Description As part of Oracle’s global security engineering efforts, you will work as an individual contributor in a 24x7 operational security environment focusing on real-time analysis of security alerts, responding to cyber threats both internal and external, and ensuring security compliance. Your role entails collaborating with partner teams, following defined protocols, documenting findings, and participating in activities to promote secure practices within the organisation. This is an opportunity to expand your cybersecurity skills within a dynamic, globally distributed environment. The role requires working a 4-day work week (Wednesday-Saturday) in a 16x7 environment. - 14:00 - 24:00 as core hours. Qualifications Bachelor’s degree in computer science, information security, or related discipline, or equivalent experience. 3 years’ experience in a SOC, incident response, or hands-on operational security role. Solid understanding of core security concepts, including network protocols, OS internals, malware behaviours, and cloud security principles. Proficiency with SIEM tools (e.g., Splunk, QRadar, ArcSight) and security monitoring technologies. Demonstrated experience with incident detection, analysis, triage, and response. Familiarity with scripting (Python, Bash, etc.) and automation is a plus. Recognised professional security certification(s) preferred (e.g. Security, SSCP, GSEC, CEH, CCSP, CISSP, CCSK). Excellent analytical, communication, and documentation skills. Ability to work effectively in a fast-paced, team-orientated, and global environment. Strong attention to detail and commitment to continuous learning. Please note this role is dependent upon candidates being able to obtain elevated security clearance at multiple levels, such as UK Government SC or higher. Additional Info : Candidates must be a UK national or UK citizen and have been in the country for 5 years. Sponsorship for Visa / work permit is not available for this position. LI-DNI Responsibilities Responsibilities of this role include: Monitor security events across OCI infrastructure using SIEM and other security platforms. Identify, investigate, and respond to security incidents following established playbooks and escalation procedures. Analyse and triage alerts to distinguish legitimate threats from false positives. Contribute to incident documentation, reporting, and root-cause analysis. Coordinate with internal teams for incident containment, eradication, and recovery. Participate in threat hunting and continuous improvement of detection capabilities. Support forensic investigations with data collection, analysis, and chain-of-custody documentation. Track and report vulnerability and risk management metrics as required. Assist with compliance activities and support audits by providing relevant evidence and logs. Stay up-to-date with emerging security threats, vulnerabilities, and best practices. Participate in a rotational on-call schedule for critical issues (one week in eight). Qualifications Career Level - IC4