IT Analyst Architect - Information Security

About this Opportunity As an IT Analyst Architect - Information Security, you'll be responsible for the integration of new Herman Miller technologies. You will provide support to functional areas by creating and communicating solutions to complex problems and projects. What You'll Do You'll have opportunities to speak up, solve problems, lead others, and be an owner every day as you... Capture and effectively communicate in-depth technical knowledge. Conceptualize, drive, and execute solutions to the most complex problems. Identify opportunities and own improvements to technologies and IT processes. Lead the integration of new technologies or IT initiatives. You may also lead large projects. Maintain, apply, and teach IT expertise with superior results. Manage small to medium project budgets and hold accountability for expenses. Mentor global new talent by teaching IT knowledge and skills. Present work output in a clear and concise manner. Set IT best practices. Maintain awareness of network and computer vulnerability. You will communicate these vulnerabilities to internal teams at Herman Miller. Design and monitor the network environment for security breaches, review of audit information, and network management. Support the administration of the network environment. You'll also upgrade software and provide management of the anti-virus, firewalls, and authentication systems. Perform problem resolution activities and work with the Help Desk to troubleshoot security problems. Participate in work team meeting and audit reviews. Perform additional responsibilities as requested to achieve business objectives. Sound Like You? You might be just who we're looking for if you have... A Bachelor's Degree in Computer Science, Information Systems (IS), or relevant academic discipline, or equivalent experience in IT Security. A Master's degree is preferred. Three years of experience with a working knowledge of TCP/IP protocols. Three years of experience with network firewall technology. Cisco PIX is preferred. Three years of experience with NT system networking configuration and domain administration or equivalent. Two years of experience with UNIX systems, including scripting, network configuration, and administration. Two years of experience in intrusion detection. One year of experience with RAS (remote access server technology). A demonstrated working knowledge of Linux. A solid understanding and working knowledge of Internet networking technology, DNS (domain name server), and DHCP. A minimum of eight years of professional IT and IS experience. One to three years of experience participating on project teams. The ability to learn and integrate new technologies as business needs change. An expert knowledge of how current trends and technology may be used to support business partners. The ability to anticipate technology solutions to solve current and future business needs. An advanced understanding of and ability to strategically connect the needs of multiple Herman Miller functional areas. An in-depth knowledge of IT and functional area strategies and how they are integrated. The ability to perform all essential job functions of the position with or without accommodations. Who We Are At Herman Miller, our unique culture represents the collective attitudes, ideas, and experiences of the people who work here. We focus on protecting the environment, impacting our communities, exceeding the expectations of our customers through high quality products, and championing diversity in all areas of the business, and together we are on a journey toward a better world. We support the well-being of our employees in and outside of work by providing a variety of opportunities including award-winning work-life integration resources, development programs, complex health and wellness offerings, and much more. 19431
Salary Range: NA
Minimum Qualification
Less than 5 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.