Cybersecurity Controls Analyst

Smithfield Foods
Remote Smith, VA
$66-$98 an hour
Remote
Full-time
Part-time
We are sorry. The job offer you are looking for is no longer available.

If you are currently employed at Smithfield, please log into Workday and submit your application through the Jobs Hub.

A great job-and a great future-awaits you at Smithfield Foods. We’re an $18 billion food company with nearly 60,000 employees worldwide.

We’re looking for motivated people who want to join our team and grow lasting and meaningful careers with us. Join our family today. Apply Now!

Your Opportunity

Our team members receive industry-competitive salaries and are eligible for great benefits packages :

  • Competitive Pay : $66,000 - $96,250
  • Annual Bonus Earning Potential
  • Comprehensive Health Insurance, Retirement Benefits and More
  • Education benefit available to full and part-time Smithfield team members on their first day of employment.

In addition, we offer opportunities for career growth, professional development, and tuition assistance.

The Cybersecurity Controls Analyst is responsible for executing various security control initiatives such as risk assessments, security control assessments, and 3rd party risk assessments.

The position aims to provide skilled technical and information security expertise for developing and implementing the cybersecurity risk management program.

Responsibilities require project management experience, as well as : the ability to ensure practical system-wide security analysis, control testing, risk assessment, awareness & education, and development of policies, standards, and guidelines.

A qualified candidate will support the establishment, execution, and maintenance of the Company’s cybersecurity GRC program.

This person will use strong communication, analytical, and troubleshooting abilities to identify and report on controls from various security domains, control and / or process gaps, and to identify process and technology opportunities.

This position supplies the information necessary to manage the risk to the organization and ensures business alignment, effective governance, system and product availability, integrity, and confidentiality.

Success in this role requires collaborating with multiple levels of the organization, weighing risk against the impact on business operations.

Core Responsibilities

Review, audit, and monitor security compliance programs against security policies, standards, and frameworks such as SOC2, ISO 27000, NIST CSF, PCI-DSS, etc.

Support developing remediation plans for issues and risks, coordinate activities with owners, and track remediation to completion.

Conduct periodic information security risk assessments.

Aid in documenting and maintaining identified risks in a risk register within the GRC system throughout the risk lifecycle (, identified and resolved)

Support documentation management such as security policies, standards, processes, procedures, and data flows.

Lead evidence collection for external audits related to SOC2, ISO 27000, NIST CSF, PCI-DSS, etc.

Perform vendor security risk assessments.

Build and cultivate positive working relationships with stakeholders across various teams.

Assist Cybersecurity Engineers in reviewing new technology and service initiatives to ensure controls align with internal and external requirements.

Qualifications

Bachelor's Degree from an accredited four-year college or university in cybersecurity, computer science, information technology, business, information security, or related field and 2+ years of cybersecurity experience or related IT field, preferably in cyber risk management;

or equivalent combination of education and experience.

Information security-related certifications such as CISSP, CISM, or CRISC are preferred.

Basic knowledge of security technologies such as firewalls, IDS, DLP, Vulnerability Scanners, etc.

Ability to develop security standards and guidelines based on best practices and industry standards.

Excellent interpersonal, communication, and presentation skills, including formal report-writing experience.

Working knowledge of cybersecurity frameworks and compliance standards such as NIST, ISO 27000, SOC2, etc.

EEO / AA Information

Smithfield is an equal opportunity employer committed to workplace diversity. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, age, gender identity, protected veterans status, status as a disabled individual or any other protected group status or non-job characteristic as directed by law.

If you are an individual with a disability and would like to request a reasonable accommodation for any part of the employment selection process, please call us at 757-357-1595.

Salary Range

$66, - $98,

30+ days ago
Related jobs
Promoted
KBR
Chantilly, Virginia

KBR is seeking a highly motivated Senior Data Science Analyst to provide data science principles and techniques to assist the cost analysis team in handling and analyzing datasets in order to efficiently develop the answers to questions which are critical to the customer success. Cost databases (inc...

Promoted
HRL
McLean, Virginia

Willingness to investigate complex issues and solve problems with curiosity and ingenuity.Must be organized and detail-oriented.Knowledge of Microsoft office suite, above average knowledge of Microsoft Excel formulas and spreadsheet formatting....

Promoted
BlueHalo
Tysons, Virginia

Ensure that cybersecurity plans, controls, processes, standards, policies and procedures are aligned with cybersecurity standards. Develop techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for ...

Promoted
Jacobs
Charlottesville, Virginia

The All- Source Analyst conducts all-source analysis and analytical production by using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments that are regional or functional in nature. The Program is a prem...

Promoted
ASRC Federal
Alexandria, Virginia

Assist with cybersecurity reviews, including generation of security artifacts, such as security plans, POA&M, and security CONOPS. Support the Cybersecurity Manager and PMO in cybersecurity efforts related to the Assured Compliance Assessment Solution (ACAS) suite of applications and their deploymen...

Promoted
Accenture Federal Services
Arlington, Virginia

Support clients in mapping legacy data, identifying data quality issues and overall responsibility over conversion activates on the project. Participate actively as a Data Conversion consultant on one or more project teams. Serve as the knowledge source for converting data from legacy systems and sp...

Promoted
The Aerospace Corporation
Chantilly, Virginia

As an RF System Analyst you will support technical trades, independent studies, and issue resolution associated with Communications architectures, space-based and ground-based networks, data throughput, and cybersecurity elements. Imagery Programs Division’s (IPD) Reconnaissance Systems (RS) Office ...

Promoted
Aeyon
Arlington, Virginia

Aeyon seeks a highly skilled Level III Financial Analyst to ensure financial integrity, compliance, and operational effectiveness through rigorous financial management, audit response, internal controls evaluation, and policy development. ...

Promoted
GCI, Inc.
Chantilly, Virginia

As a Software/Binary Code Analyst, a typical day will include the following duties, but not limited to:. The Software/Binary Code Analyst SME will work closely with stakeholders to evolve and advance the customer's ecosystem for cataloging, analysis, and continuous risk evaluation of cyber capabilit...

Promoted
Applied Research Associates (ARA)
Fort Belvoir, Virginia

We are seeking hands-on cyber analysts with and understanding of both the compliance standards and the tools and techniques to assess vulnerabilities to be a part of our team. IA tools use, operations security). Understanding of information technology threats, and cybersecurity practices. Hands-on e...