Skip to main content

Protéjase contra el fraude en la contratación. Somos conscientes de que personas no autorizadas pueden haberse hecho pasar por reclutadores de Cargill, haber establecido contacto sobre oportunidades de empleo y haber extendido ofertas de trabajo a través de mensajes de texto, mensajes instantáneos o salas de chat. Para garantizar que una oferta de empleo es legítima, debe aparecer en el sitio web Cargill.com/Careers. Aprenda a protegerse del fraude en la contratación.

SR Consultant, Surface Area Management - Threat Intelligence

Postulate ahora
ID de la oferta 310234 Fecha de publicación 07/09/2025 Location : Wayzata, Minnesota Category  Digital Data & Technology Job Status  Salaried Full Time

Cargill’s size and scale allows us to make a positive impact in the world. Our purpose is to nourish the world in a safe, responsible and sustainable way. We are a family company providing food, ingredients, agricultural solutions and industrial products that are vital for living. We connect farmers with markets so they can prosper. We connect customers with ingredients so they can make meals people love. And we connect families with daily essentials — from eggs to edible oils, salt to skincare, feed to alternative fuel. Our 160,000 colleagues, operating in 70 countries, make essential products that touch billions of lives each day. Join us and reach your higher purpose at Cargill.

Job Purpose and Impact

As a Threat Intelligence Senior Consultant you will play a critical role in strengthening the organization’s security posture by leading the collection, analysis, and dissemination of actionable threat intelligence. Your expertise will drive proactive defense measures, inform executive and operational decisions, and ensure alignment between emerging cyber threats and enterprise risk. You will serve as a key advisor to both technical teams and leadership, transforming raw intelligence into strategic insights that reduce exposure and accelerate response to adversarial activity..

Key Accountabilities

OPERATIONAL THREAT INTELLIGENCE
•    Monitor, collect, and analyze raw threat data from a diverse range of sources (OSINT, commercial feeds, dark web, internal telemetry) to identify immediate threats, campaigns, and indicators of compromise (IOCs) relevant to the organization.
•    Develop and disseminate tactical threat intelligence, including IOCs, YARA or SIGMA rules, Snort/Suricata signatures, and detection logic, for rapid deployment by Security Operations Center (SOC) and Incident Response (IR) teams.
•    Provide actionable intelligence on how vulnerabilities are being exploited to inform remediation efforts and compensating controls.
•    Provide real-time support during active incidents, offering deep technical context on adversary TTPs, malware families, and observed attack chains.
•    Contribute to the enhancement of security controls and detection capabilities by identifying gaps based on current threat intelligence and recommending specific improvements.

INTELLIGENCE DISSEMINATION & COMMUNICATION 
•    Produce clear, concise, and technically accurate intelligence reports, alerts, and briefings for various audiences, from technical defenders to executive leadership.
•    Contextualize technical findings with relevant business impact to ensure intelligence is actionable and understood by non-technical stakeholders.
•    Actively participate in knowledge sharing and training initiatives to uplift the overall threat intelligence maturity across the organization.

Qualifications

REQUIRED QUALIFICATIONS

 •    4 years of relevant work experience

 •     Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
 •    Demonstrable experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems (e.g., Splunk, Elastic, Sentinel).
 •    Strong understanding and ability to deconstruct complex adversary tactics, techniques, and procedures (TTPs) and experience applying frameworks like MITRE ATT&CK to articulate adversary behaviors and inform defensive strategies.
 •    Excellent written and verbal communication skills, with the ability to convey complex technical information to diverse audiences.
 •    Demonstrated experience in leading and operationalizing a Threat Intelligence program.

PREFERRED QUALIFICATIONS
•    Experience with scripting languages (e.g., Python) for data analysis, automation, or malware analysis.
•    Experience with vulnerability scanning platforms (e.g., Tenable.sc, Nessus, Qualys) and their integration with threat intelligence.
•    Experience performing in-depth technical analysis of malware (static and dynamic), phishing campaigns, and observed adversary techniques to understand their functionality, capabilities, and intent.
•    Experience analyzing network traffic (PCAP), logs, and endpoint data to identify technical indicators and patterns of malicious activity.
•    Certifications such as GCTI, GREM, GCFA, CISSP, or similar.

Equal Opportunity Employer, including Disability/Vet.

Postulate ahora

Bolsa de trabajo de LinkedIn

Encuentre el área de Cargill más adecuada para usted. Inicie sesión en su cuenta de LinkedIn y nosotros nos encargaremos de buscar los trabajos que mejor se ajusten a sus habilidades y experiencia.

Encuentre su trabajo ideal

Cacao sustentable

El Compromiso de Cacao de Cargill se compromete a garantizar un sector de cacao que pueda progresar para las generaciones futuras.

Más información

Inclusión y diversidad

Nuestra cultura de inclusión nos ayuda a darle forma al futuro del mundo.

Más información

La vida en
Cargill

Descubra cómo una carrera profesional en Cargill puede ayudarlo a lograr su mayor propósito.

Más información

Ver todas nuestras oportunidades

Thrive