Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Cybersecurity Analyst, Third Party Risk.
United States Jobs Expertini

Urgent! Cybersecurity Analyst, Third Party Risk Job Opening In Findlay – Now Hiring Marathon Petroleum Corporation

Cybersecurity Analyst, Third Party Risk



Job description

An exciting career awaits you


At MPC, we’re committed to being a great place to work – one that welcomes new ideas, encourages diverse perspectives, develops our people, and fosters a collaborative team environment.

Position Summary

We are seeking a detail-oriented and analytical Cybersecurity Analyst – Third Party Risk to join our cybersecurity team.

In this role, you will be responsible for assessing, monitoring, and managing cybersecurity risks associated with third-party vendors, partners, and service providers.

You will play a critical role in protecting our organization’s data and systems by ensuring our external relationships meet our security standards and compliance requirements.

Key Responsibilities

  • Perform third-party cybersecurity risk assessments and due diligence for vendors by evaluating security controls through questionnaires, documentation reviews, and ratings tools; collaborate with procurement, legal, and business units to embed cybersecurity requirements into contracts and vendor selection processes.
  • Drive risk remediation and continuous improvement by tracking mitigation efforts, staying informed on emerging threats and regulatory changes, and applying insights to strengthen third-party risk management practices.
  • Conducts controls analysis of business process and systems and reports impact of changes and additions to security systems.
  • Assists with the resolution of routine multi-functional technical issues.

    Prepares, performs and presents cybersecurity assessments and associated risks.
  • Evaluates the efficiency and effectiveness of Security processes and controls in place ensuring confidentiality, integrity, and availability of data/ information, under guidance of more senior colleagues.
  • Recommends and/or executes remediation and develops cost information for such mitigation measures.

    Monitors networks, systems, and applications for signs of potential cybersecurity incidents.

    Investigates and analyzes the nature and scope of cyber incidents.
  • Analyzes security protocols, compliance reviews, administers and maintains security audits and reports of server access and activity; participates in disaster recovery planning per corporate guidelines.
  • Delivers and implements global security initiatives, policies, and compliance requirements.

    Works with IT and security engineers to produce metrics related to cybersecurity.
  • Takes action through collaboration to improve metric results.

    Executes cyber security-related consulting, guidance, and support to customers and stakeholders.
  • Effectively communicates emerging Information Technology/Operations Technology and cybersecurity technology trends as well as their impact on the security landscape.
  • Education and Experience

  • Bachelor’s Degree in Information Technology, related field or equivalent experience.
  • Professional certification, e.g. CISA, CRISC, CISSP, or CTPRP preferred.
  • 2+ years of relevant experience required
  • Experience in cybersecurity, risk management, or vendor risk assessment required.
  • Experience with third-party risk management platforms and tools (e.g., CyberGRX, BitSight) preferred.
  • Experience with cybersecurity risk frameworks (NIST CSF, NIST 800-53, and COBIT) preferred.
  • Experience reviewing and interpreting SOC 2 Type II reports, with the ability to assess control effectiveness, identify relevant findings, and evaluate vendor risk posture preferred.
  • Skills

    Authentic Communicator -Expresses ideas and information, both verbally and in writing, clearly and credibly.

    Listens to understand and fosters constructive dialogue.

    Cybersecurity Risk Management - The process of developing cyber risk assessment and treatment techniques that can effectively pre-empt and identify significant security loopholes and weaknesses, demonstrating the business risks associated with these loopholes and providing risk treatment and prioritization strategies to effectively address the cyber-related risks, threats and vulnerabilities, ensuring appropriate levels of protection, confidentiality, integrity and privacy in alignment with the security framework.

    General Programming - Applies a computer language to communicate with computers using a set of instructions and to automate the execution of tasks.

    Intrusion Detection - The use of security analytics, including the outputs from intelligence analysis, predictive research and root cause analysis in order to search for and detect potential breaches or identify recognized indicators and warnings.

    Also, monitoring and collating external vulnerability reports for organizational relevance, ensuring that relevant vulnerabilities are rectified through formal change processes.

    Penetration Testing - The practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.

    Penetration testing can be automated with software applications or performed manually.

    Security Controls - Manages and maintains an information system that focus on the management of risk and the management of information systems security.

    Security Governance - The process of developing and disseminating corporate security policies, frameworks and guidelines to ensure that day-to-day business operations are guarded and well protected against risks, threats and vulnerabilities.

    Security Information & Event Management (SIEM) - A set of tools and services offering real-time visibility across an organization's information security systems, and event log management that consolidates data from numerous sources.

    Security Policy Management - The process of identifying, implementing, and managing the rules and procedures that all individuals must follow when accessing and using an organization's IT assets and resources.

    Threat Analysis - Monitor intelligence-gathering and anticipate potential threats to an IT/OT systems proactively.

    This I nvolves the pre-emptive analysis of potential perpetrators, anomalous activities and evidence-based knowledge and

    inferences on perpetrators' motivations and tactics.

    Threat Hunting - Searches through networks, endpoints, and datasets to detect and isolate cyber threats that evade existing security solutions.

    Vulnerability Management - The process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization with the necessary knowledge, awareness and risk background to understand the threats to its business.

