Home > Find Jobs

Job Search

A tropical beach
MillerKnoll company logo

MillerKnoll

USA

Posted on: 28 February 2024

Experience

n/a

Work

n/a

Employee Type

n/a

Salary Range

n/a

Information Security Technical Architect

Why join us?

Our purpose is to design for the good of humankind. It’s the ideal we strive toward each day in everything we do. Being a part of MillerKnoll means being a part of something larger than your work team, or even your brand. We are redefining modern for the 21st century. And our success allows MillerKnoll to support causes that align with our values, so we can build a more sustainable, equitable, and beautiful future for everyone.

Purpose / Profile

As an Information Security Technical Architect at MillerKnoll, you will collaborate with various teams across the enterprise to ensure projects and technology initiatives are performed according to best cybersecurity practices and standards. This role will help drive cybersecurity and business solutions, from idea, to development, to implementation, and will work closely with IT partners, business stakeholders, and global colleagues to affirm success. You’re a great fit for this role if you’re experienced in multiple domains of cybersecurity, a self-starter who is comfortable with ambiguity, and someone who thrives in a collaborative environment.

Essential Functions
Perform risk-based assessments of current and emerging security threats and recommend and design countermeasures.
Identity systemic security issues based on the analysis of vulnerability and configuration data.
Determine the protection needs (i.e., security controls) for information system(s) and network(s) and document, articulate, and assist in solution engineering.
Ensure that acquired or developed system(s) and architecture(s) are consistent with the organization’s cybersecurity standards and guidelines.
Identify and prioritize critical business functions in collaboration with organizational stakeholders.
Conduct external and internal research and analysis, translating proposed capabilities into technical requirements.
Identify opportunities to reduce the organization's attack surface by analyzing trends and recommend remediation actions and security controls.
Prioritize and communicate security findings with technical and non-technical audiences.
Support the development of security automation to improve metrics such as mean time to respond and remediate.
Drive maturity in the security program through measurable results and positive engagement.
Additional Functions
Stay current with cybersecurity news and trends relevant to the business and industry.
Participate in the information security on-call rotation, providing emergency support for security-related incidents.
Provide input into the development of security policies and procedures.
Interface with other business units such as Governance, Risk, and Compliance to communicate program status and overall posture.
Promote a positive security culture through knowledge sharing, influences, and conduct.
Create and maintain role-specific documentation.
Participate in the Change Advisory Board (CAB).
Knowledge, Skills, and Abilities
Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of cyber threats and vulnerabilities.
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
Knowledge of encryption algorithms and cryptography and cryptographic key management concepts.
Knowledge of database systems.
Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
Skill in applying and incorporating information technologies into proposed solutions.
Skill in designing countermeasures to identified security risks.
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software, anti-spyware).
Skill in designing multi-level security/cross domain solutions.
Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
Skill in translating operational requirements into protection needs (i.e., security controls).
Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture.
Ability to communicate effectively when writing.
Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
Ability to apply an organization's goals and objectives to develop and maintain architecture.
Ability to optimize systems to meet enterprise performance requirements.
Ability to apply secure system design tools, methods and techniques.
Ability to serve as the primary liaison between the enterprise architect and the systems security engineer and coordinates with system owners, common control providers, and system security officers.
Qualifications
Education/Experience
Bachelor in Computer Science, Information Systems, Cybersecurity, or Software Engineering
5+ years of relevant experience in cybersecurity or information technology
Proficient in a scripting language such as Python, PowerShell, or VBA.
Licenses and Certifications
One or more technical or cybersecurity certification preferred (e.g., CISSP, CISA, CISM, CCSP, CRISC, CEH, Security+, GSEC, SSCP)

Who We Hire?

Simply put, we hire everyone. MillerKnoll is comprised of people of all abilities, gender identities and expressions, ages, ethnicities, sexual orientations, veterans from every branch of military service, and more. Here, you can bring your whole self to work. We’re committed to equal opportunity employment, including veterans and people with disabilities.

A starting compensation range for this role is $88,600.00 - $111,750.00. Relevant salary considerations will include candidate qualifications and experience, other business/organizational needs and market factors . You may also be eligible to receive a geographic premium, annual discretionary incentive and equity awards which are subject to the rules governing these programs. The company offers a full spectrum of benefits including Medical, Prescription Drug, Dental, Vision, Health Savings Account, Dependent Day Care Savings Account, Life Insurance, Disability and Other Insurance Plans, Paid Time Off (including Vacation and Parental Leave), Holidays, 401(k), and Short/Long Term Disability, in addition to other special perks reserved for our associates.

This organization participates in E-Verify Employment Eligibility Verification. In general, MillerKnoll positions are closed within 45 days and are open for applications for a minimum of 5 days. We encourage our prospective candidates to submit their application(s) expediently so as not to miss out on our opportunities. We frequently post new opportunities and encourage prospective candidates to check back often for new postings.

Tags

cybersecurity
risk management
Apply to job