DescriptionCorteva Agriscience createsthe world's most recognized and premium agricultural solutions to address thegreatest challenges in agriculture. With a focus on technology, CortevaAgriscience creates seed and crop protection products that increaseproductivity and profit for farmers while reducing risks to their business.Every day our digital tools deliver insights our global partners need to thrivenow and into the future. As the worlds first dedicatedagriculture start-up, were building a culture that stays curious, thinksdifferently, acts boldly and takes a stand on whats right for our customers,our co-workers, our partners and our planet. We know weve got big challengesto solve – we hope you'll be part of the solution. Whether you are in the labor on the farm, teaching classes or crafting code – we need bold thinkers andfearless doers to bring their best to the job at hand. Every role at CortevaAgriscience includes an opportunity to grow what matters. Role SummaryThis key role is responsible for overseeing the developmentand day-to-day operation of the Security Operations Center (SOC) and defensivecyber architecture which will require hiring, mentoring, training and managinganalysts and engineers and ensuring cyber defensive policies and procedures aredeveloped, documented, implemented and enforced. This role is required tocommunicate with senior management and serve as the organizational point personfor responding to business-critical cybersecurity incidents. Providing overalldirection for the implementation of all security monitoring functions includingbut not limited to systems, networks, databases, user behavior, file integrity,and cloud environments, and ensure the remediation of identified risks andvulnerabilities is important. Establishing KPIs and team metrics will befundamental to the role. The ability to keep a calm demeanor under pressure andadverse situations are a must. Key Responsibilities& Accountabilities ResponsibilitiesLeadthe cyber security team responsible for implementing and operating thedefensive architecture and SOC.Leadthe development and implementation of a SOC that monitors security events foranomalies and detects security incidents.Coordinate,measure and report on the technical aspects of security operations to uppermanagement.Managethe security operations and infrastructure teams that detect and thwart attacksand provide guidance on new ways of addressing threats in real-time.AccountabilitiesGuidethe incident response and disaster recovery team in development, testing andmaintenance of incident response plans.Design,coordinate and oversee monitoring capabilities to verify the security ofsystems, networks, databases, user behavior, file integrity, and cloudenvironments, and manage the remediation of identified risks andvulnerabilities.Ensureaudit trails, system logs and other monitoring data sources are reviewed.periodically and are in compliance with policies and audit requirements.QualificationsKey Competencies RequiredTechnical CompetenciesExperienceimplementing and managing operational security capabilities including logmanagement, event monitoring, incident detection, data loss prevention, userbehavior analytics, and vulnerability scanning.Experiencewith using open source and paid threat intelligence sources.Experiencewith the evaluation and selection of products and vendors to supportinitiatives.Experiencewith conducting a post incident investigation leveraging forensic tools.Developmentof security plans and strategies for complex enterprises.Implementationof complex security initiatives.Knowledgeof IT infrastructure: applications,databases, operating systems
Windows, Unix and Linux, hypervisors, IPnetworks
WAN and LAN, storage networks
Fibre Channel, iSCSI and NAS, backupnetworks and media.Knowledgeof OT security considerations, including ICS and safety systems desired.Exposureto R&D environments desired.Leadership CompetenciesLeadership experience as a part oftransformational information or cybersecurity efforts.Experienceleading incident response teams.Experiencepresenting executive level and detailed technical summary of securityenvironment, security posture against key risk indicators.Experience &Education RequiredTen years experience in thecybersecurity field or related experience.Bachelors Degree inComputer Science, Information Technology, Engineering, or related fields.M.B.A or M.S. in informationsecurity is preferred.