    As an energy industry leader, our career opportunities fuel personal and professional growth.

    Location:

    Findlay, Ohio

    Additional locations:

    San Antonio, Texas

    Job Requisition ID:

    00017823

    Location Address:

    539 S Main St

    Education:

    Employee Group:

    Full time

    Employee Subgroup:

    Regular

    Marathon Petroleum Company LP is an Equal Opportunity Employer and gives consideration for employment to qualified applicants without discrimination on the basis of race, color, religion, creed, sex, gender (including pregnancy, childbirth, breastfeeding or related medical conditions), sexual orientation, gender identity, gender expression, reproductive health decision-making, age, mental or physical disability, medical condition or AIDS/HIV status, ancestry, national origin, genetic information, military, veteran status, marital status, citizenshipor any other status protected by applicable federal, state, or local laws.If you would like more information about your EEO rights as an applicant, .

    If you need a reasonable accommodation for any part of the application process at Marathon Petroleum LP, please contact our Human Resources Department at .

    Please specify the reasonable accommodation you are requesting, along with the job posting number in which you may be interested.

    A Human Resources representative will review your request and contact you to discuss a reasonable accommodation.Marathon Petroleum offers a total rewards program which includes, but is not limited to, access to health, vision, and dental insurance, paid time off, 401k matching program, paid parental leave, and educational reimbursement.

    Detailed benefit information is available at .The hired candidate will also be eligible for a discretionary company-sponsored annual bonus program.

    Equal Opportunity Employer: Veteran / Disability

    We will consider all qualified Applicants for employment, including those with arrest or conviction records, in a manner consistent with the requirements of applicable state and local laws.

    In reviewing criminal history in connection with a conditional offer of employment, Marathon will consider the key responsibilities of the role.


    Required Skill Profession

    Computer Occupations



    Your Complete Job Search Toolkit

    ✨ Smart • Intelligent • Private • Secure

    Start Using Our Tools

    Join thousands of professionals who've advanced their careers with our platform

    Rate or Report This Job
    If you feel this job is inaccurate or spam kindly report to us using below form.
    Please Note: This is NOT a job application form.


      Unlock Your Cybersecurity Analyst Potential: Insight & Career Growth Guide


    • Real-time Cybersecurity Analyst Jobs Trends in Findlay, United States (Graphical Representation)

      Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Cybersecurity Analyst in Findlay, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 64749 jobs in United States and 12 jobs in Findlay. This comprehensive analysis highlights market share and opportunities for professionals in Cybersecurity Analyst roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

    • Are You Looking for Cybersecurity Analyst, Third Party Risk Job?

      Great news! is currently hiring and seeking a Cybersecurity Analyst, Third Party Risk to join their team. Feel free to download the job details.

      Wait no longer! Are you also interested in exploring similar jobs? Search now: .

    • The Work Culture

      An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at Marathon Petroleum Corporation adheres to the cultural norms as outlined by Expertini.

      The fundamental ethical values are:
      • 1. Independence
      • 2. Loyalty
      • 3. Impartiality
      • 4. Integrity
      • 5. Accountability
      • 6. Respect for human rights
      • 7. Obeying United States laws and regulations
    • What Is the Average Salary Range for Cybersecurity Analyst, Third Party Risk Positions?

      The average salary range for a varies, but the pay scale is rated "Standard" in Findlay. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

    • What Are the Key Qualifications for Cybersecurity Analyst, Third Party Risk?

      Key qualifications for Cybersecurity Analyst, Third Party Risk typically include Computer Occupations and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

    • How Can I Improve My Chances of Getting Hired for Cybersecurity Analyst, Third Party Risk?

      To improve your chances of getting hired for Cybersecurity Analyst, Third Party Risk, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

    • Interview Tips for Cybersecurity Analyst, Third Party Risk Job Success
      Marathon Petroleum Corporation interview tips for Cybersecurity Analyst, Third Party Risk

      Here are some tips to help you prepare for and ace your job interview:

      Before the Interview:
      • Research: Learn about the Marathon Petroleum Corporation's mission, values, products, and the specific job requirements and get further information about
      • Other Openings
      • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
      • Dress Professionally: Choose attire appropriate for the company culture.
      • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
      • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
      During the Interview:
      • Be Punctual: Arrive on time to demonstrate professionalism and respect.
      • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
      • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
      • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
      • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
      • Follow Up: Send a thank-you email to the interviewer within 24 hours.
      Additional Tips:
      • Be Yourself: Let your personality shine through while maintaining professionalism.
      • Be Honest: Don't exaggerate your skills or experience.
      • Be Positive: Focus on your strengths and accomplishments.
      • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
      • Turn Off Phone: Avoid distractions during the interview.
      Final Thought:

      To prepare for your Cybersecurity Analyst, Third Party Risk interview at Marathon Petroleum Corporation, research the company, understand the job requirements, and practice common interview questions.

      Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the Marathon Petroleum Corporation's products or services and be prepared to discuss how you can contribute to their success.

      By following these tips, you can increase your chances of making a positive impression and landing the job!

    • How to Set Up Job Alerts for Cybersecurity Analyst, Third Party Risk Positions

      Setting up job alerts for Cybersecurity Analyst, Third Party Risk is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!