Prin Security Analyst
Lakeville, Dakota County, Minnesota, 55044, USA
Listed on 2025-12-31
-
IT/Tech
Cybersecurity
Empowered to live. Inspired to work.
Compeer Financial is a member‑owned cooperative located in Illinois, Minnesota and Wisconsin. We bring together team members with a variety of backgrounds and experiences to help provide financial services to support agriculture and rural communities. Join us in a culture that promotes meaningful work, professional development and a flexible, hybrid work environment with excellent benefits that empower you to thrive personally and professionally.
Howwe support you:
- Hybrid model – up to 50% work from home
- Flexible schedules, including ample flexibility during the summer months
- Up to 9% towards 401k (3% fixed Compeer contribution plus up to 6% match)
- Benefits: medical, dental, vision, HSA/FSA, life & AD&D insurance, short‑term and long‑term disability, wellness program & EAP
- Vacation, sick leave, holidays/floating holidays, parental leave, and volunteer paid time off
- Learning and development programs
- Mentorship programs
- Cross‑functional committee opportunities (e.g., Inclusion Council, emerging professional groups, etc.)
- Professional membership/certification reimbursement and more!
Casual/seasonal & intern team members are not eligible for benefits except for state‑mandated programs.
To learn more about Compeer Financial visit
Where you will work:This position offers a hybrid work option up to 50% remote and is based out of any of Compeer's office locations.
The contributions you will make:This position creates, implements and maintains corporate‑wide security programs that assist in improving overall security posture of the organization. It provides guidance, assurance and information protection to maintain the confidentiality, integrity and availability of Compeer critical resources. The role contributes knowledge and expertise to ensure that information assets are protected and secure, guiding solutions to promote secure business‑to‑business initiatives, third‑party relationships, outsourced solutions and vendors.
It also provides mentorship and guidance to less experienced team members.
- Remains current with new security threats and assesses systems and solutions to ensure they can defend the business.
- Researches capabilities of current and new disruptive solutions on the market and makes recommendations to the security group on a consistent basis.
- Develops security team standards, policies, procedures and processes.
- Supports and provides direction for the use of technical systems, monitors for unusual and suspicious activity across a wide range of products, data centers and cloud systems.
- Partners with Business Technology on security configuration standards for systems and business applications.
- Participates in technical and non‑technical projects requiring information security oversight and ensures policies and procedures are met.
- Provides cybersecurity guidance to leadership.
- Ensures that cybersecurity‑enabled products or other compensating security control technologies or reduce identified risk to an acceptable level.
- Performs security reviews, identifies gaps in security architecture, and develops a security risk management plan.
- Implements security measures to resolve vulnerabilities, mitigate risks and recommends security changes to system or system components as needed.
- Analyzes and reports system security posture trends.
- Analyzes cyber‑defense policies and configurations and evaluates compliance with regulations and directives.
- Prepares audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions.
- Leads the Incident Response Team during activations for security or operational events.
- Coordinates, leads and conducts adversary simulation, hunt teaming, assumed breaches and white‑box penetration tests, developing and executing attack plans, scripts, tools and methodologies to strengthen offensive operations.
- Plans and coordinates the delivery of classroom techniques and formats (e.g., lectures, demonstrations, interactive exercises and multimedia presentations) for the most effective learning environment.
- Bachelor's degree in security management,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).