Information Security Technical Architect
US - Michigan
Applications have closed
MillerKnoll
MillerKnoll ist ein Kollektiv dynamischer Marken, die gemeinsam die Welt gestalten, in der wir leben.Why join us?
Our purpose is to design for the good of humankind. It’s the ideal we strive toward each day in everything we do. Being a part of MillerKnoll means being a part of something larger than your work team, or even your brand. We are redefining modern for the 21st century. And our success allows MillerKnoll to support causes that align with our values, so we can build a more sustainable, equitable, and beautiful future for everyone.
As an Information Security Technical Architect at MillerKnoll, you will collaborate with various teams across the enterprise to ensure projects and technology initiatives are performed according to best cybersecurity practices and standards. This role will help drive cybersecurity and business solutions, from idea, to development, to implementation, and will work closely with IT partners, business stakeholders, and global colleagues to affirm success. You’re a great fit for this role if you’re experienced in multiple domains of cybersecurity, a self-starter who is comfortable with ambiguity, and someone who thrives in a collaborative environment.
Essential Functions- Perform risk-based assessments of current and emerging security threats and recommend and design countermeasures.
- Identity systemic security issues based on the analysis of vulnerability and configuration data.
- Determine the protection needs (i.e., security controls) for information system(s) and network(s) and document, articulate, and assist in solution engineering.
- Ensure that acquired or developed system(s) and architecture(s) are consistent with the organization’s cybersecurity standards and guidelines.
- Identify and prioritize critical business functions in collaboration with organizational stakeholders.
- Conduct external and internal research and analysis, translating proposed capabilities into technical requirements.
- Identify opportunities to reduce the organization's attack surface by analyzing trends and recommend remediation actions and security controls.
- Prioritize and communicate security findings with technical and non-technical audiences.
- Support the development of security automation to improve metrics such as mean time to respond and remediate.
- Drive maturity in the security program through measurable results and positive engagement.
- Stay current with cybersecurity news and trends relevant to the business and industry.
- Participate in the information security on-call rotation, providing emergency support for security-related incidents.
- Provide input into the development of security policies and procedures.
- Interface with other business units such as Governance, Risk, and Compliance to communicate program status and overall posture.
- Promote a positive security culture through knowledge sharing, influences, and conduct.
- Create and maintain role-specific documentation.
- Participate in the Change Advisory Board (CAB).
- Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
- Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- Knowledge of cyber threats and vulnerabilities.
- Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
- Knowledge of encryption algorithms and cryptography and cryptographic key management concepts.
- Knowledge of database systems.
- Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
- Skill in applying and incorporating information technologies into proposed solutions.
- Skill in designing countermeasures to identified security risks.
- Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
- Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software, anti-spyware).
- Skill in designing multi-level security/cross domain solutions.
- Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
- Skill in translating operational requirements into protection needs (i.e., security controls).
- Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
- Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture.
- Ability to communicate effectively when writing.
- Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
- Ability to apply an organization's goals and objectives to develop and maintain architecture.
- Ability to optimize systems to meet enterprise performance requirements.
- Ability to apply secure system design tools, methods and techniques.
- Ability to serve as the primary liaison between the enterprise architect and the systems security engineer and coordinates with system owners, common control providers, and system security officers.
Education/Experience
- Bachelor in Computer Science, Information Systems, Cybersecurity, or Software Engineering
- 5+ years of relevant experience in cybersecurity or information technology
- Proficient in a scripting language such as Python, PowerShell, or VBA.
Licenses and Certifications
- One or more technical or cybersecurity certification preferred (e.g., CISSP, CISA, CISM, CCSP, CRISC, CEH, Security+, GSEC, SSCP)
Who We Hire?
Simply put, we hire everyone. MillerKnoll is comprised of people of all abilities, gender identities and expressions, ages, ethnicities, sexual orientations, veterans from every branch of military service, and more. Here, you can bring your whole self to work. We’re committed to equal opportunity employment, including veterans and people with disabilities.
Tags: Antivirus Automation CCSP CEH CISA CISM CISSP Compliance Computer Science CRISC Cryptography Encryption Firewalls Governance GSEC Network security OpenID PowerShell Privacy Python Risk management SAML Scripting SSCP STEM Vulnerabilities Vulnerability scans
Perks/benefits: Equity / stock options Health care Insurance Medical leave Parental leave
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Product Security Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cloud Security Architect jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Network Security Engineer jobs
- Open Senior Product Security Engineer jobs
- Open Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Information System Security Officer jobs
- Open Security Consultant jobs
- Open Information Systems Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Information Security Architect jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Security Architect jobs
- Open CISA-related jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open Analytics-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open GCP-related jobs
- Open ISO 27001-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open DoD-related jobs
- Open DevOps-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Vulnerability management-related jobs
- Open Security Clearance-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open SaaS-related jobs
- Open Malware-related jobs
- Open Security assessment-related jobs
- Open PowerShell-related jobs
- Open SQL-related jobs