This role involves designing, implementing, and operating cybersecurity technologies, focusing on endpoint security, incident response, and policy compliance.
Job Purpose and Impact
Key Accountabilities
Qualifications
#Standard
- The Professional, Cyber Engineering & Technology Operations job designs, implements and operates the cybersecurity protective technologies, with a primary focus on endpoint security technology, within the organization. With minimal supervision, this job oversees and ensures robust protection against threats while supporting operational efficiency.
Key Accountabilities
- CYBERSECURITY TECHNOLOGIES: Implements, operates, and participates in designing cybersecurity protective technologies, including endpoint detection and response, cloud infrastructure controls and network protections.
- TECHNOLOGY MANAGEMENT: Operates technologies such as wide area network, partner gateways, internet of things security, email, collaboration tools, local area network, wireless and network segmentation, virtual private networks, proxies, demilitarized zones, middle tier systems, databases and web servers.
- CO-CREATION WITH IT OPERATIONS: Participates as a co-creator and operating partner with internal cross functional teams on shared infrastructure initiatives.
- IT SERVICE MANAGEMENT INTERFACES: Operates all information technology service management interfaces, including asset, change, configuration, problem, and request management.
- RESEARCHES SECURITY NEEDS: Researches moderately complex system security needs for operations development, including security requirements definition, risk assessment and systems analysis.
- SECURITY POLICIES: Drafts and provides analytical support for security policy development and analysis in compliance with industry standards.
- INCIDENT RESPONSE: Prepares and performs moderately complex incident response, disaster recovery, and business continuity planning, ensuring readiness for potential security breaches.
Qualifications
- Minimum requirement of 2 years of relevant work experience. Typically reflects 3 years or more of relevant experience.
- Hands on experience with Microsoft Defender and or Tanium is preferred.
- Hands on experience with Malware protection, Malware analysis and Endpoint protection
- Hands on experience with Mobile Security and JAMF.
#Standard
Top Skills
Cloud Infrastructure Controls
Endpoint Detection And Response
Microsoft Defender
Network Protections
Tanium
Similar Jobs at Cargill
Food • Greentech • Logistics • Sharing Economy • Transportation • Agriculture • Industrial
The role involves designing and managing cybersecurity technologies, overseeing protection measures, leading technology management, and collaborating with IT for security policies and incident responses.
Top Skills:
CrowdstrikeEndpoint ProtectionJAMFMalware AnalysisMalware ProtectionMicrosoft DefenderMobile SecurityTanium
Food • Greentech • Logistics • Sharing Economy • Transportation • Agriculture • Industrial
The Cloud Security Engineer will enhance cloud security for Cargill, working with teams to embed security into cloud environments and automate controls using Infrastructure as Code.
Top Skills:
AWSAzureDockerEcsEksGoKubernetesPowershellPythonTerraformWiz
Food • Greentech • Logistics • Sharing Economy • Transportation • Agriculture • Industrial
Architect, maintain, and optimize JD Edwards EnterpriseOne environments while managing security, deployments, and performance tuning across various platforms.
Top Skills:
AnsibleJd Edwards EnterpriseoneJenkinsLinuxOracle DatabaseSQL ServerTerraformWeblogicWebsphereWindows
What you need to know about the Kolkata Tech Scene
When considering the industries shaping India's tech scene, gaming might not immediately come to mind. However, in the last decade, increased internet usage and greater access to mobile devices have catapulted the industry to new heights, with Kolkata-based companies like Virtualinfocom, Red Apple Technologies and Digitoonz, at the forefront, driving the design and animation of new gaming titles for players.

