Target
Lead Cybersecurity Analyst - CSIRT(Remote Or Hybrid)
Target, Saint Paul, Minnesota, United States, 55130
The pay range is $111,200.00 - $200,200.00 Pay is based on several factors which vary based on position. These include labor markets and in some instances may include education, work experience and certifications. In addition to your pay, Target cares about and invests in you as a team member, so that you can take care of yourself and your family. Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves. Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Find competitive benefits from financial and education to well-being and beyond at https://corporate.target.com/careers/benefits . JOIN TARGET CYBERSECURITY AS A LEAD CYBERSECURITY ANALYST - CSIRT (INCIDENT RESPONSE) About Us Target is an iconic brand, a Fortune 50 company and one of Americas leading retailers. Target as a tech company? Absolutely. Were the behind-the-scenes powerhouse that fuels Targets passion and commitment to cutting-edge innovation. We anchor every facet of one of the worlds best-loved retailers with a strong technology framework that relies on the latest tools and technologiesand the brightest peopleto deliver incredible value to guests online and in stores. Target Technology Services is on a mission to offer the systems, tools and support that guests and team members need and deserve. Our high-performing teams balance independence with collaboration, and we pride ourselves on being versatile, agile and creative. We drive industry-leading technologies in support of every angle of the business, and help ensure that Target operates smoothly, securely, and reliably from the inside out. As a Lead Cybersecurity Analyst on CSIRT, you will assist with leading the team as you assess information security events and incidents across the Target environment. In this role, you will use your expertise to collaborate and utilize problem solving skills as you work among a team of skilled analysts to address complex problems within a 24x7 Cyber Fusion Center (CFC) environment. You will implement new processes and procedures as identified by the CSIRT and CFC Leadership to ensure continuous improvements for Targets monitoring, detection, and mitigation capabilities. You will use your expert-level knowledge of Information Security to monitor SIEM and logging environments for security events and alerts to potential (or active) threats, intrusions, and/or compromises. You will lead internal training of CSIRT Analysts to ensure their continued education as an Analyst and growth. You will work to understand the global threat landscape by working with Target Cyber Threat Intel team to maintain awareness. You will review and guide requests from internal teams and will escalate information security events according to Targets Cyber Security Incident Response Plan. Additionally, you will lead with containment of threats and remediation of environment during or after an incident. Youll act as the leader during Cyber Hunt activities alongside of the Target's Cyber Hunt Team. You will leverage your expert-level knowledge to write comprehensive reports of incident investigations. Core responsibilities of this job are described within this job description. Job duties may change at any time due to business needs. Note: This is a shift position on Shift 1 within CSIRT. The working hours for this role are Sunday through Wednesday, 5:30am - 3:30pm CT. If you are applying for this role you acknowledge and accept the days and times of this role. About You 4-year degree or equivalent experience 5 years' direct experience with Security Operations, Incident Response, or Digital Forensics Demonstrates leadership skills that assist with driving desired outcomes Security certification (e.g. GCIA, GCIH, CISSP) Thorough understanding of advanced security and network concepts (Operating systems, intrusion/detection, TCP/IP, ports, etc.) Expertise with host and network-based security tools Expertise with network monitoring in a SOC environment Ability to demonstrate expert-level analytical expertise, close attention to detail, excellent critical thinking, logic, and adaptive learning Knowledge in Malware Analysis and Memory Forensics desired Ability to navigate ambiguity and develop working business relationships Excellent written and oral communication skills This position may be considered for a Remote or Hybrid (known internally at Target as "Flex for Your Day") work arrangement based on Target's needs. A Remote work arrangement means the team member works full-time from home or an alternate location that's not a Target location, does not have a desk at a Target location and may travel to HQ up to 4 times a year. A Hybrid/Flex for Your Day work arrangement means the team member's core role may be performed either remote or onsite at a Target location depending upon what your role, team and tasks require for that day. Work duties cannot be performed outside of the country of the primary work location, unless otherwise prescribed by Target. Americans with Disabilities Act (ADA) In compliance with state and federal laws, Target will make reasonable accommodations for applicants with disabilities. If a reasonable accommodation is needed to participate in the job application or interview process, please reach out to candidate.accommodationsHRHelp.Target.com. Application deadline is : 11/30/2024