A great job-and a great future-awaits you at Smithfield Foods. We're an $18 billion U.S. food company with nearly 60,000 employees worldwide. We're looking for motivated people who want to join our team and grow lasting and meaningful careers with us. Join our family today. Apply Now!
Your Opportunity
Our team members receive industry-competitive salaries and are eligible for great benefits packages:
- Competitive Pay: $66,000 - $96,250 annually
- Annual Bonus Earning Potential
- Comprehensive Health Insurance, Retirement Benefits and More
- Education benefit available to full and part-time Smithfield team members on their first day of employment.
The position summary states the general nature and purpose of the job. Overall accountabilities are defined in this section.
As part of a Critical Security Incident Response Team, the Vulnerability Management Analyst will assist the incident commander to coordinate efficient and rapid response to minimize the impact of a cyber event on business operations and the confidentiality, availability, and integrity of data. As a VM Analyst, you will maintain various solutions to detect and report vulnerabilities in systems, applications, configurations, and processes that may present a risk to the confidentiality, availability and integrity of the information technology assets and services. Success in this role requires the ability to collaborate at multiple levels of the cybersecurity team, the ability to weigh risk against the impact to business operations, and proven technical cybersecurity experience for a rapidly growing organization.
Core Responsibilities
- Regularly meets with the Director of Cybersecurity and the Security Operations Team to review threat activity, adversary tactics, targeted vulnerabilities, and exposure risks.
- Works closely with other cybersecurity leadership to develop, test, and implement new cybersecurity software and managed services.
- Administers security solutions that scan and detect vulnerabilities within IT assets, applications, cloud services and third-party service providers.
- Conducts security testing of networks, systems, cloud-based and virtualization systems.
- Proactively measures the effectiveness of the program through monitoring conformance against baseline, patching and application security requirements and standards.
- Conducts recurring scanning for enterprise assets, report discovered vulnerabilities, and assist with mitigation strategies for vulnerabilities that cannot be corrected (zero day).
- Interfaces and coordinates with system owners and support teams to analyze and review mitigation strategies; provide guidance and assist when strategies need to be enhanced.
- Maintains technical expertise relevant to industry standards and best practices as assigned in cybersecurity technologies such as: Endpoint protection - Network, Server, Virtual system, and cloud security hardening.
- Cloud deployment and security models including public, community, private, and hybrid.
- Cloud service delivery models including infrastructure, platform and software-as-a-service.
- Email threat protection.
- Penetration testing.
- Configuration Management
- Maintains awareness of latest cybersecurity risks, threat actor tactics, techniques, and procedures (TTPs).
- Works with SOC staff to continuously develop and document incident response playbooks in accordance with the ever-changing threat landscape.
- Participates in security audits, threat path analysis, and security capability assessments.
- Works with managed security services to monitor logs and report security events as assigned.
- Participates in a rotating emergency on-call as well as respond to Critical Incident Response Team activations.
- Performs log analytics work to investigate incidents and identify potential threats as assigned
- Performs analysis of system security on Windows and Linux hosts as assigned
- Understands and deploys encryption technologies as assigned such as TLS, IPSEC, PGP, certificates, etc.
- Proactively identifies security issues and risks and in collaboration with IT, develops remediation and mitigation plans
- Supports the risk and compliance efforts of the security organization
- Collaborate with other cybersecurity engineers and analysts in the IT and OT organizations to manage security threats and response capabilities
- Responsible to meet KPIs and KRIs and adapt to changes in the threat landscape.
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. May perform other duties as assigned.
Qualifications
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals to perform the essential functions.
- Bachelor's Degree from an accredited four-year college or university in Computer Science, Cybersecurity, Electrical Engineering, or a related field and 2+ years of relevant experience in Information Security, Vulnerability Management, Threat Intelligence, or relevant experience; or an equivalent combination of education and experience, required.
- CISSP, CISM or equivalent security certification preferred.
- Experience with "defense-in-depth" and "defense-in-breadth" principles and technology.
- Experience with Enterprise level Vulnerability/Pen-Test solutions (Rapid7, Nessus, BurpSuite).
- Experience with Enterprise level SIEM solutions (QRadar, LogRhythm, ArcSight, Splunk, etc.).
- Understanding of frameworks such as PCI, SOX, SOC 2, HIPAA, GLBA, NIST CSF, NIST SF800, MITRE, ISO 27001
- Strong familiarity with OWASP TOP 10 vulnerabilities, SANS 25, MITRE and CWEs.
- Deep understanding and ability in network packet analysis.
- Experience working in a multinational company with complex integrated environments in Information Technology (IT). Experience in Operations Technology (OT) desired.
- Broad and deep knowledge of business, technology/IT and information security technologies and approaches.
- Advanced documentation, prioritization, and analytical skills.
- Ability to handle proprietary and sensitive information in a confidential manner.
- Ability to be respectful, approachable and team oriented while building strong working relationships and a positive work environment.
- Ability to communicate effectively across all levels of the organization, including the delivery and explanation of complex security-related concepts into clear, concise, and understandable terms.
- Demonstrated flexibility, organization, and autonomy.
- Experience in MS Azure/AWS security and protection technologies.
- Experience with endpoint protection solutions and advanced email threat protection.
- Experience with Windows Active Directory security.
- Endpoint remediation/ forensic investigation experience.
- Experience with Web Application Firewall management.
EEO/AA Information
Smithfield is an equal opportunity employer committed to workplace diversity. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, age, gender identity, protected veterans status, status as a disabled individual or any other protected group status or non-job characteristic as directed by law.
If you are an individual with a disability and would like to request a reasonable accommodation for any part of the employment selection process, please call us at 757-357-1595.