Supervisor, Cybersecurity

Company   Based in San Francisco, Pacific Gas and Electric Company, a subsidiary of PG&E Corporation (NYSE:PCG), is one of the largest combined natural gas and electric utilities in the United States. And we deliver some of the nation's cleanest energy to our customers in Northern and Central California. For PG&E, Together, Building a Better California is not just a slogan. It's the very core of our mission and the scale by which we measure our success. We know that the nearly 16 million people who do business with our company count on our more than 24,000 employees for far more than the delivery of utility services. They, along with every citizen of the state we call home, also expect PG&E to help improve their quality of life, the economic vitality of their communities, and the prospect for a better future fueled by clean, safe, reliable and affordable energy.   Pacific Gas and Electric Company is an Affirmative Action and Equal Employment Opportunity employer that actively pursues and hires a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, sex, age, religion, physical or mental disability status, medical condition, protected veteran status, marital status, pregnancy, sexual orientation, gender, gender identity, gender expression, genetic information or any other factor that is not related to the job.   Department Overview The Cybersecurity function is led by PG&E's Vice President - Chief Security Officer and is responsible for cybersecurity and risk management across the organization.   The Security Intelligence and Operations Center (SIOC) is responsible for ensuring that PG&E proactively identifies and assesses threats to its network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.   Position Summary This is a challenging and fast passed position in PG&E's Security Intelligence and Operations Center (SIOC) which is responsible for supervising Threat Analysts and Incident Response Analysts on one of three shifts.  It requires the ability to ensure security alerts are being addressed in a timely manner, positions are staffed appropriately, training is taken, mentoring, and metrics are managed.  When necessary, the supervisor position will also be responsible for personally addressing the day to day security alert responses. The SIOC is a critical team within PG&E's broader Cybersecurity team which is led by PG&E's Vice President - Chief Security Officer.   This position is for the Night Shift - 10:00 PM to 6:30 AM Monday through Friday   Qualifications Minimum: Bachelor's degree in Computer Science or related field, or equivalent work experience 6 years of Information Technology experience, with at least 4 years of experience in information security working within security operations Security Operations Center (SOC) experience Formal IT Security/Network Certification such as SANS GIAC Certified Intrusion Analyst (GCIA) or SANS GIAC Network Forensic Analyst (GNFA) or SANS GIAC Continuous Monitoring (GMON) or related Degree   Desired: Utility Industry experience Previous team lead or supervisory experience Experience with scripting in Perl/Python/Ruby/PowerShell Experience with network and desktop-based and server-based forensics Malware reverse engineering skills   Knowledge, Skills, and Abilities: Knowledge of log, network, and system forensic investigation techniques Deep knowledge of diverse operating systems, networking protocols, and systems administration Knowledge of commercial forensic tools Knowledge of common indicators of compromise and of methods for detecting these incidents Knowledge of IT core infrastructure and cyber security components/devices Knowledge of TCP/IP Networking and knowledge of the OSI model Knowledge of OS management and Network Devices Knowledge of Intrusion Detection/Prevention Systems Knowledge of Antivirus Systems Intelligence driven defense utilizing the Cyber Kill Chain Experience monitoring threats via a SIEM console Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs Excellent problem solving, critical thinking, and analytical skills - ability to de-construct problems Strong customer service skills and decision-making skills Significant experience with packet analysis (Wireshark) and Malware analysis preferred Working knowledge of PG&E infrastructure preferred IBM QRadar and Dell SecureWorks experience preferred Candidate must have familiarity with regulatory requirements, such as NERC/CIP, NIST SP 800, SOX, etc Job Responsibilities Supervisory Responsibilities: Directly supervises personnel in accordance with Human Resources guidelines Interviewing and hiring Performance management and evaluations Career development planning Time card management Pay planning Managing shift staffing levels (sick, vacation, training) Manages security alert queue and responses Ensures metrics are being met   Functional Responsibilities: Perform hunting for malicious activity across the network and digital assets Respond to computer security incidents and conduct threat analysis Identify and act on malicious or anomalous activity Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network Perform detailed investigation and response activities for potential security incidents Provide accurate and priority driven analysis on cyber activity/threats Perform payload analysis of packets Detonate malware to assist with threat research Recommends implementation of counter-measures or mitigating controls Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity Develop innovative monitoring and detection solutions using PG&E tools and other skillsets such as scripting Mentor junior staff in cybersecurity techniques and processes Create and continuously improve standard operating procedures used by the SOC Resolve or coordinate the resolution of cyber security events Monitor incoming event queues for potential security incidents Create, manage, and dispatch incident tickets Monitor external event sources for security intelligence and actionable incidents Maintain incident logs with relevant activity Document investigation results, ensuring relevant details are passed to senior analysts and stakeholders Participate in root cause analysis or lessons learned sessions Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units 10485
Salary Range: NA
Minimum Qualification
5 - 7 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.