What you'll do...
Roles & Responsibilities:
In Cybersecurity, you will have the opportunity to work in a specific capability/discipline based on your skillset, role availability and more. The list below includes but is not limited to the different capabilities/disciplines and roles you could be considered for. We encourage you to familiarize yourself with each area to gain a better understanding of the potential opportunities.
Network Engineer, Cybersecurity :
- Resolves network security infrastructure issues by troubleshooting and diagnosing through root cause analysis.
- Enhances network security infrastructure by monitoring network performance.
- Installs network security infrastructure; assists team members with changes; works with suppliers and senior team members to review system performance.
- Assesses potential network security issues and identifies solutions.
- Conducts audits on network rules, alerts, and monitors on a scheduled basis.
- Assists in network security design.
Systems Engineer, Cybersecurity :
- Resolves security system issues (e.g., configuration and management of security systems, spam filtering, identify and access management) by troubleshooting and diagnosing through root cause analysis.
- Assesses potential security system issues and identifies solutions.
- Enhances security systems by monitoring and maintaining security products.
- Installs security systems; assists team members with changes; works with suppliers and senior team members to review system performance; identifies and recommends improvements to system alerts and monitors.
- Conducts audits on security systems.
- Assists in network security design.
Specialist, Security Testing :
- Supports risk analysis and security testing by assisting development teams in the application of security methodologies and techniques.
- Determines testing scope for assigned projects.
- Conducts exploitation testing utilizing security testing tools.
- Assesses application and system deployments for security vulnerabilities.
- Recommends code fixes or solutions for security vulnerabilities.
Intelligence Analyst III, Cybersecurity :
- Monitors cyber threats by leveraging industry standard tools, custom tools, and best practices.
- Collects, analyzes, and correlates data points between various feeds, tools, and personal interactions.
- Analyzes data to determine the need for further action.
- Discerns patterns of complex threat actor behavior.
- Communicates an understanding of current and developing cyber threats.
- Develops written intelligence briefings for various levels of stakeholders.
Intrusion Analyst III, Cybersecurity :
- Monitors, analyzes, and remediates cybersecurity events by adhering to defined operating procedures.
- Works problem tickets and outstanding cases.
- Documents analytical steps during alert research and remediation.
- Communicates with stakeholders during event troubleshooting and research.
- Drafts and reviews standard operating procedures for new cybersecurity alerts.
- Supports security operations center processes and procedures.
- Modifies alert logic for higher fidelity and identifies new risk detections.
- Improves the quality of analytical capabilities by remediating missing or failed standard operating procedures and critical cybersecurity alerts.
Data Assurance Analyst III, Cybersecurity :
- Monitors data movement by utilizing data loss prevention tools.
- Analyzes alerts and identifies correlating data points between various feeds, tools, and personal interactions.
- Analyzes data to determine the need for further action.
- Develops and implements data loss prevention system solutions by assisting Technical Experts in setting technical direction.
Corporate
Cybersecurity, Computer Science, Computer Information Systems, Information Assurance, or other relevant majors
Minimum Qualifications
You will also receive PTO and/or PPTO that can be used for vacation, sick leave, holidays, or other purposes. The amount you receive depends on your job classification and length of employment. It will meet or exceed the requirements of paid sick leave laws, where applicable.
For information about PTO, see
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to a specific plan or program terms.
For information about benefits and eligibility, see
The annual salary range for this position is $90,000.00-$180,000.00 Additional compensation includes annual or quarterly performance bonuses. Additional compensation for certain positions may also include: - Stock
Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.
Option 1: Bachelor’s degree in computer science, information technology, engineering, information systems, cybersecurity or related area and 2years’ experience in intrusion analysis or related area at a technology, retail, or data-driven company. Option 2: 4 years’ experience in intrusion analysis or related area at a technology, retail, or data-driven company.
Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.
702 Sw 8Th St, Bentonville, AR 72716, United States of America