Threat Analyst, Career
Concord, CA, US, 94518
Requisition ID # 164306
Job Category: Information Technology
Job Level: Individual Contributor
Business Unit: Information Technology
Work Type: Hybrid
Job Location: Concord
Department Overview
The Cybersecurity function is led by PG&E’s Senior VP and Chief Information Security Officer and is responsible for cybersecurity and risk management across the organization.
The Security Intelligence and Operations Center (SIOC) is responsible for ensuring that PG&E proactively identifies and assesses threats to its user and operational network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.
Position Summary
Delivers information security services in support of PG&E's enterprise security goals and objectives. Utilizes a variety of commercial and custom tools and processes to provide the information security services. Duties include but is not limited to: identifying and acting on pertinent Indicators of Compromise, identifying and reporting of physical and cybersecurity intelligence, and reporting of intelligence findings on security incidents to Cybersecurity leadership. This position requires the ability to think analytically, work collaboratively, and document all work being performed.
This position is for Day-Shift, and as a Career Threat Intelligence analyst will be responsible for working towards continuous improvement through new processes and collaborations with teams both within and outside of Cybersecurity.
This position is hybrid, working from your remote office and our Concord office, approximately 3 days per week (Tuesday through Thursday) or more, based on business need.
PG&E is providing the hourly rate range that the company in good faith believes it might pay for this position at the time of the job posting. This compensation range is specific to the locality of the job. The actual hourly rate paid to an individual will be based on multiple factors, including, but not limited to, specific skills, education, licenses or certifications, experience, market value, geographic location, and internal equity. Although we estimate the successful candidate hired into this role will be placed between the entry point and the middle of the range, the decision will be made on a case-by-case basis related to these factors.
This job is also eligible to participate in PG&E’s discretionary incentive compensation programs.
The hourly rate for this position ranges from $49.03 to $77.88.
Job Responsibilities
- Identifies, tracks, and monitors emerging security threats, vulnerabilities and trends
- Keeps current with changing technologies, threat actors and geopolitical events which could impact stability and operations
- Maintain knowledge of adversary activities, including intrusion tactics, attack techniques and operational procedures.
- Use intelligence feeds and OSINT to maintain situational awareness to identify, track, and monitor emerging security threats and trends regarding threats to PG&E, the utility industry and US critical infrastructure
- Investigate and respond to potential cybersecurity incidents discovered while hunting and assist Incident Response team as needed
- Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network
- Analysis of security event logs from a variety of sources
- Documentation of analysis, including summarization for executive review
- Effectively prioritize multiple high-visibility work streams and coordinate resources
- Drive continuous improvement initiatives and processes in order to improve team efficacy and efficiency
- Collaborate with teams within the SIOC, cybersecurity as a whole, IT as a whole, and the multiple lines of business we interact with
- Share on-call responsibility outside of business hours, onsite and remote
- Strong, concise communication skills with an easy to understand writing style; able to build a compelling and effective narrative
- The ability to write and convey technical concepts and threats in a non-technical manner
Qualifications
Minimum:
- High School or GED-General Educational Development-GED Diploma
- 4 years experience in IT-Information Technology security, multi-platform, or job-related experience
Desired:
- Bachelors Degree in Computer Science or job-related discipline or equivalent work experience
- Industry standard cybersecurity certifications. For instance, certifications from SANS, CompTIA, and ISC2
- Formal IT Security/Network Certification, such as WCNA, CompTIA Network+ and Security +, Cisco CCNA, GIAC GCIH, GMON, GCFA, GCFE, GREM, GICSP, GRID, or other relevant certifications
- Technical knowledge of operating systems (e.g., UNIX, Windows).
- Experience with compliance standards: NERC-CIP, SOX, TSA
- Previous experience working with various SIEM, EDR, and digital forensic technologies
- Previous experience analyzing network and security logs
- Previous SOC Monitoring/response experience
- Knowledge of MITRE ATT&CK Enterprise Matrix
- Knowledge of APT groups and their TTPs
- Experience identifying and processing Indicators of Compromise
- Understanding of Threat Intelligence Lifecycle
Hiring Leader Name: Derek Miklaus
Nearest Major Market: San Francisco
Nearest Secondary Market: Oakland