Company Description
Running with Sasquatch is more than just a clever marketing campaign. As a Jack Link’s team member, Running with Sasquatch means we roll up our buffalo plaid sleeves and do the hard work first. We don’t shy away from challenges. In fact, we push hard and take risks. True to our North Woods roots, we're a bunch of ordinary people who accomplish extraordinary things by driving results with innovation, creativity and a clear sense of urgency. Like our awesome protein products, we have an unwavering passion for quality, and you won’t find anything artificial here. What you see is what you get… authentic, humble and fun people who Run with Sasquatch!
Running with Sasquatch takes a team. We invite you to run with us, succeed with us, and celebrate with us. Most importantly, Feed Your Wild Side® with us on our journey to be the dominant global leader of branded protein snacks!
Jack Link's Protein Snacks is a global leader in snacking and the No. 1 meat snack manufacturer worldwide. Still family-owned and operated with headquarters in Minong, Wisconsin, Jack Link’s also has a large corporate hub in Downtown Minneapolis, Minnesota, and operates a total of 11 manufacturing and distribution facilities in four countries. Jack Link’s produces high-quality, great-tasting protein snacks that feed the wild sides of consumers around the world. Link Snacks, Inc., family of brands includes Jack Link's, Lorissa's Kitchen, World Kitchens Jerky, Bifi and Peperami.
Job Description
We are seeking a highly skilled and experienced Security Architect to join our Global IT team at Jack Link’s. The Security Architect will be responsible for designing, building, and implementing robust security systems to protect our Global IT infrastructure. This role requires a deep understanding of cybersecurity principles, risk management, and the ability to anticipate and mitigate potential security threats. This position will work closely with members of the Information Technology team with a focus on security architecture and governance while ensuring our continued alignment with cybersecurity best practices.
The duties and responsibilities of this position shall consist of, but not be limited to, the following:
- Plans, research, and designs security architecture for our Global IT systems, application and integrations
- Designs security services in on premise and cloud-based programs based on pre-defined architecture frameworks
- Maintains and improves the security posture of the Azure platform systems and services
- Determines security protocols by evaluating Jack Link’s business strategies, security and regulatory compliance requirements
- Create, implement, and enforce security policies, standards, and procedures to ensure compliance with industry regulations and best practices
- Lead and coordinate the activities of others within scope of IT Security and Security Architecture best practices
- Monitors alerts to ensure that data, apps, containers, infrastructure, and networks are protected
- Design access configurations within a cloud solution environment using security best practices and defense-in-depth principles
- Reviews system security measures and implements necessary enhancements and architectural guidance and changes to ensure security requirements and policies are adhered to
- Participate in project work; perform security specific project architecture tasks related to MS365/O365 and MS Azure environments, lead work streams
- Coordinate with network and infrastructure/cloud architecture teams to review and approve design and installation requirements for LANs, WANs, VPNs, firewalls, routers, and related network devices
- Work closely with IT teams, and other stakeholders to ensure security is integrated into all aspects of the organization’s operations
- Performs vulnerability testing and penetration testing on applications, infrastructure, and network to ensure agreed upon security protocols are in place
- Conduct risk assessments and analysis to identify potential security threats, vulnerabilities, and weaknesses within the organization’s systems, networks, and applications. Develop risk mitigation strategies and controls
- Implement and use cloud native tools like Log Analytics, Azure Monitor, Azure (MS) Security Center and Azure (MS) Sentinel
- Responds to, and investigate, escalated security incidents from SOC analyst teams to provides mitigations, remediation as well as thorough post-event analysis and lessons learned action plans
- Responsible for conducting or coordinating regular testing and remediation of web applications, network and systems security.
- Assist with Business Continuity/Disaster Recovery designs to ensure security best practices.
- Provide IT leadership with financial information as it relates to budget planning for security solutions.
- Act as a mentor and train users in implementing and supporting security solutions.
- Updates job knowledge by tracking and understanding emerging security practices and standards, participating in educational opportunities, reading professional publications, and participating in professional organizations.
- Works directly with departmental leaders to ensure end user compliance with IT and security standards.
- Ensure enterprise alignment to regulatory requirements and cyber security frameworks such as SOC2, ISO 27001, GDPR, Data Privacy Framework, etc.
Qualifications
Minimum Qualifications:
- Bachelor’s degree in Cybersecurity, Computer Science, IT, or related field or equivalent work experience
- 5+ years of experience in infrastructure security, security engineering, application security, identity & access management, security operations, system architecture
- Proficient in all aspects of cloud security including identity and access management, organizational structure and policies, technologies to provide data protection, network security defenses, security logs, and incident response processes
- Thorough understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEM, SOAR, PKI, IAM and PAM).
- Strong technical skills; Windows operating systems, Linux and scripting languages like PowerShell, Python, Net, etc.
- Experience with Microsoft Defender/Security, MS365 Intune MDM device and policy management
- SIEM experience, logging alerting, querying, dashboards, Microsoft Sentinel
- Experience implementing security standards in accordance with cybersecurity frameworks (NIST, SOC2, ISO27001, etc.)
- Strong communication and time management skills, ability to learn quickly
- Ability to articulate technical cybersecurity language into a common language
Preferred Experience
- Working knowledge of the following platforms: Arctic Wolf SIEM/MDR, Beyond Trust (Bomgar), Mimecast, Palo Alto Networks, Burp Suite, Pentera, and Kali Linux
- Cybersecurity related certifications (CISSP, CCIE, CISSP-ISSAP, CEH, CSSA)
- Master’s degree in Cybersecurity, Computer Science or related field
- Experience in a manufacturing/consumer packaged goods company, securing OT networks
- Experience with other Cloud Platforms like AWS is nice-to-have
Skills In
REQUIRED SKILLS, KNOWLEDGE, and ABILITIES:
- Experience securing IT/OT networks
- Experience architecting redundancy solutions
- Executing cybersecurity strategies and solutions
- Managing vendor relationships
- Interfacing with internal or external parties regarding security policy standards violations, security controls failures, and incident response situations
Knowledge Of
- Security design, risk management and governance
- Cybersecurity principles, risk management, and security technologies
- Strong understanding of network and system security, encryption, authentication, and access control
- Experience with security frameworks and standards (e.g., ISO 27001, NIST, SOC2)
- Excellent problem-solving and analytical skills
- Strong communication and organizational skills
- Security concepts related to DNS, including routing, authentication, VPN, proxy services, and DDOS mitigation technology
- Perimeter security controls such as firewalls, IDS/IPS, network access controls, and network segmentation
- Various aspects of wireless security such as routers, switches, and VLAN security
- Third party auditing and cloud risk assessment methodologies
Ability To
- Effectively communicate technical issues to diverse audiences, both in writing and verbally.
- Maintaining confidentiality.
- Learn quickly and apply knowledge to new situations.
- Handle sensitive and confidential matters, situations, and data.
- Understand and follow broad and complex instructions.
- Comprehend technical language and to confer, analyze and write in a manner that is understood.
- Work independently and prioritize multiple tasks and adapt to needed changes.
- Remain calm under high pressure/difficult situations.
- Available for after-hours support, as needed.
- Ability to travel for work related activities/training (5-10%)
Additional Information
EQUAL EMPLOYMENT OPPORTUNITY EMPLOYER:
Jack Link’s provides equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic that is protected by federal, state or local law.
E-verify
Jack Link’s is participant in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For information about the E-Verify program, please visit: http://www.uscis.gov/e-verify/employees
All your information will be kept confidential according to EEO guidelines.