Lead Engineer - Insider Risk

Target Target · Retail · NCD-0375 Brooklyn Park, MN

Lead Engineer focused on Insider Risk at Target, responsible for designing, implementing, and improving Data Loss Prevention (DLP) and User and Entity Behavior Analytics (UEBA) programs to protect company data and systems from insider threats. The role involves monitoring DLP technologies, conducting investigations, integrating security tools, and collaborating with various teams to enhance security posture.

What you'd actually do

  1. Help lead the design, implementation and continuous improvement of the Insider Threat and DLP programs.
  2. Define metrics through which we can ensure our coverage is comprehensive, effective, and efficient in an ever-changing threat landscape.
  3. Cross train with other teams within the Cyber Fusion Center such as Cyber Threat Intelligence, Incident Response, Security Architecture, and Enterprise Incident Management.
  4. Assist in implementation of net new DLP capabilities and ITP UEBA engine.
  5. Become proficient in workflow automation within our SOAR platform and automate previously manual processes.

Skills

Required

  • 7+ years in cybersecurity with a focus in Incident Response, DLP, and Insider Threat
  • Extensive experience with DLP tools (e.g. ZScaler, ForcePoint, Symantec)
  • Deep understanding of Insider Threat methodologies and behavioral analytics
  • Python, PowerShell or equivalent programming experience
  • Experience with maintaining SIEM, UEBA, EDR, and cloud security platforms
  • Strong problem-solving skills
  • Excellent communication skills

Nice to have

  • 4 year degree or equivalent experience
  • Demonstrated ability to build strong cross-functional partnerships and influence enterprise security strategy
  • Experience working closely with cyber threat intelligence, incident response, or detection engineering teams
  • Commitment to operational excellence, safety, and continuous improvement
  • Self-directed learner who stays current with evolving cybersecurity threats, technologies and best practices

What the JD emphasized

  • Extensive experience with DLP tools (e.g. ZScaler, ForcePoint, Symantec)
  • Deep understanding of Insider Threat methodologies and behavioral analytics to differentiate between uncommon and malicious activity
  • Demonstrated programming experience in Python, PowerShell or equivalent
  • Experience with maintaining SIEM, UEBA, EDR, and cloud security platforms