Analyst, Information Security
Listed on 2026-02-21
-
IT/Tech
Cybersecurity, Security Manager
Why Work for KeHE?
- Full-time
- Pay Range: $78,210.00/Yr.
- $/Yr. - Shift Days: , Shift Time:
- Benefits on Day 1
- Health/Rx
- Dental
- Vision
- Flexible and health spending accounts (FSA/HSA)
- Supplemental life insurance
- 401(k)
- Paid time off
- Paid sick time
- Short term & long term disability coverage (STD/LTD)
- Employee stock ownership (ESOP)
- Holiday pay for company designated holidays
Good people, working with good people, for our common good.
Sound good?
KeHE-a natural, organic, specialty and fresh food distributor-is all about good and is growing, so there's never been a more exciting time to join our team. If you're enthusiastic about working in an environment with a people-first culture and an organization committed to good living, good food and good service, we'd love to talk to you!
Primary ResponsibilitiesThe Information Security Analyst safeguards the organization by monitoring and triaging security alerts across endpoint, identity, email, network, cloud, vulnerability, and SIEM platforms; investigating and coordinating response to security incidents; conducting threat hunting and detection tuning to improve coverage and reduce noise; and managing vulnerability remediation and security risk tracking. This role also supports governance, audits, and third-party risk assessments through documentation and evidence collection, delivers cybersecurity awareness initiatives and phishing simulations to reduce human risk, and partners with IT and business stakeholders to drive measurable, continuous improvements to security operations and control effectiveness.
As with all positions at KeHE Distributors, we expect that all actions will be consistent with KeHE’s Mission, Vision, and Values.
DUTIES, TASKS AND RESPONSIBILITIES:
- Proactively monitor and triage security alerts across endpoint, identity, network, cloud, email, vulnerability, and SIEM platforms.
- Detect, investigate, and respond to security incidents; coordinate containment, remediation, root cause analysis, and post-incident reviews.
- Develop, tune, and maintain security detections, alerts, and response playbooks to improve threat visibility and response effectiveness.
- Conduct proactive threat hunting using endpoint, identity, network, and cloud telemetry.
- Manage and support vulnerability and exposure management activities, including risk-based prioritization, remediation tracking, and reporting.
- Maintain and support cybersecurity risk management activities, including risk registers, assessments, and mitigation planning.
- Support governance, risk, and compliance efforts by assisting with audits, control documentation, evidence collection, and third-party risk assessments.
- Administer and optimize security tools and platforms to ensure effectiveness, coverage, and operational reliability.
- Develop and deliver cybersecurity awareness training, including phishing simulations and targeted education initiatives
- Produce and analyze security metrics and operational reports to drive continuous improvement.
- Collaborate effectively with IT, Engineering, and business teams to ensure consistent, efficient security operations.
- Communicate clearly and professionally with stakeholders during incidents and ongoing security initiatives.
- Other duties, responsibilities, and qualifications may be required and/or assigned as necessary.
SKILLS, KNOWLEDGE AND ABILITIES:
- Demonstrated experience triaging and investigating security alerts in one or more of: EDR/XDR, email security, identity systems (AD/Entra ), network security tools, cloud security monitoring (AWS/Azure), and/or SIEM platforms.
- Strong understanding of attacker tactics and common enterprise threat scenarios (phishing, credential compromise, malware/ransomware, lateral movement, privilege escalation).
- Ability to analyze logs and telemetry; experience writing or modifying queries/rules (e.g., KQL/SPL/SQL-like queries) is strongly preferred.
- Experience executing incident response activities: investigation, containment coordination, eradication support, recovery validation, and post-incident documentation.
- Strong understanding of vulnerability and exposure workflows, including validation and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).