Information Security Engineer

Conagra BrandsOmaha, NE
23hHybrid

About The Position

Reporting to the Manager of Cybersecurity Engineering, you will optimize and maintain cybersecurity detection tooling to ensure Conagra is prepared to mitigate, detect, and respond to cybersecurity events. You will engineer advanced detections, collaborate with analysts to improve prevention and monitoring, and support incident response activities as an escalation point while ensuring response actions are effective and aligned with standards. Additionally, this role will participate as a Security Operations Center (SOC) Incident Responder when required with rotational on-call duties. A Taste of Your Responsibilities Engineer, implement, and continuously improve detections across SIEM, endpoint, network, and related telemetry sources to increase signal fidelity and reduce alert fatigue. Develop, document, and maintain standard operating procedures, runbooks, and playbooks that support incident detection, response, and escalation. Apply threat‑informed defense practices using frameworks such as MITRE ATT&CK to guide detection coverage, validate gaps, and enhance overall security posture. Tune detection logic, thresholds, correlations, and suppressions to reduce false positives and false negatives while maintaining strong visibility and coverage. Partner with SOC analysts and incident responders to close detection gaps identified during investigations and post‑incident reviews. Identify and implement automation and SOAR opportunities that improve investigation efficiency, response speed, and operational consistency. Maintain the operational health of security monitoring tools and telemetry pipelines, ensuring log quality, visibility, and consistent coverage across environments. Provide timely and accurate reporting on detection performance, trends, key metrics, and overall security activity to leadership and partners. Evaluate emerging security technologies, adversary tactics, and industry trends to strengthen detection and response capabilities. Investigate and triage security alerts, determining scope, impact, and severity while documenting case details and findings. Participate in the rotational SOC responder schedule, including on‑call coverage when required. Ingredients Required for Your Success Bachelor’s degree in Cybersecurity, Computer Science, MIS, Information Technology, or another related STEM field. Minimum of four years in Cybersecurity or Information Technology with hands‑on detection engineering experience, including SOC or incident response work involving analytics and automation. Experience with security tools such as Splunk, CrowdStrike, Sentinel, Cribl, Defender, XSOAR, or similar technologies. Scripting knowledge with Python, PowerShell, or Bash (preferred). Understanding of frameworks such as Cyber Kill Chain and MITRE ATT&CK. Strong problem‑solving skills with a structured and analytical approach. Strong written and verbal communication skills including communication with analysts, leadership, and external partners. Flexible, adaptable, and collaborative working style with strong relationship‑building skills. Willingness to travel up to 10 percent. Number of Days in Office: 3 #LI-Hybrid #LI-SG1 #LI-Associate Compensation: Pay Range:$72,500-$107,000 The annual salary listed above is the expected offering for this position. An employee’s actual annual salary will be based on but not limited to: location, relevant experience/level and skillset, while balancing internal Conagra employees’ equity. Conagra Brands will comply with applicable law regarding minimum salaries for exempt employees. Our Benefits: We care about your total well-being and will support you with the following, subject to your location and role: Health: Comprehensive healthcare plans, wellness incentive program, mental wellbeing support and fitness reimbursement Wealth: Great pay, bonus incentive opportunity, matching 401(k) and stock purchase plan Growth: Career development opportunities, employee resource groups, on-demand learning and tuition reimbursement Balance: Paid-time off, parental leave, flexible work-schedules (subject to your location and role) and volunteer opportunities Our Company: At Conagra Brands, we have a rich heritage of making great food. We aspire to have the most impactful, energized and inclusive culture in food. As a member of our 18,000+ person team across 40+ locations, you are empowered to reach your potential, make an impact and own your career. We're in the business of building champions – within our people and our iconic brands like Birds Eye ®, Slim Jim® and Reddi-Wip®. Our focus on innovation extends beyond making great food, it also reflects our commitment to embracing new solutions that positively impact our team, the communities we serve and the health of our planet. Foodies Welcome. Conagra Brands is an equal opportunity employer and considers qualified applicants for employment without regard to sex, race, color, religion, ethnic or national origin, gender, sexual orientation, gender identity or expression, age, pregnancy, leave status, disability, veteran status, genetic information and/or any other characteristic or status protected by national, federal, state or local law. Reasonable accommodation may be made upon request. At Conagra Brands, we have a rich heritage of making great food. We aspire to have the most impactful, energized and inclusive culture in food. As a member of our 18,000+ person team across 40+ locations, you are empowered to reach your potential, make an impact and own your career. We're in the business of building champions – within our people and our iconic brands like Birds Eye ®, Slim Jim® and Reddi-Wip®. Our focus on innovation extends beyond making great food, it also reflects our commitment to embracing new solutions that positively impact our team, the communities we serve and the health of our planet. Foodies Welcome. Conagra Brands is an equal opportunity employer and considers qualified applicants for employment without regard to sex, race, color, religion, ethnic or national origin, gender, sexual orientation, gender identity or expression, age, pregnancy, leave status, disability, veteran status, genetic information and/or any other characteristic or status protected by national, federal, state or local law. Reasonable accommodation may be made upon request.

Requirements

  • Bachelor’s degree in Cybersecurity, Computer Science, MIS, Information Technology, or another related STEM field.
  • Minimum of four years in Cybersecurity or Information Technology with hands‑on detection engineering experience, including SOC or incident response work involving analytics and automation.
  • Experience with security tools such as Splunk, CrowdStrike, Sentinel, Cribl, Defender, XSOAR, or similar technologies.
  • Understanding of frameworks such as Cyber Kill Chain and MITRE ATT&CK.
  • Strong problem‑solving skills with a structured and analytical approach.
  • Strong written and verbal communication skills including communication with analysts, leadership, and external partners.
  • Flexible, adaptable, and collaborative working style with strong relationship‑building skills.
  • Willingness to travel up to 10 percent.

Nice To Haves

  • Scripting knowledge with Python, PowerShell, or Bash (preferred).

Responsibilities

  • Engineer, implement, and continuously improve detections across SIEM, endpoint, network, and related telemetry sources to increase signal fidelity and reduce alert fatigue.
  • Develop, document, and maintain standard operating procedures, runbooks, and playbooks that support incident detection, response, and escalation.
  • Apply threat‑informed defense practices using frameworks such as MITRE ATT&CK to guide detection coverage, validate gaps, and enhance overall security posture.
  • Tune detection logic, thresholds, correlations, and suppressions to reduce false positives and false negatives while maintaining strong visibility and coverage.
  • Partner with SOC analysts and incident responders to close detection gaps identified during investigations and post‑incident reviews.
  • Identify and implement automation and SOAR opportunities that improve investigation efficiency, response speed, and operational consistency.
  • Maintain the operational health of security monitoring tools and telemetry pipelines, ensuring log quality, visibility, and consistent coverage across environments.
  • Provide timely and accurate reporting on detection performance, trends, key metrics, and overall security activity to leadership and partners.
  • Evaluate emerging security technologies, adversary tactics, and industry trends to strengthen detection and response capabilities.
  • Investigate and triage security alerts, determining scope, impact, and severity while documenting case details and findings.
  • Participate in the rotational SOC responder schedule, including on‑call coverage when required.

Benefits

  • Comprehensive healthcare plans, wellness incentive program, mental wellbeing support and fitness reimbursement
  • Great pay, bonus incentive opportunity, matching 401(k) and stock purchase plan
  • Career development opportunities, employee resource groups, on-demand learning and tuition reimbursement
  • Paid-time off, parental leave, flexible work-schedules (subject to your location and role) and volunteer opportunities
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service