Farmer Brothers Company

  • Sr. Analyst, Information Security (Cyber)

    Job Locations US-TX-DALLAS-FORT WORTH | US-TX-Northlake
    Job ID
  • Overview

    The Cybersecurity Analyst is a key position in the IT organization that is responsible for leading Farmer Brothers' incident response activities; monitoring and investigating security threats using various security tools; identifying and directing security controls improvements; and working with the Infrastructure team, our Managed Security Provider, as well as various cybersecurity vendors to implement new security solutions.  This individual will apply knowledge of security industry best practices to help build Farmer Brothers' detection, response, and information Security capabilities.


    • Proactive security monitoring of the company network, computer systems, applications, and critical assets to detect, respond to, and mitigate threats.
    • Provide presentations and support to senior leadership.
    • Apply understanding of network threats, attack vectors and methods of exploitation with tactics, techniques and procedures to investigate and analyze threats and risks to determine remediation actions.
    • Develop and mature the company's incident response processes.
    • Develop cybersecurity incident response playbooks based upon best practices that ensure comprehensive threat mitigation.
    • Post-incident analysis to drive continuous improvement security solutions.
    • Provide incident investigation reports and communications to the company's executive leadership. 
    • Manage and help build the company's security capabilities, tools and vendors.
    • Drive development of information security policies and procedures.
    • Assist with the creation of the cybersecurity capability road-map and strategic plan. 
    • Provide technical and thought leadership for the development and integration of new cybersecurity solutions.


    • Bachelor's Degree in Computer Science, MIS, Engineering, or a related discipline or four years of experience in lieu of a degree.
    • Minimum of 8+ years of experience IT Security.
    • Familiarity with information Security standards, best practices and relevant regulations.
    • Incident response and/or security operations center (SOC) experience.
    • Working experience with at least three of the following: anti-virus, end point security, HIPS, IDS/IPS, DLP, network forensics, host-based forensics, malware analysis, firewalls, secure email gateways, log analysis and management.
    • Knowledge of Windows and Active Directory, visualization and cloud security.
    • Have experience with work-flow and ticketing systems for incident, problem and change management.
    • Understand defense-in-depth and cyber kill chain models.
    • Experience troubleshooting day-to-day operational processes such as security monitoring, data correlation, security operations.
    • Hold a Security Certification such as CISSP, CISA, CISM, CEH, SANS GSEC, PCI QSA, GCIA, GCIH, GMON.
    • Self-starter that is resourceful and can work autonomously.
    • Works well in the grey and in fast-paced environments.
    • Partners effectively with internal business stakeholders and vendors.
    • Meets deadlines, follows through on commitments and delivers on promises. 
    • Analytical, critical thinker and solution orientation.
    • Able to analyze business impact and exposure, based on emerging security threats, vulnerabilities and risks.
    • Effectively communicates security risks and solutions to leadership, business partners and IT staff. 
    • Thinks broadly around business issues and apply to company strategies.
    • Strives for continuous growth and improvement.
    • Generates original, creative ideas to improve processes.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share this job on your newsfeed