Information Security Technical Architect
US - Remote
Full Time Senior-level / Expert USD 88K - 111K
MillerKnoll
MillerKnoll ist ein Kollektiv dynamischer Marken, die gemeinsam die Welt gestalten, in der wir leben.Why join us?
Our purpose is to design for the good of humankind. It’s the ideal we strive toward each day in everything we do. Being a part of MillerKnoll means being a part of something larger than your work team, or even your brand. We are redefining modern for the 21st century. And our success allows MillerKnoll to support causes that align with our values, so we can build a more sustainable, equitable, and beautiful future for everyone.
As an Information Security Technical Architect at MillerKnoll, you will collaborate with various teams across the enterprise to ensure projects and technology initiatives are performed according to best cybersecurity practices and standards. This role will help drive cybersecurity and business solutions, from idea, to development, to implementation, and will work closely with IT partners, business stakeholders, and global colleagues to affirm success. You’re a great fit for this role if you’re experienced in multiple domains of cybersecurity, a self-starter who is comfortable with ambiguity, and someone who thrives in a collaborative environment.
Essential Functions- Perform risk-based assessments of current and emerging security threats and recommend and design countermeasures.
- Identity systemic security issues based on the analysis of vulnerability and configuration data.
- Determine the protection needs (i.e., security controls) for information systems and document, articulate, and lead in solution engineering.
- Ensure that acquired or developed system(s) and architecture(s) are consistent with the organization’s cybersecurity standards and guidelines.
- Identify and prioritize critical business functions in collaboration with organizational stakeholders.
- Evaluate, select, and own select security solutions and technologies, and integrating them into the existing IT infrastructure seamlessly.
- Conduct external and internal research and analysis, translating proposed capabilities into technical requirements.
- Identify opportunities to reduce the organization's attack surface by analyzing trends and recommend remediation actions and security controls.
- Prioritize and communicate security findings with technical and non-technical audiences.
- Support the development of security automation to improve metrics such as mean time to respond and remediate.
- Stay current with cybersecurity news and trends relevant to the business and industry.
- Participate in the information security on-call rotation, providing emergency support for security-related incidents.
- Provide input into the development of security policies and procedures.
- Interface with other business units such as Governance, Risk, and Compliance to communicate program status and overall posture.
- Promote a positive security culture through knowledge sharing, influences, and conduct.
- Create and maintain role-specific documentation.
- Participate in the Change Advisory Board (CAB).
- Ability to apply an organization's goals and objectives to develop and maintain secure architecture.
- Ability to apply secure system design tools, methods, and techniques.
- Ability to communicate effectively in speaking and writing.
- Ability to drive maturity in the security program through measurable results and positive engagement.
- Ability to optimize systems to meet enterprise performance requirements.
- Ability to serve as a key liaison with the enterprise architecture team and coordinate with system owners and common control providers.
- Knowledge of cyber threats and vulnerabilities.
- Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Knowledge of database systems.
- Knowledge of encryption algorithms and cryptography and cryptographic key management concepts.
- Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
- Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
- Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- Skill in applying and incorporating information technologies into proposed solutions.
- Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
- Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software).
- Skill in designing countermeasures to identified security risks.
- Skill in designing multi-level security/cross domain solutions.
- Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
- Skill in translating operational requirements into protection needs (i.e., security controls).
- Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
Education/Experience
- Bachelor’s degree in Computer Science, Information Systems, Cybersecurity, or Software Engineering.
- 5+ years of relevant experience in cybersecurity or information technology.
- Proficient in a scripting language such as Python, PowerShell, or VBA.
Licenses and Certifications
- One or more technical or cybersecurity certification preferred (e.g., CISSP, CISA, CISM, CCSP, CRISC, CEH, Security+, GSEC, SSCP)
Who We Hire?
Simply put, we hire everyone. MillerKnoll is comprised of people of all abilities, gender identities and expressions, ages, ethnicities, sexual orientations, veterans from every branch of military service, and more. Here, you can bring your whole self to work. We’re committed to equal opportunity employment, including veterans and people with disabilities.
MillerKnoll complies with applicable disability laws and makes reasonable accommodations for applicants and employees with disabilities. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact MillerKnoll Talent Acquisition at careers_help@millerknoll.com.
Tags: Antivirus Automation CCSP CEH CISA CISM CISSP Compliance Computer Science CRISC Cryptography Encryption Firewalls Governance GSEC IT infrastructure Network security OpenID PowerShell Privacy Python Risk management SAML Scripting SSCP STEM Vulnerabilities
Perks/benefits: Equity / stock options Health care Insurance Medical leave Parental leave
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Information Security Officer jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Product Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cyber Security Specialist jobs
- Open Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Network Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Security Consultant jobs
- Open Senior Information Security Analyst jobs
- Open Security Operations Analyst jobs
- Open Manager Pentest H/F jobs
- Open Information Security Architect jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open Threat intelligence-related jobs
- Open DevOps-related jobs
- Open DoD-related jobs
- Open Security Clearance-related jobs
- Open APIs-related jobs
- Open CEH-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open SaaS-related jobs
- Open EDR-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open PowerShell-related jobs