
  • Strong, concise communication skills with an easy to understand writing style; able to build a compelling and effective narrative
  • The ability to write and convey technical concepts and threats in a non-technical manner
     

Job Responsibilities

  • Supports the Director, SIOC and Manager, SIOC/Threat Intelligence drive the Intelligence Driven Defense model
  • Provides rapid assessments of potentially imminent security situations, sensitive developments and complex threat issues
  • Perform hunting for malicious activity across the network and digital assets
  • Align cyber-related attacks with actor or campaign attribution
  • Respond to computer security incidents and conduct threat analysis
  • Identify and act on malicious or anomalous activity
  • Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network
  • Perform detailed investigation and response activities for potential security incidents
  • Provide accurate and priority driven analysis on cyber activity/threats
  • Perform payload analysis of packets
  • Detonate malware to assist with threat research
  • Identifies, tracks, and monitors emerging security threats, vulnerabilities and trends
  • When required, prepares briefs on strategic intelligence issues for senior management
  • Updates Daily Actionable Intelligence Reports and briefs the SIOC 2nd (swing) shift
  • Recommends implementation of counter-measures or mitigating controls
  • Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment
  • Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity
  • Continuously identify new and innovative threat monitoring, visualization, and detection solutions
  • Mentor junior staff in cybersecurity techniques, processes, and modus operandi, especially related to malicious cyber actors, to include APT and hacktivists
  • Create and continuously improve standard operating procedures used by the SIOC
  • Monitor incoming event queues for potential security incidents
  • Create, manage, and dispatch incident tickets
  • Monitor external event sources for security intelligence and actionable incidents
  • Maintain incident logs with relevant activity
  • Document investigation results, ensuring relevant details are passed to relevant stakeholders
  • Participate in root cause analysis or lessons learned sessions
  • Write technical articles for knowledge sharing
  • Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units

Our Mission

To safely and reliably deliver affordable and clean energy to our customers and communities every single day, while building the energy network of tomorrow.

Our Vision

With a sustainable energy future as our North Star, we will meet the challenge of climage change while providing affordable energy for all customers.

Our Culture

We put safety first.
We are accountable. We act with integrity, transparency and humility.
We are here to serve our customers.
We embrace change, innovation and continuous improvement.
We value diversity and inclusion. We speak up, listen up and follow up.
We succeed through collaboration and partnership. We are one team.

Company
Pacific Gas and Electric Company (PG&E), a subsidiary of PG&E Corporation (NYSE:PCG), is one of the largest combined natural gas and electric companies in the United States. Based in San Francisco, our 24,000 employees deliver safe, reliable, affordable and clean energy to nearly 16 million people throughout our Northern and Central California service area, stretching from Eureka to Bakersfield and from the Pacific Ocean to the Sierra Nevada.

More About Our Company

EEO
Pacific Gas and Electric Company is an Affirmative Action and Equal Employment Opportunity employer that actively pursues and hires a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, sex, age, religion, physical or mental disability status, medical condition, protected veteran status, marital status, pregnancy, sexual orientation, gender, gender identity, gender expression, genetic information or any other factor that is not related to the job.


Nearest Major Market: San Francisco
Nearest Secondary Market: Oakland