Cybersecurity Engineer – TI (Remote Opportunity)

Smithfield Foods

Job Locations


US-MO-Kansas City



Your Opportunity

The Cybersecurity Engineer – Threat Intelligence (TI) will actively engage in both proactive and responsive activities within the Security Operations Center (SOC). Working as an integral part of the SOC team, the engineer will utilize advanced threat detection and response solutions to safeguard the organization’s assets. Enabling the organization’s mission, the Cybersecurity Engineer – TI will conduct threat hunting and blue team response activities within an adaptive cybersecurity defense program, prioritizing the protection of information technology assets and services’ availability, integrity, and confidentiality.

As a vital member of the Critical Security Incident Response Team, the Cybersecurity Engineer will act as an incident responder, orchestrating efficient and swift responses to minimize the business operations’ impact and safeguard the confidentiality, availability, and integrity of data during cyber events. Succeeding in this role involves adeptly collaborating across various organizational levels, skillfully weighing risk against business operations’ impact, and showcasing a proven track record in Security Operations within a rapidly expanding organization.

Core Responsibilities

  • As an integral part of the Security Operations Center (SOC) and in accordance with established cybersecurity frameworks and standards, promptly respond to security alerts by following organizational incident response playbooks, policies, and procedures.
  • Conduct comprehensive analysis of application, system, network, and other log types employing SIEM solution or raw data analysis techniques.
  • Regularly meet with the SOC Manager and team members to review threat activity, team initiatives, projects, and threat hunts.
  • Work closely with other cybersecurity staff to develop, test, and implement new cybersecurity software and services. Assist in the development of a support model, standard operating procedures.
  • Respond to alerts both on a rotating on-call schedule and as an member of the Critical Security Incident Response Team.
  • Play an active role in enhancing and developing incident response playbooks to align with the dynamic threat landscape.
  • Contribute to After Incident Reports (AIR).
  • Participate in security audits, threat path analysis, and security capability assessments.
  • Assist in the forensic collection and storage of information security artifacts from cyber events or as part of an audit or security investigation.
  • Proactively identify security issues and risks and in collaboration with IT, develop remediation and mitigation plans.
  • Maintain awareness of latest cybersecurity risks, threat actor tactics, techniques, and procedures (TTPs) and adapt detect and respond processes and capabilities accordingly.
  • Continuously promote security awareness within the organization in support of the Behavior Management Program.
  • Act as a technical point of contact for escalations and troubleshooting of security issues.

The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. May perform other duties as assigned.


To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals to perform the essential functions.

  • Bachelor’s Degree from an accredited four-year college or university in IT, Cybersecurity, Computer Science or related field and 5+ years relevant experience; or equivalent combination of education and experience.
  • Solid understanding of the Security Incident Response Lifecycle.
  • Active industry certification such as, CISSP, GCIH, CCSP, GCIA or similar.
  • Deep understanding with an Enterprise level SIEM solution and XDR/EDR platform.
  • In-depth knowledge of various operating systems and network protocols.
  • Experience working in a multinational company with complex integrated environments in both Information Technology (IT) and Operations Technology (OT).
  • Strong familiarity with OWASP TOP 10 vulnerabilities, SANS 25, MITRE and CWEs.
  • Self-driven, autonomous and can contribute to the strategy and roadmap of the team.
  • Ability to handle proprietary and sensitive information in a confidential manner.
  • Proven ability to work effectively in a team environment.
  • Demonstrated flexibility, organization, and self-motivation.
  • Exceptional interpersonal, verbal, presentation, and written communication skills.
  • Ability to communicate effectively across all levels of the organization.
  • Excellent written and verbal communication skills.
  • Ability to leverage industry best practices and previous experiences while remaining creative and innovative.
  • Proactive and responsive with strong interpersonal skills.
  • Critical thinking skills with an inquisitive and questioning nature.
  • Solid analytical skills, experience solving practical issues and engaging cross functional teams.
  • Ability to work well with others in fast paced, dynamic environment.
  • Ability to be respectful, approachable and team oriented while building strong working relationships.

Work Environment & Physical Demands

  • Occasionally required to work in wet or humid conditions (non-weather); work near moving mechanical parts; fumes or airborne particles.
  • Noise level in the work environment is usually moderate.
  • Although the majority of the work will be performed in an office environment, must be able to visit and work in a plant, warehouse, distribution center or other manufacturing facility.

EEO/AA Information

Smithfield is an equal opportunity employer committed to workplace diversity. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, age, gender identity, protected veterans status, status as a disabled individual or any other protected group status or non-job characteristic as directed by law.