Tactical Intelligence Analyst (TIA)-Various Locations
For more than a century, the people of Archer Daniels Midland Company (NYSE: ADM) have transformed crops into products that serve the vital needs of a growing world. Today, we?re one of the world?s largest agricultural processors and food ingredient providers, with approximately 40,000 employees serving customers in more than 170 countries. With a global value chain that includes approximately 500 crop procurement locations, 270 ingredient manufacturing facilities, 44 innovation centers and the world?s premier crop transportation network, we connect the harvest to the home, making products for food, animal feed, industrial and energy uses. Learn more at www.adm.com.Tactical Intelligence Analyst (TIA)-Various LocationsThis is an exempt level position.Position Summary: Cyber Threat Intel Analysts provide direct support to the Intel function by consuming and analyzing tactical threat intel (such as IOCs) and acting as liaisons between Security Operations/Incident Response operators and the Threat Fusion Leader (TFL) in order to add strategic context to security investigations. They are able to provide Intel support to primary Incident Response analyst, but also are capable of directly assisting or executing investigative efforts or tasks. In addition, TIAs provide guidance to (or lead) hunt missions, augment detection capabilities, support response efforts from a technical perspective, and extract and correlate indicators or artifacts. This position can be located in any Global IT hub in North America, South America, EMEA or APAC.Job Responsibilities:Collect, process, analyze, and disseminate strategic and tactical intelligence throughout the organization Develop, maintain, and execute threat and risk communication processes Demonstrate and apply subject matter expertise in a variety of information security disciplines, both technical and non-technical Employ predictive analytic methods to determine changes in adversary?s capabilities, motivations, and intent, while providing recommendations to reduce risk before exposure to threats occur Provide direct analytic support to the Security Operations and Incident Response teams, providing context to active threats using intelligence Support daily operations and existing processes, as requested by the Leadership Ability to lift 50 lbs. and detect color coded events Preferred Skills:Three or more years of direct experience actively managing/using threat intelligence to reduce risk and threat exposure is a plusMilitary or Agency Intel experience a plusExperience in information security best practices and threat analysisFamiliarity with various technologies such as SIEM, IDS/IPS, Proxy, endpoint and enterprise incident management systems, as well as applications such as Microsoft Office, ServiceNow, or comparable productsExperience in host- and network-based defense, or monitoring and detection best practicesExperience in dynamic/behavioral malware analysis methods and technologyFundamental analytic tradecraft skill sets, with extensive experience in extracting and analyzing tactical intelligence from investigationsUnderstanding of vulnerability and exploitation concepts, or experience in penetration testingBackground in application security best practices, or secure software developmentKnowledge of the current cyber threat landscape, with a specific focus on the technical aspects of adversarial TTPs and their relation to the cyber kill chainAbility to work independently and function effectively as part of a team in a dynamic environmentWorking knowledge of intelligence analysis applications, tools, and systemsWilling to train those with 3+ years of full time IT or Intelligence experience.Job Qualifications: Bachelor?s Degree in computer science, engineering, computer information systems, or 3+ years of experience in an information security-related fieldIntel Agency or Military Intel experience a plusDemonstrated experience with information systems, computer science, information security, data security and network security CISSP or SANS certification preferredIn-depth knowledge of ITUnderstanding of computer intrusions, malicious code, and basic technical aspects of associated threat vectors residing in the manufacturing, brokerage services and business operation functionsStrong verbal and written communication and presentation skills LocationsThis job requires reporting to an ADM office in one of the following locations: Greater Cincinnati Area, USA (Erlanger, Ky, USA)Decatur, Il, USAAmsterdam, Netherlands.Hamburg, GermanyHeidelberg, GermanyTelecommuting is not available for this position.Relocation assistance may be available with this position.
This position offers a complete benefit package, including 401K/ESOP, pension, health, life and dental insurance. ADM requires the successful completion of applicable pre-employment drug screen, medical questionnaire and a background check.
ADM is an equal opportunity employer and makes employment decisions without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age disability and veteran status.