Threat Analyst, Career

Full Time
Concord, CA
Areas of Interest: Threat Analysis, Vulnerability Assessment and Management
report a problem
Overview

Based in San Francisco, Pacific Gas and Electric Company, a subsidiary of PG&E Corporation (NYSE:PCG), is one of the largest combined natural gas and electric utilities in the United States. And we deliver some of the nation’s cleanest energy to our customers in Northern and Central California. For PG&E, ‘Together, Building a Better California’ is not just a slogan. It’s the very core of our mission and the scale by which we measure our success. We know that the nearly 16 million people who do business with our company count on our more than 24,000 employees for far more than the delivery of utility services. They, along with every citizen of the state we call home, also expect PG&E to help improve their quality of life, the economic vitality of their communities, and the prospect for a better future fueled by clean, safe, reliable and affordable energy.

Pacific Gas and Electric Company is an Affirmative Action and Equal Employment Opportunity employerthat actively pursues and hires a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, sex, age, religion, physical or mental disability status, medical condition, protectedveteran status, marital status, pregnancy, sexual orientation, gender, gender identity, gender expression, genetic information or any other factor that is not related to the job.

Department Overview

Information Systems Technology Services is a unified organization comprised of various departments which collaborate effectively in order to deliver high quality technology solutions.

The Information Security function is led by PG&E’s Vice President – Chief Information Security Officer and is responsible for cybersecurity and risk management across the organization.

The Security Intelligence and Operations Center (SIOC) is responsible for ensuring that PG&E proactively identifies and assesses threats to its network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.

Position Summary

This is a challenging and fast passed position in PG&E’s Security Intelligence and Operations Center (SIOC) which is responsible for detecting, analyzing and responding to any suspicious cyber security activity across PG&E’s business and operational networks. The SOC is a critical team within PG&E’s broader Information Security team which is led by PG&E’s Vice President – Chief Information Security Officer.

This position is for swing shift: Saturday – Wednesday 2:00 p..m. – 10:30 p.m. 

Qualifications

Minimum Requirements:

  • Bachelor’s degree in Computer Science or related field, or equivalent work experience
  • Formal IT Security/Network Certification such as CompTIA Security +, Cisco CCNA, SANS GIAC Certified Intrusion Analyst (GCIA) or ability to obtain via self-study within oneyear of hire date
  • 4 years of Information Technology experience, with at least 2 years of experience in information security working within security operations, security intelligence or equivalent functions

Desired:

  • Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC) experience
  • Utility Industry experience

Additional Knowledge, Skills, and Abilities:

  • Working knowledge of log, network, and system forensic investigation techniques
  • Working knowledge of diverse operating systems, networking protocols, and systems administration
  • Working knowledge of commercial forensic tools
  • Working knowledge of common indicators of compromise and of methods for detecting these incidents
  • Substantial knowledge of IT core infrastructure and cyber security components/devices
  • Working knowledge of TCP/IP Networking and knowledge of the OSI model
  • Working knowledge of OS management and Network Devices
  • Working knowledge of Intrusion Detection/Prevention Systems
  • Working knowledge of Antivirus Systems
  • Experience monitoring threats via a SIEM console
  • Experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs 
  • Excellent problem solving, critical thinking, and analytical skills – ability to de-construct problems
  • Strong customer service skills and decision-making skills 
  • Experience with packet analysis (Wireshark) and Malware analysis preferred
  • Working knowledge of PG&E infrastructure preferred
  • IBM QRadar and Dell SecureWorks experience preferred
  • Candidate must have familiarity with regulatory requirements, such as NERC/CIP, NIST SP 800, SOX, etc
  • Experience with scripting in Perl/Python/Ruby 
  • Experience with both desktop-based and server-based forensics
  • Reverse engineering skills
Responsibilities
  • Perform hunting for malicious activity across the network and digital assets
  • Respond to computer security incidents and conduct threat analysis as directed
  • Identify and act on malicious or anomalous activity 
  • Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network
  • Perform initial investigation and triage for potential security incidents
  • Provide accurate and priority driven analysis on cyber activity/threats 
  • Perform payload analysis of packets
  • Detonate malware to assist with threat research
  • Provides input to assist with implementation of counter-measures or mitigating controls
  • Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment
  • Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity
  • Resolve or coordinate the resolution of cyber security events
  • Monitor incoming event queues for potential security incidents 
  • Create, manage, and dispatch incident tickets 
  • Monitor external event sources for security intelligence and actionable incidents 
  • Maintain incident logs with relevant activity 
  • Document investigation results, ensuring relevant details are passed to senior analysts and stakeholders 
  • Participate in root cause analysis or lessons learned sessions 
  • Write technical articles for knowledge sharing
  • Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units



Share this job:

Pacific Gas and Electric Company

Pacific Gas and Electric Company, incorporated in California in 1905, is one of the largest combination natural gas and electric utilities in the United States. Based in San Francisco, the company is a subsidiary of PG&E Corporation. 

There are approximately 20,000 employees who carry out Pacific Gas and Electric Company's primary business—the transmission and delivery of energy. The company provides natural gas and electric service to approximately 15 million people throughout a 70,000-square-mile service area in northern and central California. 

Fast Facts 
  • Service area stretches from Eureka in the north to Bakersfield in the south, and from the Pacific Ocean in the west to the Sierra Nevada in the east 
  • 141,215 circuit miles of electric distribution lines and 18,616 circuit miles of interconnected transmission lines 
  • 42,141 miles of natural gas distribution pipelines and 6,438 miles of transportation pipelines 
  • 5.1 million electric customer accounts 
  • 4.3 million natural gas customer accounts
Specialties
energy, utility, power, gas, electricity
Visit Pacific Gas and Electric Company's Social Media pages:
Company Industry: Utilities
Company Type: Public Company
Company Size: 10,001+