Lead Cyber Defensive Operations Analyst

Location: 

REMOTE, AL, US REMOTE, FL, US REMOTE, GA, US REMOTE, MS, US REMOTE, NC, US REMOTE, SC, US REMOTE, TX, US REMOTE, VA, US

Date:  May 14, 2026

FRESH. FORWARD. FLOWERS.

Flowers Foods, Inc. (NYSE:FLO) is not just about baking; it's about crafting moments of joy with every delicious bite. With 2024 sales of $5.1 billion, and as one of the leading producers of packaged bakery goods in the United States, Flowers Foods brings passion to the table. From the wholesome goodness of Nature's Own and Wonder to the bold and artisanal flavors of Dave's Killer Bread, the rustic goodness of Canyon Bakehouse, and the sweet delights of Tastykake, each product is a celebration of taste and quality. Beyond the oven, Flowers Foods fosters a culture that values and reflects Honesty & Integrity, Respect & Inclusion, Sustainability, Passion, and Humility. With a commitment to innovation and a recipe for success, Flowers Foods is more than a bakery – it's a delightful journey into the heart of flavor and community.

 

Full-time employees are offered the following benefits:

  • Comprehensive health and medical benefits
  • 401(k) Retirement savings plan
  • Professional growth and leadership training
  • Paid vacation, holidays, and parental leave

 

Benefits may vary depending on your work location.

Bringing Home the Dough

Hands-on role involved in the day-to-day operation of the Flowers Foods cyber security threat detection and response function. Position is responsible overseeing/performing the daily, tactical processes required for the protection of Flowers Foods cyber environment through cybersecurity investigations, cybersecurity incident detection and response processes, and cybersecurity operations improvement project planning and execution to support the function.

 

Position requires an incumbent with strong analytic and problem-solving skills, with the ability to manage expectations appropriately, provide superior customer/client experience, and build long-term relationships.

 

Position requires the ability to work well with minimum supervision, while taking responsibility for assignments and seeing them through to a successful conclusion. 

Rising to the Challenge: Position Responsibilities

Responsibilities include, but are not limited to:

  • Proactive Threat Detection: Contributes to and operationalizes the strategy to shift threat detection capabilities left, confronting attackers earlier in their operations. This is achieved through developing and executing proactive threat hunts across various environments, researching and recommending deceptive technologies, and keeping current with improvements in threat detection procedures.
  • Cybersecurity Monitoring and Analysis: Maintains situational awareness of suspicious/malicious cybersecurity events throughout the Flowers Foods environment. This is achieved through tuning and analysis of alerts generated on various security platforms such as EDR, SIEM, Identity, Brand Monitoring, Network IDS, etc.
  • Incident Response: Operates as a key component of the Flowers Foods CSIRT by owning the incident responder role during cybersecurity incident and wargame exercises. This is achieved through structured implementation of incident response methodology to scope, document, and respond to any threat actor presence within the Flowers Foods environment.
  • Operational Optimization: Contributes to, maintains, and executes the procedures key to the success of Cyber Defensive Operations at Flowers Foods. This is achieved through development and improvement of triage guides, analysis aids, incident response playbooks, and standard operating procedures for various tasks vital to the Cyber Defensive Operations function.
  • Engineering and Intelligence: Partners with the Engineering and Architecture and Cyber Threat Intelligence teams to translate operational challenges and opportunities into actionable defensive improvements. This is achieved through identifying tooling and policy configuration changes, improved detection methods, and enriched analysis capabilities through awareness of operational environment and adversarial tactics.
  • Perform other duties which are deemed by management to be an integral part of the job, including, but not limited to fulfillment of work schedules, adherence to attendance policies, and other applicable operating rules, policies and procedures.

 

Knead to Know: Preferred Qualifications

  • 6+ years’ experience in the Cybersecurity field.
  • 5+ years working in progressive Cyber Defensive Operations roles focusing on threat detection and response, digital forensics, malware reverse engineering, threat intelligence, threat hunting, etc.
  • Previous supervisory experience preferred.
  • Must have in-depth knowledge and experience of the following:
    • Cyber attack objectives and attack lifecycles.
    • Current and emerging threat actor tactics, techniques, and procedures.
    • Incident Response process and methodology.
    • Utilization of Cyber Defensive Operations tooling to include SIEM/SOAR, EDR, IDS, NAC, Email security tooling, Forensics collection and investigation software, etc.
    • Cyber Defensive Operations metrics and KPI’s.
    • Proficiency in process formulation and improvement.
    • Strong analytical, data-processing and problem-solving skills.
    • Solid technical background with the ability to give instructions to a non-technical audience.

 

Additional Ingredients: Essential Job Requirements

Desired Education

  • Bachelor’s degree in a computer-related field such as computer science, management information system or information science. Five years of relevant IT job experience may be substituted for the degree requirement.
  • A minimum of one information security certification: GCIH, GCFA, GCFE, CISSP is required. Certification must be maintained throughout employment tenure.
  • Other technology relevant industry certifications are encouraged.

 

Salary Range-  $110,000 - $135,000

 

We offer a competitive salary and an excellent total rewards package. Interested job seekers who successfully complete the series of pre-screening questions and who appear to possess the basic qualifications for this position may be contacted for a telephone interview.

 

EEO Statement 

 

Flowers is an Equal Opportunity Employer. Flowers encourages all qualified candidates to apply, regardless of race, color, religion, gender, gender identity or expression, sexual orientation, national origin, age, veteran status, disability status, or people of any other characteristic protected by state or federal law.   The job description above outlines the general nature and level of work expected from employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications for this position.  Equivalent combination of education, experience, and skills may supplement above minimum job requirements.

If you need assistance with submitting your resume due to a medical condition or disability, please send an e-mail to Joanie Stringer at Joanie.Stringer@flocorp.com or (1) 229 9772697.


Job Segment: Cyber Security, Computer Forensics, Operations Manager, Computer Science, Security, Operations, Technology