An exciting career awaits you
At MPC were committed to being a great place to work one that welcomes new ideas encourages diverse perspectives develops our people and fosters a collaborative team environment.
Position Summary
We are seeking a skilled and motivated Cybersecurity Engineer to join our Cyber Operations team supporting both IT and OT environments at Marathon Petroleum. This mid-career role will primarily focus on supporting our Zero Trust security strategy while also contributing to the operation and enhancement of standard cybersecurity tools.
The ideal candidate will have hands-on experience deploying and managing Zero Trust frameworks with an understanding of secure access identity management and data protection across hybrid environments. Some familiarity with common cybersecurity technologiesincluding endpoint protection application allowlisting email protection and firewallswill round out the skill set needed to succeed in this role.
You will collaborate with cross-functional teams to secure enterprise assets support digital transformation initiatives and ensure compliance with industry standards and regulatory requirements helping to protect critical infrastructure and maintain operational resilience.
Key Responsibilities
- Clearly understands business requirements and is able to identify risk and risk mitigations.
- Resolves routine multi-functional technical issues and supports resolution of complex issues.
- Recognizes established Cybersecurity assessments standards and applies them in practice to security systems.
- Contributes to the efficiency and effectiveness of Security solutions processes and controls in place.
- Identifies and provides recommendations towards process improvement and / or solution remediation and assists in developing steps within Standard Operating Procedures. Identifies business impacting events and performs initial investigation.
- Monitors networks systems and applications for signs of potential cybersecurity incidents. Investigates and analyzes the nature and scope of cyber incidents.
- Analyzes security protocols administers and maintains security audits and reports of cyber systems access and activity; participates in disaster recovery planning per corporate guidelines.
- Delivers and implements global security initiatives policies and compliance requirements. Identifies cybersecurity metrics and applicability for various teams.
- Takes action through collaboration to improve metric results.
- Executes cyber security-related consulting guidance and support to customers and stakeholders.
- Follows emerging Information Technology / Operations Technology and cybersecurity technology trends as well as their impact on the security landscape.
Education and Experience
Bachelors Degree in Information Technology related field or equivalent experience.Professional certification e.g. Security Network OSCP GIAC CEH preferred.2 years of relevant experience required.Experience with administration of zero trust platforms required.Experience in implementing process improvement and automation is required.Experience supporting large corporate projects while working with architecture and engineering teams as well as vendors and contractors is required.Experience with administration of standard security tooling including AV allowlisting email protection firewalls logging and monitoring preferred.Experience supporting Operational Technology environments with a good understanding of the Purdue model preferred.Experience working within the SAFE Agile framework is preferred.Skills
Authentic Communicator - Expresses ideas and information both verbally and in writing clearly and credibly. Listens to understand and fosters constructive dialogue.Cybersecurity Risk Management - The process of developing cyber risk assessment and treatment techniques that can effectively pre-empt and identify significant security loopholes and weaknesses demonstrating the business risks associated with these loopholes and providing risk treatment and prioritization strategies to effectively address the cyber-related risks threats and vulnerabilities ensuring appropriate levels of protection confidentiality integrity and privacy in alignment with the security framework.General Programming - Applies a computer language to communicate with computers using a set of instructions and to automate the execution of tasks.Intrusion Detection - The use of security analytics including the outputs from intelligence analysis predictive research and root cause analysis in order to search for and detect potential breaches or identify recognized indicators and warnings. Also monitoring and collating external vulnerability reports for organizational relevance ensuring that relevant vulnerabilities are rectified through formal change processes.Penetration Testing - The practice of testing a computer system network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.Security Controls - Manages and maintains an information system that focuses on the management of risk and the management of information systems security.Security Governance - The process of developing and disseminating corporate security policies frameworks and guidelines to ensure that day-to-day business operations are guarded and well protected against risks threats and vulnerabilities.Security Information & Event Management (SIEM) - A set of tools and services offering real-time visibility across an organizations information security systems and event log management that consolidates data from numerous sources.Security Policy Management - The process of identifying implementing and managing the rules and procedures that all individuals must follow when accessing and using an organizations IT assets and resources.Threat Analysis - Monitor intelligence-gathering and anticipate potential threats to an IT / OT systems proactively. This involves the pre-emptive analysis of potential perpetrators anomalous activities and evidence-based knowledge and inferences on perpetrators motivations and tactics.Threat Hunting - Searches through networks endpoints and datasets to detect and isolate cyber threats that evade existing security solutions.Vulnerability Management - The process of defining identifying classifying and prioritizing vulnerabilities in computer systems applications and network infrastructures and providing the organization with the necessary knowledge awareness and risk background to understand the threats to its business.As an energy industry leader our career opportunities fuel personal and professional growth.
Location : San Antonio Texas
Additional locations :
Job Requisition ID :
Location Address :
19100 Ridgewood Pkwy
Education : Employee Group :
Full time
Employee Subgroup : Regular
Marathon Petroleum Company LP is an Equal Opportunity Employer and gives consideration for employment to qualified applicants without discrimination on the basis of race color religion creed sex gender (including pregnancy childbirth breastfeeding or related medical conditions) sexual orientation gender identity gender expression reproductive health decision-making age mental or physical disability medical condition or AIDS / HIV status ancestry national origin genetic information military veteran status marital status citizenship or any other status protected by applicable federal state or local laws. If you would like more information about your EEO rights as an applicant click here.
If you need a reasonable accommodation for any part of the application process at Marathon Petroleum LP please contact our Human Resources Department at . Please specify the reasonable accommodation you are requesting along with the job posting number in which you may be interested. A Human Resources representative will review your request and contact you to discuss a reasonable accommodation. Marathon Petroleum offers a total rewards program which includes but is not limited to access to health vision and dental insurance paid time off 401k matching program paid parental leave and educational reimbursement. Detailed benefit information is available at .The hired candidate will also be eligible for a discretionary company-sponsored annual bonus program.
Equal Opportunity Employer : Veteran / Disability
We will consider all qualified Applicants for employment including those with arrest or conviction records in a manner consistent with the requirements of applicable state and local reviewing criminal history in connection with a conditional offer of employment Marathon will consider the key responsibilities of the role.
Key Skills
ASP.NET,Health Education,Fashion Designing,Fiber,Investigation
Employment Type : Full-Time
Experience : years
Vacancy : 1