Our ingenuity fuels daily life. Together, we've forged some of the most trusted partnerships across the energy value chain to make what was once just an idea a reality: laying subsea infrastructure thousands of feet below sea level, installing platforms hundreds of miles from shore, using our expertise to design and build offshore wind infrastructure, and reshaping the onshore landscape to deliver the energy products the world needs safely and sustainably.
For more than 100 years, we've been making the impossible possible. Today, we're driving the energy transition with more than 30,000 of the brightest minds across 54 countries.
Job Overview:
Review, analyze, design, and advise on security controls, configurations, and implementations for IT projects. Continuously improve the integration and effectiveness of implemented technologies. Automate incident response playbooks for detected threats.
Assist in the analysis, design and development of an Information Security roadmap aligned with McDermott's business strategies. Inform on strategy and product level roadmap around security features and practical implementation. Maintain awareness of emerging technologies and identify opportunities for improving overall Cybersecurity. Market evaluation of new tools and techniques to enhance the security posture. Maintain awareness of cybersecurity threats, events, tactics, techniques, and procedures (TTPs).
Key Tasks and Responsibilities:
Design security solutions and provide requirements for implementation of security solutions.
Work with IT risk assessment function to ensure the proper security configurations and controls are implemented for IT projects.
Serve as an internal trusted advisor providing security services, advice on security, and assist with compensating control alternatives where security requirements cannot be met.
Research, identify, deploy, integrate, and manage cybersecurity perimeter technologies.
Provide pros/cons of security solutions impact business strategies.
Identify cybersecurity operations technology gaps, deficiencies, and recommend corrective actions.
Create documentation of findings and recommendations (root cause and risk analysis).
Assist with forensic investigations and incident response team (CIRT) activities.
Assign work to Cyber SOC for remediation.
Escalate pertinent findings in a timely manner.
Leverage vendors and internal resources to interface various security tools to automate critical response tasks.
Support Compliance managers in providing Cybersecurity artifacts.
Align information cybersecurity operations with NIST, and ISO 27001 requirements.
Essential Qualifications and Education:
Minimum 7 years of experience in Cybersecurity as primary duty
Working knowledge of the following Information Security domains, 4 required, network security is mandatory
Security Operations (Mandatory)
Cloud Security
Network Security
Vulnerability and Threat Management
Identity and Access Management (IAM)
Database Security
Application Security
Working knowledge of the following Information Security Systems
Firewalls and Management Consoles
Secure Email Gateways (SEGs)
Secure Web Gateway (SWGs)
Infrastructure Configuration Management Tools
Network Protocols and Troubleshooting
PKI
DNS
5+ years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall)
3 + years of experience with security information and event management (SIEM) tools
1+ years of experience working with threat intelligence feeds and IOCs
Working knowledge of firewall, router, network switch, VOIP, and wireless architecture and operation
Experience with forensic investigation
Experience with security incident and investigation reports/briefings
Experience in a team-oriented, collaborative environment
Strong analysis and problem-solving skills
Strong oral and written communication skills
Ability to multi-task and prioritize workload
Familiarity with security orchestration, automation and response (SOAR) is a plus