Minneapolis, Minnesota, USA
24 days ago
Security Architect

Company Description

Running with Sasquatch is more than just a clever marketing campaign. As a Jack Link’s team member, Running with Sasquatch means we roll up our buffalo plaid sleeves and do the hard work first. We don’t shy away from challenges. In fact, we push hard and take risks. True to our North Woods roots, we're a bunch of ordinary people who accomplish extraordinary things by driving results with innovation, creativity and a clear sense of urgency. Like our awesome protein products, we have an unwavering passion for quality, and you won’t find anything artificial here. What you see is what you get… authentic, humble and fun people who Run with Sasquatch!

Running with Sasquatch takes a team. We invite you to run with us, succeed with us, and celebrate with us. Most importantly, Feed Your Wild Side® with us on our journey to be the dominant global leader of branded protein snacks!

Jack Link's Protein Snacks is a global leader in snacking and the No. 1 meat snack manufacturer worldwide. Still family-owned and operated with headquarters in Minong, Wisconsin, Jack Link’s also has a large corporate hub in Downtown Minneapolis, Minnesota, and operates a total of 11 manufacturing and distribution facilities in four countries. Jack Link’s produces high-quality, great-tasting protein snacks that feed the wild sides of consumers around the world. Link Snacks, Inc., family of brands includes Jack Link's, Lorissa's Kitchen, World Kitchens Jerky, Bifi and Peperami.

Job Description

We are seeking a highly skilled and experienced Security Architect to join our Global IT team at Jack Link’s. The Security Architect will be responsible for designing, building, and implementing robust security systems to protect our Global IT infrastructure. This role requires a deep understanding of cybersecurity principles, risk management, and the ability to anticipate and mitigate potential security threats.  This position will work closely with members of the Information Technology team with a focus on security architecture and governance while ensuring our continued alignment with cybersecurity best practices.

The duties and responsibilities of this position shall consist of, but not be limited to, the following:

Plans, research, and designs security architecture for our Global IT systems, application and integrationsDesigns security services in on premise and cloud-based programs based on pre-defined architecture frameworksMaintains and improves the security posture of the Azure platform systems and servicesDetermines security protocols by evaluating Jack Link’s business strategies, security and regulatory compliance requirementsCreate, implement, and enforce security policies, standards, and procedures to ensure compliance with industry regulations and best practicesLead and coordinate the activities of others within scope of IT Security and Security Architecture best practicesMonitors alerts to ensure that data, apps, containers, infrastructure, and networks are protectedDesign access configurations within a cloud solution environment using security best practices and defense-in-depth principlesReviews system security measures and implements necessary enhancements and architectural guidance and changes to ensure security requirements and policies are adhered toParticipate in project work; perform security specific project architecture tasks related to MS365/O365 and MS Azure environments, lead work streamsCoordinate with network and infrastructure/cloud architecture teams to review and approve design and installation requirements for LANs, WANs, VPNs, firewalls, routers, and related network devicesWork closely with IT teams, and other stakeholders to ensure security is integrated into all aspects of the organization’s operationsPerforms vulnerability testing and penetration testing on applications, infrastructure, and network to ensure agreed upon security protocols are in placeConduct risk assessments and analysis to identify potential security threats, vulnerabilities, and weaknesses within the organization’s systems, networks, and applications. Develop risk mitigation strategies and controlsImplement and use cloud native tools like Log Analytics, Azure Monitor, Azure (MS) Security Center and Azure (MS) SentinelResponds to, and investigate, escalated security incidents from SOC analyst teams to provides mitigations, remediation as well as thorough post-event analysis and lessons learned action plansResponsible for conducting or coordinating regular testing and remediation of web applications, network and systems security.Assist with Business Continuity/Disaster Recovery designs to ensure security best practices.Provide IT leadership with financial information as it relates to budget planning for security solutions.Act as a mentor and train users in implementing and supporting security solutions.Updates job knowledge by tracking and understanding emerging security practices and standards, participating in educational opportunities, reading professional publications, and participating in professional organizations.Works directly with departmental leaders to ensure end user compliance with IT and security standards.Ensure enterprise alignment to regulatory requirements and cyber security frameworks such as SOC2, ISO 27001, GDPR, Data Privacy Framework, etc.

Qualifications

Minimum Qualifications:

Bachelor’s degree in Cybersecurity, Computer Science, IT, or related field or equivalent work experience5+ years of experience in infrastructure security, security engineering, application security, identity & access management, security operations, system architectureProficient in all aspects of cloud security including identity and access management, organizational structure and policies, technologies to provide data protection, network security defenses, security logs, and incident response processesThorough understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEM, SOAR, PKI, IAM and PAM).Strong technical skills; Windows operating systems, Linux and scripting languages like PowerShell, Python, Net, etc.Experience with Microsoft Defender/Security, MS365 Intune MDM device and policy managementSIEM experience, logging alerting, querying, dashboards, Microsoft SentinelExperience implementing security standards in accordance with cybersecurity frameworks (NIST, SOC2, ISO27001, etc.)Strong communication and time management skills, ability to learn quicklyAbility to articulate technical cybersecurity language into a common language

Preferred Experience:

Working knowledge of the following platforms:  Arctic Wolf SIEM/MDR, Beyond Trust (Bomgar), Mimecast, Palo Alto Networks, Burp Suite, Pentera, and Kali LinuxCybersecurity related certifications (CISSP, CCIE, CISSP-ISSAP, CEH, CSSA)Master’s degree in Cybersecurity, Computer Science or related fieldExperience in a manufacturing/consumer packaged goods company, securing OT networksExperience with other Cloud Platforms like AWS is nice-to-have

REQUIRED SKILLS, KNOWLEDGE, and ABILITIES:

Skills in:

Experience securing IT/OT networksExperience architecting redundancy solutionsExecuting cybersecurity strategies and solutionsManaging vendor relationshipsInterfacing with internal or external parties regarding security policy standards violations, security controls failures, and incident response situations

Knowledge of:

Security design, risk management and governanceCybersecurity principles, risk management, and security technologiesStrong understanding of network and system security, encryption, authentication, and access controlExperience with security frameworks and standards (e.g., ISO 27001, NIST, SOC2)Excellent problem-solving and analytical skillsStrong communication and organizational skillsSecurity concepts related to DNS, including routing, authentication, VPN, proxy services, and DDOS mitigation technologyPerimeter security controls such as firewalls, IDS/IPS, network access controls, and network segmentationVarious aspects of wireless security such as routers, switches, and VLAN securityThird party auditing and cloud risk assessment methodologies

Ability to:

Effectively communicate technical issues to diverse audiences, both in writing and verbally.Maintaining confidentiality.Learn quickly and apply knowledge to new situations.Handle sensitive and confidential matters, situations, and data.Understand and follow broad and complex instructions.Comprehend technical language and to confer, analyze and write in a manner that is understood.Work independently and prioritize multiple tasks and adapt to needed changes.Remain calm under high pressure/difficult situations.Available for after-hours support, as needed.Ability to travel for work related activities/training (5-10%)

Additional Information

EQUAL EMPLOYMENT OPPORTUNITY EMPLOYER:
Jack Link’s provides equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic that is protected by federal, state or local law.

E-VERIFY:
Jack Link’s is participant in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees.  For information about the E-Verify program, please visit:  http://www.uscis.gov/e-verify/employees

All your information will be kept confidential according to EEO guidelines.

Confirm your E-mail: Send Email