Job Description:As stated in the Land O'Lakes Job Posting policy, all employees who post for an internal opening must inform their current manager at the time they apply.
Our growth relies on our extraordinary talent. Unlock your greatest potential at Land O'Lakes by continuing to make a difference, driving results and growing your career.
Cybersecurity Operations Center Analyst
NO RELOCATION ASSISTANCE AVAILABLE. POSITION REQURES MINIMUM OF 3 DAYS IN OFFICE.
The Cybersecurity Operations Center Analyst serves as the frontline defense for the organization's information security, responsible for the continuous monitoring of the security toolstack to identify alerts and suspicious activity. Operating within the Cybersecurity Operations team, this role focuses on the triage and escalation of incidents based on severity, ensuring rigorous adherence to established runbooks and incident handling procedures. This position demands a detail-oriented professional who demonstrates ownership by documenting findings, maintaining accurate incident logs, and engaging in proactive threat hunting across multiple platforms. The Cybersecurity Analyst acts decisively to troubleshoot technical issues using multiple sources and contributes to the team's collective goals by completing backlog user stories and participating in the after-hours on-call rotation.
Responsibilities (Required): Monitor SIEM dashboards for alerts and suspicious activity
Triage and escalate incidents based on severity
Document findings and maintain incident logs
Follow established runbooks for incident handling
Engage in threat hunting across multiple platforms
Complete simple backlog user stories
Participate in after-hours on-call rotation
Experience Education (Preferred): Minimum of 4 years combined education (associate or bachelor's degree) or professional experience in computer science, engineering, information technology, or a related field, with focus on system administration, security operations, or incident response.
Competencies (Required): Attention to detail and analytical thinking
Ability to work under pressure and follow procedures
Basic understanding of networking and operating systems
Ability to troubleshoot technical issues using multiple sources
Industry Knowledge/Skills (Preferred): Knowledge of some of the following:
Audit requirements (PCI, HIPPA, SOX, etc.)
Blue Team/Defensive security concepts
Red Team/Offensive security concepts
MITRE ATT&CK and Malware TTPs (tactics, techniques and procedures)
Current threat landscape (threat actors, APT, cyber-crime, etc.)
Log parsing and analysis skill set
Incident investigation and response skill set
Threat Intelligence
Technical/Tool Skills (Preferred): SIEM tools (Splunk, Crowdstrike NG SIEM, ArcSight)
Basic TCP/IP networking concepts
Windows/Linux system administration fundamentals
Familiarity with host security fundamentals
Networking security fundamentals
Cloud computing security fundamentals
Certifications: Working Towards certifications in the following areas: Incident Handler (GCIH)
Intrusion Analyst (GCIA)
This role has a salary range of $59,840 - $89,760. In most cases, candidates offered employment can expect to be hired at a pay rate near the middle of our salary ranges.
Grade:
E5
To apply please click on APPLY TO THIS POSITION
Job Post Date: 12/18/25
Follow Company Alert×
By Creating a follow company alert, you will receive alerts once per day when this company or any other company you are following posts new jobs.
Provide your information below to setup an alert.
×
Follow Company Alert Saved
Company alert saved for .
Company alert(s) will be sent to .
Alerts for the companies you are following will be sent once daily as new jobs are posted.
Follow Company Alert×
Follow Company Alert Saved
Follow Company Alert