Cyber Incident Response Analyst

ChevronHouston, TX
108d

About The Position

Chevron is accepting online applications for the position Cyber Incident Response Analyst through September 26, 2025 at 11:59 p.m. (Central Time). The Cyber Intelligence Center delivers cyber threat monitoring and incident response. We leverage threat intelligence that enables early detection and rapid response to protect Chevron global operations. This role supports 24x7 cyber threat detection and incident response. The function leverages threat intelligence to proactively hunt for and respond to external cyber threats. The operational scope includes Chevron's global network infrastructure, industrial control systems and information assets.

Requirements

  • Hands on experience performing incident response in a security operations center or equivalent cybersecurity organization.
  • Hands on experience triaging suspicious emails and security technology alerts to identify true positive cyber incidents.
  • Hands on experience in digital forensics and malware analysis.
  • Proven ability to coordinate assignments within a global team setting, and communicate findings using both technical and non-technical content.
  • Experience with techniques and tools that promote effective analysis of root cause and creation of action plans.

Nice To Haves

  • Bachelor's Degree in related fields.
  • Professional cybersecurity certifications are a plus.

Responsibilities

  • Perform triage of potential cyber incidents from a variety of intake sources, including but not limited to suspicious emails, security technology alerts, anomalous activity reported by users, and activity identified through threat intelligence and/or threat hunting.
  • Carry out appropriate processes to contain and remediate cybersecurity incidents through coordination across the IT Function and Business Representatives.
  • Perform forensic analysis of compromised hosts and develop an action plan for remediation.
  • Examine potentially malicious files, with the goal of breaking down programmatic functions and techniques.
  • Extract indicators of compromise to then feed detection capabilities as a means of continuous improvement.
  • Participate in an on-call rotation in support of 24x7 escalation activities outside of standard business hours.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service