https://bayt.page.link/ipedfdzpEDRi1oHA6
أنشئ تنبيهًا وظيفيًا للوظائف المشابهة

الوصف الوظيفي

Why join us?



Our purpose is to design for the good of humankind. It’s the ideal we strive toward each day in everything we do. Being a part of MillerKnoll means being a part of something larger than your work team, or even your brand. We are redefining modern for the 21st century. And our success allows MillerKnoll to support causes that align with our values, so we can build a more sustainable, equitable, and beautiful future for everyone.


Role: Security Analyst


Location: Bangalore
 


Purpose / Profile


As a Security Analyst at Miller Knoll, you will help reduce enterprise risk by safeguarding the organization’s digital assets from cyber threats. You will work closely with the Security Operations Center to continuously monitor, analyze, and respond to security alerts and events. You will collaborate directly with the greater Information Security team to ensure compliance with industry regulations, standards, and best practices, as well as educate employees on proper cyber hygiene. You will help guarantee the confidentiality, integrity, and availability of the organization’s network and compute resources and aid in shaping strategies to reduce cyber risk.


Essential Functions


  • Provide timely detection and identification of possible attacks/intrusions and distinguish findings from benign activities.
  • Correlate incident data to identify specific vulnerabilities and make recommendations that enable prompt containment and remediation.
  • Coordinate with the greater organization to resolve cyber incidents.
  • Provide technical summaries of findings in accordance with established reporting procedures.
  • Escalate and triage incidents that may cause an immediate impact to the organization.
  • Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system logs) to identify possible threats.
  • Perform event correlation to gain situational awareness and to determine the effectiveness of an observed attack.
  • Assist in the development and implementation of security policies and procedures.
  • Track and document cyber incidents from initial detection through final resolution.
  • Assist in reducing risk by actively identify areas of non-compliance and making recommendations for improvement.
  • This role will work either in the UK shift (12 noon to – 9 pm) and/or US shift (5:30PM to 2:30 AM).

Additional Functions


  • Stay current with cybersecurity news and trends relevant to the business and industry.
  • Participate in the information security on-call rotation, providing emergency support for security-related incidents.
  • Provide input into the development of security policies and procedures.
  • Interface with other business units such as Governance, Risk, and Compliance to communicate program status and overall security posture.
  • Promote a positive security culture through knowledge sharing, influences, and conduct.
  • Create and maintain role-specific documentation.
  • Participate in the Change Advisory Board (CAB).

Knowledge, Skills, and Abilities


  • Knowledge of system administration concepts for operating systems such as Unix/Linux, IOS, Android, and Windows operating systems.
  • Knowledge of cloud service models and cloud security best practices.
  • Knowledge of procedures used for documenting and querying reported incidents, problems, and events.
  • Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
  • Knowledge of auditing and logging procedures (including server-based logging).
  • Knowledge of common software applications and their associated vulnerabilities.
  • Knowledge of host-based security products and how they reduce exploitation.
  • Knowledge of approach, strategy, and structure of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis).
  • Knowledge of MITRE ATT&CK and similar cybersecurity frameworks.
  • Knowledge of what constitutes a “threat” to a network.
  • Skill of identifying, capturing, containing, and reporting malware.
  • Skill in using incident handling methodologies.
  • Skill in using security event correlation tools.
  • Skill in developing analytic approaches to problems and situations for which information is incomplete or where no precedent exists.
  • Ability to identify unusual activity amongst a defined baseline.

Qualifications


Education/Experience


  • Bachelor’s in computer science, Information Systems, Cybersecurity, or Software Engineering.
  • 6-8 years of relevant experience in cybersecurity or information technology.
  • 3+ years of hands-on experience with an EDR/XDR solution, SEG, and SIEM.
  • Experienced in a scripting language such as Python, PowerShell, or VBA.

Licenses and Certifications


  • One or more technical or cybersecurity certification preferred (e.g., CISA, CCSP, CRISC, CEH, Security+, GSEC, SSCP)

Who We Hire?



Simply put, we hire everyone. MillerKnoll is comprised of people of all abilities, gender identities and expressions, ages, ethnicities, sexual orientations, veterans from every branch of military service, and more. Here, you can bring your whole self to work. We’re committed to equal opportunity employment, including veterans and people with disabilities.


MillerKnoll complies with applicable disability laws and makes reasonable accommodations for applicants and employees with disabilities. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact MillerKnoll Talent Acquisition at  careers_help@millerknoll.com.


لقد تجاوزت الحد الأقصى لعدد التنبيهات الوظيفية المسموح بإضافتها والذي يبلغ 15. يرجى حذف إحدى التنبيهات الوظيفية الحالية لإضافة تنبيه جديد
تم إنشاء تنبيه للوظائف المماثلة بنجاح. يمكنك إدارة التنبيهات عبر الذهاب إلى الإعدادات.
تم إلغاء تفعيل تنبيه الوظائف المماثلة بنجاح. يمكنك إدارة التنبيهات عبر الذهاب إلى الإعدادات.