Principal Incident Response Analyst
Oracle
Key Responsibilities
Incident Handling & Investigation
· Serve as first-line and mid-tier incident handler for security events impacting Oracle’s infrastructure, applications, or customers.
· Perform triage, scoping, and evidence collection in alignment with Oracle’s Incident Response Standard & Plan.
· Analyze logs, alerts, and telemetry from SIEM, SOAR, and endpoint tools to determine impact, root cause, and containment strategies.
· Collaborate with Oracle Cloud Infrastructure (OCI), product security, and LoB SOC teams to coordinate response actions.
· Document findings, timeline, and technical artifacts in accordance with Oracle’s legal and compliance requirements.
Incident Management Support
· Support the Incident Commander and Director of Incident Response in orchestrating enterprise-wide security event response.
· In designated cases, serve as acting Incident Manager—coordinating cross-functional calls, tracking workstreams, and ensuring timely communication and escalation.
· Draft and maintain incident situation reports (SITREPs) and executive summaries to ensure leadership visibility throughout events.
· Track incident metrics, lessons learned, and corrective actions to drive continuous improvement of the IRF.
Crisis Readiness & Simulation
· Participate in and help facilitate tabletop exercises, simulation drills, and readiness assessments.
· Maintain proficiency with Oracle’s IR tools, playbooks, and escalation procedures.
· Provide feedback on playbook optimization, tooling integration, and process automation.
Cross-Functional Collaboration
· Partner with Legal, Security Communications, Privacy, and Product Security to ensure coordinated response and aligned narratives.
· Work with the Customer Trust teams to support accurate and timely reporting and attestations when customer or regulatory impact is identified.
· Support the ICC mission to ensure consistent, transparent, and unified response across all Lines of Business.
Qualifications
6-10+ years of experience in cybersecurity operations, incident response, or threat analysis.
· Demonstrated experience investigating and containing cybersecurity incidents in enterprise or cloud environments.
· Familiarity with log analysis, forensics, malware triage, and threat intelligence tools and workflows.
· Understanding of cloud architectures (OCI, AWS, Azure, or GCP) and modern attack vectors.
· Strong communication and documentation skills, with ability to summarize complex technical issues clearly for executive audiences.
· Calm and structured approach to crisis management; capable of maintaining composure and precision under pressure.
Preferred Qualifications
· Bachelor’s degree in Cybersecurity, Computer Science, or related field.
· Certifications such as GCIH, GCFA, CEH, or CISSP preferred.
· Experience in large-scale or federated enterprise environments.
· Familiarity with legal, privacy, or regulatory aspects of incident management (e.g., GDPR, SEC, HIPAA, NIS2).
As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
About the Role Oracle’s Integrated Cyber Center (ICC) is seeking skilled and motivated Incident Response Analysts to join our global security response team. These analysts will play a central role in detecting, analyzing, and responding to security incidents across Oracle’s cloud and corporate environments. As an ICC Incident Response Analyst, you will act as an incident handler—driving the technical investigation, coordination, and documentation of security events. In elevated scenarios, you may also serve as an Incident Manager, orchestrating the broader response effort under the guidance of an Incident Commander. This role requires a balance of strong analytical skill, communication discipline, and calm execution under pressure. You’ll work alongside Oracle’s global cyber defense, legal, communications, and engineering teams to ensure that Oracle speaks and acts as one enterprise during security events.
Disclaimer:
Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.
Range and benefit information provided in this posting are specific to the stated locations only
US: Hiring Range in USD from: $106,300 to $223,400 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle’s differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC4
Responsible for advanced planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures.
Provides technical advice and direction to support the design and development of secure architectures.
May participate in an incident management team, bringing advanced-level skills to respond to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as Incident Commander of serious incidents. Develops new methods, and playbooks, as well as sophisticated scripts, applications, and tools, and trains others in their use.
May participate in an incident management team, responding to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as incident commander of serious incidents. Participates in developing new methods, playbooks throughout Oracle.
Evaluates existing and proposed technical architectures for security risk, provides technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment, risk assessment, and threat modeling.
Brings advanced-level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required, and where computer programming/scripting knowledge is required.
Work with Senior management to develop and implement a multi-year security roadmap
Focus on operational and strategic level tasks, and provide counsel and guidance to the junior level security operations engineers in the department.