
Senior Cybersecurity Analyst - Enterprise Incident Management (EIM)
Target, Brooklyn Park, MN, United States
The pay range is $88,000.00 - $158,000.00.
Pay is based on several factors which vary based on position, such as labor markets, and may include education, work experience and certifications.
Target offers eligible team members and their dependents comprehensive health benefits including medical, vision, dental, life insurance, and more. Other benefits include 401(k), employee discount, short‑term and long‑term disability, paid sick leave, paid national holidays, and paid vacation.
As a Senior Analyst on Enterprise Incident Management (EIM), you will lead the operational response process for cybersecurity and data privacy incidents. You will coordinate across security, legal, privacy, and business teams, maintain situational awareness, ensure timely communication, and support enterprise risk‑based decisions.
Core responsibilities include:
Incident Response Coordination
Serve as the incident coordinator for confirmed or potential cybersecurity and data privacy incidents.
Launch incident‑specific collaboration, lead operational cadence, and ensure clarity of ownership across participating teams.
Track key actions, decisions, and milestones throughout the incident.
Ensure appropriate stakeholder groups (Legal, Privacy, Communications, Risk) are engaged as the scope and impact evolve.
Stakeholder Communication
Draft and deliver real‑time incident updates to internal stakeholders, including operational leadership and cross‑functional partners.
Translate technical details into actionable business‑focused summaries.
Support decision‑making by articulating risks and providing relevant context from case history or prior incidents.
Participate in verbal readouts to security leadership and risk governance groups as appropriate.
Prepare and conduct proactive tabletop activities in partnership with teams across Target to test and enhance response processes.
Casework & Documentation
Independently manage end‑to‑end response for lower‑severity incidents (roughly 80% of day‑to‑day work).
Maintain accurate and timely case documentation, including timelines, summaries, and incident whiteboards.
Collaborate with other incident coordinators on high‑severity events, providing coordination support and cross‑team continuity.
About You
Four‑year degree or equivalent experience.
3–6 years of experience in cybersecurity, privacy, risk management, crisis coordination, or related fields.
Ability to flex from day‑to‑day functions to crisis at a moment’s notice.
Demonstrated experience coordinating or supporting real‑world security or privacy incidents.
Strong understanding of the cybersecurity incident lifecycle and associated business/regulatory impacts.
Excellent verbal and written communication skills under pressure.
Ability to work independently, make decisions, and manage multiple incidents with competing priorities.
Comfort facilitating virtual incident bridges and collaboration channels across functions.
Able to work on a rotating on‑call basis (one week, 24 hours a day, once per month).
Ability to work outside standard business hours when required during high‑severity events.
This position will operate as a Hybrid/Flex for Your Day work arrangement based on Target’s needs, requiring performance both onsite at the Target HQ in MN and virtually as needed.
Benefits eligibility details available at https://tgt.biz/BenefitsForYou_D.
Americans With Disabilities Act (ADA) In compliance with state and federal laws, Target will make reasonable accommodations for applicants with disabilities. If a reasonable accommodation is needed to participate in the job application or interview process, please reach out to candidate.accommodations@HRHelp.Target.com. Non‑accommodation‑related requests, such as application follow‑ups or technical issues, will not be addressed through this channel.
#J-18808-Ljbffr
Pay is based on several factors which vary based on position, such as labor markets, and may include education, work experience and certifications.
Target offers eligible team members and their dependents comprehensive health benefits including medical, vision, dental, life insurance, and more. Other benefits include 401(k), employee discount, short‑term and long‑term disability, paid sick leave, paid national holidays, and paid vacation.
As a Senior Analyst on Enterprise Incident Management (EIM), you will lead the operational response process for cybersecurity and data privacy incidents. You will coordinate across security, legal, privacy, and business teams, maintain situational awareness, ensure timely communication, and support enterprise risk‑based decisions.
Core responsibilities include:
Incident Response Coordination
Serve as the incident coordinator for confirmed or potential cybersecurity and data privacy incidents.
Launch incident‑specific collaboration, lead operational cadence, and ensure clarity of ownership across participating teams.
Track key actions, decisions, and milestones throughout the incident.
Ensure appropriate stakeholder groups (Legal, Privacy, Communications, Risk) are engaged as the scope and impact evolve.
Stakeholder Communication
Draft and deliver real‑time incident updates to internal stakeholders, including operational leadership and cross‑functional partners.
Translate technical details into actionable business‑focused summaries.
Support decision‑making by articulating risks and providing relevant context from case history or prior incidents.
Participate in verbal readouts to security leadership and risk governance groups as appropriate.
Prepare and conduct proactive tabletop activities in partnership with teams across Target to test and enhance response processes.
Casework & Documentation
Independently manage end‑to‑end response for lower‑severity incidents (roughly 80% of day‑to‑day work).
Maintain accurate and timely case documentation, including timelines, summaries, and incident whiteboards.
Collaborate with other incident coordinators on high‑severity events, providing coordination support and cross‑team continuity.
About You
Four‑year degree or equivalent experience.
3–6 years of experience in cybersecurity, privacy, risk management, crisis coordination, or related fields.
Ability to flex from day‑to‑day functions to crisis at a moment’s notice.
Demonstrated experience coordinating or supporting real‑world security or privacy incidents.
Strong understanding of the cybersecurity incident lifecycle and associated business/regulatory impacts.
Excellent verbal and written communication skills under pressure.
Ability to work independently, make decisions, and manage multiple incidents with competing priorities.
Comfort facilitating virtual incident bridges and collaboration channels across functions.
Able to work on a rotating on‑call basis (one week, 24 hours a day, once per month).
Ability to work outside standard business hours when required during high‑severity events.
This position will operate as a Hybrid/Flex for Your Day work arrangement based on Target’s needs, requiring performance both onsite at the Target HQ in MN and virtually as needed.
Benefits eligibility details available at https://tgt.biz/BenefitsForYou_D.
Americans With Disabilities Act (ADA) In compliance with state and federal laws, Target will make reasonable accommodations for applicants with disabilities. If a reasonable accommodation is needed to participate in the job application or interview process, please reach out to candidate.accommodations@HRHelp.Target.com. Non‑accommodation‑related requests, such as application follow‑ups or technical issues, will not be addressed through this channel.
#J-18808-Ljbffr