Senior Cybersecurity Analyst

Confidential Company  •  Hopkins, MN

Less than 5 years experience  •  Agriculture

Salary depends on experience
Posted on 09/20/17 by Eric Boelkins
Confidential Company
Hopkins, MN
Less than 5 years experience
Agriculture
Salary depends on experience
Posted on 09/20/17 Eric Boelkins

You have a Bachelors degree in Information Technology, Information Assurance, Computer Science or related field and hold industry-recognized Information Security Certifications. 

You have three (3) or more years experience in triaging information security alerts from tools like SIEM, DLP, Proxy and other CND security tools.

 You have strong knowledge of Windows and Linux OS that includes experience working in the command line interface.

You have experienceinvestigating and mitigating complex incidents involving various enterprise level cyber-attack methods. You seek a new opportunity with a global leader whose 150, employees in 70 countries are committed to nourishing the world in a safe, responsible and sustainable way, all while strengthening the communities where they live and work.

If the above describes you, we would very much like to get to know you. We seek candidates for the role of Senior Security Operations Center (SOC) Analyst. In this role you will serve as the first line of defense, responsible for detecting and investigating cybersecuritythreats to the company. This role provides an opportunity to work with advanced Network and Endpoint Detection and Response tools in support of a comprehensive cybersecurity program. As a senior member of the Security Operations Team, you will have a role in mentoring junior analysts as well as a critical role in content development and alarm refinement. You will support the 24/7 coverage of Security Operations, working the 11am – 7pm CST shift Monday - Friday and take part in a weekend on-call rotation.

Candidates must have a Bachelors degree in Information Technology, Information Assurance, Computer Science or equivalent. Preference given to candidaets with a Master’s degree. Must have industry-recognized Information Security Certifications, including SANS GIAC Certifications (ideally GCIH, GCFA, GREM, CISSP, Security). Must have three (3) or more years of experience in triaging information security alerts from tools like SIEM, DLP, Proxy and other CND security tools. Must have two (2) or more years of experience in at least three of the following disciplines within cybersecurity: malware reverse engineering, SIEM content development, digitalforensics, host and/or network, penetration testing, network perimeter defense, vulnerability assessment. Must have demonstrated knowledge of Windows and Linux OS to include experience working in the command line interface. Must have demonstrated ability to manage multiple tasks, priorities, and operational assignments in a high pressure environment.

Not the right job?
Join Ladders to find it.
With a free Ladders account, you can find the best jobs for you and be found by over 20,0000 recruiters.