Information Security Technical Architect

US - Michigan


MillerKnoll is a collective of dynamic brands that comes together to design the world we live in.

View company page

Why join us? 

Our purpose is to design for the good of humankind. It’s the ideal we strive toward each day in everything we do. Being a part of MillerKnoll means being a part of something larger than your work team, or even your brand. We are redefining modern for the 21st century. And our success allows MillerKnoll to support causes that align with our values, so we can build a more sustainable, equitable, and beautiful future for everyone.

Purpose / Profile

As an Information Security Technical Architect at MillerKnoll, you will collaborate with various teams across the enterprise to ensure projects and technology initiatives are performed according to best cybersecurity practices and standards. This role will help drive cybersecurity and business solutions, from idea, to development, to implementation, and will work closely with IT partners, business stakeholders, and global colleagues to affirm success. You’re a great fit for this role if you’re experienced in multiple domains of cybersecurity, a self-starter who is comfortable with ambiguity, and someone who thrives in a collaborative environment.

Essential Functions
  • Perform risk-based assessments of current and emerging security threats and recommend and design countermeasures.
  • Identity systemic security issues based on the analysis of vulnerability and configuration data.
  • Determine the protection needs (i.e., security controls) for information system(s) and network(s) and document, articulate, and assist in solution engineering.
  • Ensure that acquired or developed system(s) and architecture(s) are consistent with the organization’s cybersecurity standards and guidelines.
  • Identify and prioritize critical business functions in collaboration with organizational stakeholders.
  • Conduct external and internal research and analysis, translating proposed capabilities into technical requirements.
  • Identify opportunities to reduce the organization's attack surface by analyzing trends and recommend remediation actions and security controls.
  • Prioritize and communicate security findings with technical and non-technical audiences.
  • Support the development of security automation to improve metrics such as mean time to respond and remediate.
  • Drive maturity in the security program through measurable results and positive engagement.
Additional Functions
  • Stay current with cybersecurity news and trends relevant to the business and industry.
  • Participate in the information security on-call rotation, providing emergency support for security-related incidents.
  • Provide input into the development of security policies and procedures.
  • Interface with other business units such as Governance, Risk, and Compliance to communicate program status and overall posture.
  • Promote a positive security culture through knowledge sharing, influences, and conduct.
  • Create and maintain role-specific documentation.
  • Participate in the Change Advisory Board (CAB).
Knowledge, Skills, and Abilities
  • Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
  • Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of cyber threats and vulnerabilities.
  • Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
  • Knowledge of encryption algorithms and cryptography and cryptographic key management concepts.
  • Knowledge of database systems.
  • Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
  • Skill in applying and incorporating information technologies into proposed solutions.
  • Skill in designing countermeasures to identified security risks.
  • Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
  • Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software, anti-spyware).
  • Skill in designing multi-level security/cross domain solutions.
  • Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
  • Skill in translating operational requirements into protection needs (i.e., security controls).
  • Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
  • Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture.
  • Ability to communicate effectively when writing.
  • Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
  • Ability to apply an organization's goals and objectives to develop and maintain architecture.
  • Ability to optimize systems to meet enterprise performance requirements.
  • Ability to apply secure system design tools, methods and techniques.
  • Ability to serve as the primary liaison between the enterprise architect and the systems security engineer and coordinates with system owners, common control providers, and system security officers.


  • Bachelor in Computer Science, Information Systems, Cybersecurity, or Software Engineering
  • 5+ years of relevant experience in cybersecurity or information technology
  • Proficient in a scripting language such as Python, PowerShell, or VBA.

Licenses and Certifications

  • One or more technical or cybersecurity certification preferred (e.g., CISSP, CISA, CISM, CCSP, CRISC, CEH, Security+, GSEC, SSCP)

Who We Hire?

Simply put, we hire everyone. MillerKnoll is comprised of people of all abilities, gender identities and expressions, ages, ethnicities, sexual orientations, veterans from every branch of military service, and more. Here, you can bring your whole self to work. We’re committed to equal opportunity employment, including veterans and people with disabilities.

A starting compensation range for this role is $88,600.00 - $111,750.00. Relevant salary considerations will include candidate qualifications and experience, other business/organizational needs and market factors . You may also be eligible to receive a geographic premium, annual discretionary incentive and equity awards which are subject to the rules governing these programs. The company offers a full spectrum of benefits including Medical, Prescription Drug, Dental, Vision, Health Savings Account, Dependent Day Care Savings Account, Life Insurance, Disability and Other Insurance Plans, Paid Time Off (including Vacation and Parental Leave), Holidays, 401(k), and Short/Long Term Disability, in addition to other special perks reserved for our associates.

This organization participates in E-Verify Employment Eligibility Verification.
Apply now Apply later
  • Share this job via
  • or

Tags: Antivirus Automation CCSP CEH CISA CISM CISSP Compliance Computer Science CRISC Cryptography Encryption Firewalls Governance GSEC Network security OpenID PowerShell Privacy Python Risk management SAML Scripting SSCP STEM Vulnerabilities Vulnerability scans

Perks/benefits: Equity Health care Insurance Medical leave Parental leave

Region: North America
Country: United States
Job stats:  8  1  0
Category: Architecture Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.