Senior Cybersecurity Engineer, Detection Engineer
San Antonio TX, United States
Marathon Petroleum Corporation
At MPC, we’re committed to being a great place to work – one that welcomes new ideas, encourages diverse perspectives, develops our people, and fosters a collaborative team environment.
The Senior Cybersecurity Engineer, Detection Engineer plays a critical role in safeguarding Marathon Petroleum Corporation’s digital and operational assets across enterprise IT and industrial control systems (ICS/OT). This position is responsible for engineering and optimizing threat detection logic to identify, analyze, and respond to emerging cyber threats targeting both business and field operations, including refineries, pipelines, terminals, and remote industrial facilities.
Working as part of the Cyber Threat Operations team within the Cyber Fusion Center, the engineer will translate complex threat intelligence into high-fidelity detection capabilities, develop automated response workflows, and contribute to the ongoing enhancement of incident response playbooks. The role requires close coordination with internal teams including threat hunting, incident response, threat intelligence, and infrastructure to ensure alignment between detection strategy, risk posture, and operational resiliency.
The ideal candidate is technically proficient, collaborative, and mission-driven, with a strong understanding of IT/OT security principles and a passion for protecting critical infrastructure within the energy sector.
Key Responsibilities- Conducts detailed analyses on changes to cybersecurity solutions and its relationship to internal and external systems to assess business impact and cybersecurity risk by developing, implementing, and continuously refining cyber threat detection logic across the corporate SIEM/SOAR platform. Resolves complex multi-functional technical issues.
- Leverages cybersecurity assessments, standards and ensures compliance across security systems.
- Improves the efficiency and effectiveness of Security solutions, processes and controls in place by building, testing, and maintaining security automation and orchestration workflows to accelerate detection and response across environments.
- Analyzes existing processes and procedures and leads efforts for implementing improvements or remediation.
- Responsible for development and submission of Standard Operating Procedures.
- Analyzes business impacting events, performs initial investigation. Monitors networks, systems, and applications for signs of potential cybersecurity incidents.
- Investigates and analyzes the nature and scope of cyber incidents. Assists in the development of innovative and creative ideas to formulate risk mitigation and remediation plans and approaches to ensure regulatory compliance by collaborating with threat intelligence and hunting teams to operationalize adversary TTPs into actionable detection use cases.
- Leads implementation of global security initiatives, policies, and compliance requirements. Collects and validates all security metrics and any remediation efforts associated with them.
- Manages cyber security-related consulting, guidance, and support to customers and stakeholders by Documenting detection content, orchestration logic, tuning efforts, and automation workflows for internal knowledge sharing and auditability.
- Translates security principles to assist configuration teams with incorporating security into build and configuration processes.
- Monitors emerging IT/OT and cybersecurity technologies as well as their impact on the security landscape.
- Bachelor’s Degree in Information Technology, related field or equivalent experience.
- Professional certification, e.g. Security+, Network+, OSCP, GIAC, CEH preferred.
- 5+ years of relevant experience required
- Hands-on experience with SIEM platforms (e.g., Splunk, Google SecOps, QRadar), detection rule creation, and alert tuning required.
- Experience with scripting (e.g., Python, PowerShell) and security automation/orchestration tools (e.g., SOAR platforms like Google SecOps, Cortex XSOAR, Splunk SOAR, or Swimlane) required.
- Cybersecurity certifications such as GCDA, GRID, GCIA, GNFA, GCFA or equivalent preferred.
- Familiarity with ICS/OT networks and industrial protocols such as Modbus, DNP3, and OPC preferred.
- Knowledge of threat frameworks including MITRE ATT&CK and Cyber Kill Chain preferred.
- Experience collaborating with cybersecurity, engineering, and operations teams preferred
- Authentic Communicator - Expresses ideas and information, both verbally and in writing, clearly and credibly. Listens to understand and fosters constructive dialogue.
- Cybersecurity Risk Management - The process of developing cyber risk assessment and treatment techniques that can effectively pre-empt and identify significant security loopholes and weaknesses, demonstrating the business risks associated with these loopholes and providing risk treatment and prioritization strategies to effectively address the cyber-related risks, threats and vulnerabilities, ensuring appropriate levels of protection, confidentiality, integrity and privacy in alignment with the security framework.
