Posted:
1/27/2026, 11:56:31 PM
Experience Level(s):
Mid Level ⋅ Senior
Field(s):
IT & Security
Workplace Type:
Remote
Are You Ready to Make It Happen at Mondelēz International?
Join our Mission to Lead the Future of Snacking. Make It Uniquely Yours.
You will work in the Cybersecurity Incident Response Center at MDLZ as an Information Security Analyst.
How you will contribute:
As an Incident Response Analyst you will play a vital role in strengthening MDLZ security measures. You will investigate and respond to security incidents, collaborate with cross-functional teams, and drive resolution to complex cybersecurity issues within our environment. Your expertise will contribute strong and well-designed Incident Response techniques, processes, and capabilities. You will be asked to partner on improvements both within and outside of the security domain to drive increases in team, department, and organizational maturity.
What you will bring:
Contribute measurably to goals of enhancing our security posture and protecting MDLZ infrastructure
Be adept at technical writing
Capable of communicating with both technical and nontechnical stakeholders across all levels including C-suite with ability to scope, tailor, and triage information shared to the roles and business priorities of audiences
Contribute to comprehensive containment, eradication, and recovery strategies, prioritizing business continuity and minimizing disruption to business processes. Help to coordinate response activities with incident response teams, internal stakeholders, and external partners. Follow established and best-practice incident response procedures while iterating as necessary for novel events.
Collaborate closely with a wide range of technical and non-technical teams across business functions and geographies. Assist with scope, tailoring, and triage of event/incident information for diverse audiences, including C-suite executives, providing clear, concise, and timely updates.
Contribute to in-depth malware analysis, network forensics, log analysis, and reverse engineering to identify root causes, establish timelines, and uncover Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) both independently and in partnership with security, technology, and business roles.
Contribute to the continuous review, refinement, and expansion of incident response playbooks, runbooks, and Standard Operating Procedures (SOPs), aligning them with industry best practices (e.g., NIST, MITRE) and our unique global context.
Embody a passion for growth and a drive for continuous learning
Act as peer and partner with other analysts, contributing to overall uplift of our global cybersecurity capabilities through effective teamwork.
Contribute to "lessons learned" reviews for significant incidents, identifying systemic weaknesses and assisting with generation of recommendations for security control improvements, architectural enhancements, and organizational changes to prevent recurrence.
Contribute to team’s expansive skill set and work to expand your own skills across topics like reverse-engineering, cloud security, process development, scripting in Python, PowerShell, Bash, C/C++, ICS protocols, AI-based automation, and more
More about this role
What you need to know about this position:
Global Cybersecurity Incident Response Team with a rotational on-call schedule
Monitor computer environments for security issues
Perform Threat Analysis on events reported by security tools, external parties, and internal SMEs
Assist team with investigation of security breaches and other cybersecurity events and incidents
Contribute to Root Cause Analysis, Lessons Learned, and Corrective Action Reporting
Contribute to executive summaries, status reports and supply metrics to relevant stakeholders
Participate in special projects as needed
What extra ingredients you will bring:
Education / Certifications:
Bachelor’s Degree in Information Technology, Cybersecurity, Computer Science or similar preferred but not mandatory
Hold professional certifications through certifying bodies like:
CompTIA: Security+, CySA+
SANS-GIAC: GCIH, GDAT, GPEN, GCFE, GRID
ISC2: CISSP
Offsec: OCSP, OSIR
Job specific requirements:
3-6+ years experience in Incident Response, Information Security, SOC, Forensics, Purple-teaming, or related field
Knowledge/Experience in:
SIEM (ie Splunk, Humio), SOAR (ie Cyware, Splunk, XSOAR), Endpoint Security (EDR) (ie CarbonBlack, Crowdstrike, Defender), Email Security (ie. Proofpoint, O365 ATP), Firewalls, WAF, IDS/IPS, Web Content Filtering, Proxies, Database, Data Loss Prevention (DLP), Identity and Access Management (IAM), Cloud Computing Services, Scripting, MITRE ATT&CK Framework and Incident Response, NIST, Cloud Compute (ie AWS, GCP, Azure), Cloud Native Application Protection (ie Forcepoint ONE, Wiz, Orca)
Travel requirements:
Occasional
Work schedule:
Remote
On-call
Mondelēz International is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation or preference, gender identity, national origin, disability status, protected veteran status, or any other characteristic protected by law.
Website: https://www.mondelezinternational.com/
Headquarter Location: Chicago, Illinois, United States
Employee Count: 10001+
Year Founded: 1903
IPO Status: Public
Last Funding Type: Post-IPO Debt
Industries: Consumer Goods ⋅ Food and Beverage ⋅ Food Processing ⋅ Manufacturing