NO RELOCATION ASSISTANCE AVAILABLE. POSITION REQURES MINIMUM OF 3 DAYS IN OFFICE.
The Cybersecurity Operations Center Analyst serves as the frontline defense for the organization's information security, responsible for the continuous monitoring of the security toolstack to identify alerts and suspicious activity. Operating within the Cybersecurity Operations team, this role focuses on the triage and escalation of incidents based on severity, ensuring rigorous adherence to established runbooks and incident handling procedures. This position demands a detail-oriented professional who demonstrates ownership by documenting findings, maintaining accurate incident logs, and engaging in proactive threat hunting across multiple platforms. The Cybersecurity Analyst acts decisively to troubleshoot technical issues using multiple sources and contributes to the team’s collective goals by completing backlog user stories and participating in the after-hours on-call rotation.
Responsibilities (Required):
Monitor SIEM dashboards for alerts and suspicious activity
Triage and escalate incidents based on severity
Document findings and maintain incident logs
Follow established runbooks for incident handling
Engage in threat hunting across multiple platforms
Complete simple backlog user stories
Participate in after-hours on-call rotation
Experience Education (Preferred):
Minimum of 4 years combined education (associate or bachelor’s degree) or professional experience in computer science, engineering, information technology, or a related field, with focus on system administration, security operations, or incident response.
Competencies (Required):
Attention to detail and analytical thinking
Ability to work under pressure and follow procedures
Basic understanding of networking and operating systems
Ability to troubleshoot technical issues using multiple sources
Industry Knowledge/Skills (Preferred):
Knowledge of some of the following:
Audit requirements (PCI, HIPPA, SOX, etc.)
Blue Team/Defensive security concepts
Red Team/Offensive security concepts
MITRE ATT&CK and Malware TTPs (tactics, techniques and procedures)
Current threat landscape (threat actors, APT, cyber-crime, etc.)
Log parsing and analysis skill set
Incident investigation and response skill set
Threat Intelligence
Technical/Tool Skills (Preferred):
SIEM tools (Splunk, Crowdstrike NG SIEM, ArcSight)
Basic TCP/IP networking concepts
Windows/Linux system administration fundamentals
Familiarity with host security fundamentals
Networking security fundamentals
Cloud computing security fundamentals
Certifications: Working Towards certifications in the following areas:
Incident Handler (GCIH)
Intrusion Analyst (GCIA)
This role has a salary range of $59,840 - $89,760. In most cases, candidates offered employment can expect to be hired at a pay rate near the middle of our salary ranges.
About Land O'Lakes, Inc.
Join us and be part of a Fortune 250, farmer- and member-owned cooperative that is reimagining the business of food. We have been named a Top Workplace by Indeed and LinkedIn, and to the TIME 100 Most Influential Companies list.
Benefits for most full-time roles include medical, dental, vision, PTO, life & disability insurance, education assistance, a 401k and a variety of well-being resources. Most part-time employees are eligible for prorated PTO, holiday pay, employee development programs, prorated education assistance, and a 401(k).
Land O'Lakes, Inc. is an Equal Opportunity Employer (EOE) M/F/Vets/Disabled. The company maintains a drug-free workforce, including post-employment substance abuse testing pursuant to a Drug and Alcohol Policy.
Neither Land O’Lakes, nor its search firms, will ever contact you and ask for confidential information over the phone or in email. If you receive a call or email like this, please do not provide the information being requested.