- General Programming - Applies a computer language to communicate with computers using a set of instructions and to automate the execution of tasks.
- Intrusion Detection - The use of security analytics, including the outputs from intelligence analysis, predictive research and root cause analysis in order to search for and detect potential breaches or identify recognized indicators and warnings. Also, monitoring and collating external vulnerability reports for organizational relevance, ensuring that relevant vulnerabilities are rectified through formal change processes.
- Penetration Testing - The practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.
- Relationship Management - Relationship Management is the conscious aim to develop and manage long-term and/or trusting relationships with internal or external customers, distributors, suppliers, or other parties in an environment which can include marketing, selling, servicing and other areas where a relationship is crucial to on-going success. At a senior level, it includes C-level relationships with senior management.
- Security Controls - Manages and maintains an information system that focuses on the management of risk and the management of information systems security.
- Security Governance - The process of developing and disseminating corporate security policies, frameworks and guidelines to ensure that day-to-day business operations are guarded and well protected against risks, threats and vulnerabilities.
- Security Information & Event Management (SIEM) - A set of tools and services offering real-time visibility across an organization's information security systems, and event log management that consolidates data from numerous sources.
- Security Policy Management - The process of identifying, implementing, and managing the rules and procedures that all individuals must follow when accessing and using an organization's IT assets and resources.
- Threat Analysis - Monitor intelligence-gathering and anticipate potential threats to an IT/OT systems proactively. This involves the pre-emptive analysis of potential perpetrators, anomalous activities and evidence-based knowledge and inferences on perpetrators' motivations and tactics.
- Threat Hunting - Searches through networks, endpoints, and datasets to detect and isolate cyber threats that evade existing security solutions.
- Vulnerability Management - The process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization with the necessary knowledge, awareness and risk background to understand the threats to its business.
As an energy industry leader, our career opportunities fuel personal and professional growth.
Location:
San Antonio, TexasAdditional locations:
Job Requisition ID:
00017211Location Address:
19100 Ridgewood PkwyEducation:
Employee Group:
Full timeEmployee Subgroup:
RegularMarathon Petroleum Company LP is an Equal Opportunity Employer and gives consideration for employment to qualified applicants without discrimination on the basis of race, color, religion, creed, sex, gender (including pregnancy, childbirth, breastfeeding or related medical conditions), sexual orientation, gender identity, gender expression, reproductive health decision-making, age, mental or physical disability, medical condition or AIDS/HIV status, ancestry, national origin, genetic information, military, veteran status, marital status, citizenship or any other status protected by applicable federal, state, or local laws. If you would like more information about your EEO rights as an applicant, click here.
If you need a reasonable accommodation for any part of the application process at Marathon Petroleum LP, please contact our Human Resources Department at talentacquisition@marathonpetroleum.com. Please specify the reasonable accommodation you are requesting, along with the job posting number in which you may be interested. A Human Resources representative will review your request and contact you to discuss a reasonable accommodation. Marathon Petroleum offers a total rewards program which includes, but is not limited to, access to health, vision, and dental insurance, paid time off, 401k matching program, paid parental leave, and educational reimbursement. Detailed benefit information is available at https://mympcbenefits.com.The hired candidate will also be eligible for a discretionary company-sponsored annual bonus program.
Equal Opportunity Employer: Veteran / Disability
We will consider all qualified Applicants for employment, including those with arrest or conviction records, in a manner consistent with the requirements of applicable state and local laws. In reviewing criminal history in connection with a conditional offer of employment, Marathon will consider the key responsibilities of the role.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Automation C CEH Compliance Cyber Kill Chain DNP3 Exploit GCFA GCIA GIAC GNFA Governance ICS Incident response Industrial Intrusion detection MITRE ATT&CK Modbus Monitoring OSCP Pentesting PowerShell Privacy Python QRadar Risk assessment Risk management Scripting SecOps SIEM SOAR Splunk Strategy Swimlane Threat detection Threat intelligence TTPs Vulnerabilities Vulnerability management XSOAR
Perks/benefits: Career development Health care Insurance Medical leave Parental leave Salary bonus Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.