Overview
On Site
Full Time
Skills
SAFE
Facilitation
Regulatory Compliance
Legal
System On A Chip
Management
SIEM
Network
Log Analysis
Firewall
IDS
IPS
Servers
Threat Analysis
Documentation
Security Operations
Analytics
Partnership
Cyber Security
Information Retrieval
Investor Relations
International Relations
Incident Management
Job Details
Cargill's size and scale allows us to make a positive impact in the world. Our purpose is to nourish the world in a safe, responsible and sustainable way. We are a family company providing food, ingredients, agricultural solutions and industrial products that are vital for living. We connect farmers with markets so they can prosper. We connect customers with ingredients so they can make meals people love. And we connect families with daily essentials - from eggs to edible oils, salt to skincare, feed to alternative fuel. Our 160,000 colleagues, operating in 70 countries, make essential products that touch billions of lives each day. Join us and reach your higher purpose at Cargill.
Job Purpose and Impact
Key Accountabilities
Qualifications
Equal Opportunity Employer, including Disability/Vet.
Job Purpose and Impact
- The Consultant, Core Cyber Operations - SOC job enhances our security operations by supporting organization-wide cybersecurity threat detection and response processes. The ideal candidate will have a background in incident response, cybersecurity, and/or security operations. This job is part of the team responsible for identifying, analyzing, and mitigating cyber threats, ensuring a robust security posture, and facilitating compliance with legal and regulatory requirements.
Key Accountabilities
- INCIDENT RESPONSE: Lead response to a wide range of cybersecurity incidents. Conduct deeper investigations, confirm incidents, and lead containment efforts based on escalations from SOC analysts. Follow established protocols and document findings.
- SECURITY MONITORING: Design, implement, and manage solutions to enhance incident response processes. Continuously monitor security alerts and events using SIEM tools to identify potential threats. Analyze logs and network traffic to detect anomalies and suspicious activities.
- LOG ANALYSIS: Perform detailed analysis of logs from various sources (e.g., EDR, firewalls, IDS/IPS, servers) to identify and investigate security incidents.
- THREAT INTELLIGENCE: Utilize threat intelligence feeds to stay informed about emerging threats. Apply this knowledge to enhance detection capabilities and improve response strategies.
- DOCUMENTATION: Document security incidents thoroughly, including steps taken and outcomes. Create and maintain process documentation to ensure consistent and efficient security operations
- CYBER SERVICES VISIBILITY: Oversees the design and operation to assure situational visibility for all cyber services, including foundational cyber analytics and automation.
- THIRD PARTY COMPROMISE: Fosters partnerships on third party compromise response activities to address and mitigate risks associated with external entities
Qualifications
- Minimum requirement of 4 years of relevant work experience.
- Strong knowledge of cybersecurity principles, threat detection, and incident response.
- Proven experience in IR (Incident Response)
- Industry Certifications strongly preferred
Equal Opportunity Employer, including Disability/Vet.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.