Network Operations Data Analyst
The Information Risk Strategy and Management organization within ITC has an available opportunity as a Network Cybersecurity
Engineer. This position operates key security technologies that secure the Chevron business network from risks and cybersecurity threats. Collaborating with other IT functions and business partners, you will enable a business network with secure, reliable, and resilient
access to the internet, external 3rd party partners, the cloud, and other networks. You will have an important role to play in the development of enterprise network security standards and help establish global governance.
Network skills, understanding of cybersecurity threats, along with knowledge of corporate design and information protection standards are needed in this role to
successfully enable Chevron business activities.
You will work closely with other IT and cybersecurity functions to monitor,
implement, support, and solve difficult, rapidly changing security challenges from the network perimeter and the cloud, up to and including the end-point device and application support. Where new technologies are introduced, the analyst will work with the Enterprise Security Design team to successfully transition to operations.
Responsibilities for this position may include but are not limited to:
Monitors and operates solutions and processes to maintain the reliability, effectiveness and efficiency of application, endpoint, and network security infrastructure components across the enterprise and associated process control environments.
Works with other IT and cybersecurity functions as well as business units, stakeholders to create agile solutions, identifying continuous improvement opportunities, creating new or improved processes and automation to support step changes in
Leads, provides subject matter expertise, and collaborates extensively with other IT asset SMEs in design, deployment and implementation of network security solutions by utilizing next generation security technologies and improving frameworks
for controls and policies.
Collaborates with global business units to design and deploy network security solutions suited to their unique environments.
Analyzes network security needs and designs solutions that meet business requirements for protection, standardization, efficiency, scalability, supportability and cost-effectiveness. Contributes to lifecycle activities.
Transitions developed solutions to operations, including delivery of educational and training programs, and continues to provide Level 3 support. Collaborates with others to communicate change impacts to end users.
Follows standard change management processes and practices when introducing technical changes to the environment.
Develops and shares best practices with other teams.
Demonstrated knowledge of network perimeter and security zones configuration and related network transport protocols.
Hands on experience with firewalls, Intrusion Prevention Systems (IPS), Advanced Persistent Threats protection, and network related and security devices and configurations such as proxies, remote access and third-party connectivity, network data gathering tools, traffic analysis, Process Control Network Architectures, mobility devices, cloud access and
Preferred technologies: Palo Alto, ProxySG, SourceFire, Splunk, CASB and Sophos.
Malware detection - Advanced persistent threats, intrusion detection and prevention systems.
Ability to read network captures and utilize scripting and other processes for automating tasks.
Understand application and data hosting infrastructure and services, and common application protocols.
Automation - Scripting knowledge to automate the firewall operational processes.
Demonstrated ability to work effectively at all levels with operations, design, projects, vendors, peers.
Ability to influence and motivate teams, and work with a variety of disciplines, cultures, and environments.
Fosters cooperation and collaboration among individuals on the team.
Demonstrated ability to effectively plan, prioritize, and manage work activities to meet customer needs and expectations.
Follows strong change management practices.
Ability to accomplish desired results independently with minimal direction in alignment with team goals and security standards.
Prioritize work efforts across many priorities to improve service delivery and issue resolution.
Chevron participates in E-Verify in certain locations as required by law.
Apply on company website