An exciting career awaits you
At MPC, we're committed to being a great place to work – one that welcomes new ideas, encourages diverse perspectives, develops our people, and fosters a collaborative team environment.
Position Summary
We are seeking a detail-oriented and analytical Cybersecurity Analyst – Third Party Risk to join our cybersecurity team. In this role, you will be responsible for assessing, monitoring, and managing cybersecurity risks associated with third-party vendors, partners, and service providers. You will play a critical role in protecting our organization's data and systems by ensuring our external relationships meet our security standards and compliance requirements.
Key Responsibilities
- Perform third-party cybersecurity risk assessments and due diligence for vendors by evaluating security controls through questionnaires, documentation reviews, and ratings tools; collaborate with procurement, legal, and business units to embed cybersecurity requirements into contracts and vendor selection processes.
- Drive risk remediation and continuous improvement by tracking mitigation efforts, staying informed on emerging threats and regulatory changes, and applying insights to strengthen third-party risk management practices.
- Conduct controls analysis of business process and systems and report impact of changes and additions to security systems.
- Assist with the resolution of routine multi-functional technical issues. Prepare, perform, and present cybersecurity assessments and associated risks.
- Evaluate the efficiency and effectiveness of Security processes and controls in place ensuring confidentiality, integrity, and availability of data / information, under guidance of more senior colleagues.
- Recommend and / or execute remediation and develop cost information for such mitigation measures. Monitor networks, systems, and applications for signs of potential cybersecurity incidents. Investigate and analyze the nature and scope of cyber incidents.
- Analyze security protocols, compliance reviews, administer and maintain security audits and reports of server access and activity; participate in disaster recovery planning per corporate guidelines.
- Deliver and implement global security initiatives, policies, and compliance requirements. Work with IT and security engineers to produce metrics related to cybersecurity.
- Take action through collaboration to improve metric results. Execute cyber security-related consulting, guidance, and support to customers and stakeholders.
- Effectively communicate emerging Information Technology / Operations Technology and cybersecurity technology trends as well as their impact on the security landscape.
Education and Experience
Bachelor's Degree in Information Technology, related field or equivalent experience.Professional certification, e.g. CISA, CRISC, CISSP, or CTPRP preferred.2+ years of relevant experience requiredExperience in cybersecurity, risk management, or vendor risk assessment required.Experience with third-party risk management platforms and tools (e.g., CyberGRX, BitSight) preferred.Experience with cybersecurity risk frameworks (NIST CSF, NIST 800-53, and COBIT) preferred.Experience reviewing and interpreting SOC 2 Type II reports, with the ability to assess control effectiveness, identify relevant findings, and evaluate vendor risk posture preferred.Skills
Authentic Communicator - Expresses ideas and information, both verbally and in writing, clearly and credibly. Listens to understand and fosters constructive dialogue.Cybersecurity Risk Management - The process of developing cyber risk assessment and treatment techniques that can effectively pre-empt and identify significant security loopholes and weaknesses, demonstrating the business risks associated with these loopholes and providing risk treatment and prioritization strategies to effectively address the cyber-related risks, threats and vulnerabilities, ensuring appropriate levels of protection, confidentiality, integrity and privacy in alignment with the security framework.General Programming - Applies a computer language to communicate with computers using a set of instructions and to automate the execution of tasks.Intrusion Detection - The use of security analytics, including the outputs from intelligence analysis, predictive research and root cause analysis in order to search for and detect potential breaches or identify recognized indicators and warnings. Also, monitoring and collating external vulnerability reports for organizational relevance, ensuring that relevant vulnerabilities are rectified through formal change processes.Penetration Testing - The practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.Security Controls - Manages and maintains an information system that focuses on the management of risk and the management of information systems security.Security Governance - The process of developing and disseminating corporate security policies, frameworks and guidelines to ensure that day-to-day business operations are guarded and well protected against risks, threats and vulnerabilities.Security Information & Event Management (SIEM) - A set of tools and services offering real-time visibility across an organization's information security systems, and event log management that consolidates data from numerous sources.Security Policy Management - The process of identifying, implementing, and managing the rules and procedures that all individuals must follow when accessing and using an organization's IT assets and resources.Threat Analysis - Monitor intelligence-gathering and anticipate potential threats to an IT / OT systems proactively. This involves the pre-emptive analysis of potential perpetrators, anomalous activities and evidence-based knowledge and inferences on perpetrators' motivations and tactics.Threat Hunting - Searches through networks, endpoints, and datasets to detect and isolate cyber threats that evade existing security solutions.Vulnerability Management - The process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization with the necessary knowledge, awareness and risk background to understand the threats to its business.Marathon Petroleum Company LP is an Equal Opportunity Employer and gives consideration for employment to qualified applicants without discrimination on the basis of race, color, religion, creed, sex, gender (including pregnancy, childbirth, breastfeeding or related medical conditions), sexual orientation, gender identity, gender expression, reproductive health decision-making, age, mental or physical disability, medical condition or AIDS / HIV status, ancestry, national origin, genetic information, military, veteran status, marital status, citizenship or any other status protected by applicable federal, state, or local laws.
We will consider all qualified Applicants for employment, including those with arrest or conviction records, in a manner consistent with the requirements of applicable state and local laws.
J-18808-Ljbffr