Entra a far parte del team di NIKE, Inc.

NIKE, Inc. non si limita ad attrezzare i migliori atleti del mondo. Offre un luogo in cui scoprire le proprie potenzialità, superare i confini e oltrepassare i limiti. L'azienda è alla ricerca di persone in grado di crescere, pensare, sognare e creare. La sua cultura si alimenta con la diversità e la valorizzazione dell'immaginazione. Il marchio è alla ricerca di persone d'azione, di leader e di visionari. In NIKE, Inc. tutti i dipendenti apportano le proprie competenze e la propria passione in un contesto stimolante e in continua evoluzione.

WHO WILL YOU WORK WITH

This role reports into the Cybersecurity Incident Response team within Corporate Information Security.

WHO ARE WE LOOKING FOR

We’re looking for a Senior Cyber Security Analyst. This role on the team will include leveraging knowledge of industry best practices, good judgment and problem-solving skills to execute Nike security operations. Being on Nike’s front lines of defense, the Senior Cyber Defense Analyst is adept at making good decisions under pressure and be able to quick adapt to any security challenge. This individual also pays attention to detail and is disciplined in documenting process and procedures. The Senior Cyber Defense Analyst will also be Shift Lead (2nd tier support) for all requests coming into the department making sure departmental SLAs are met. The ideal candidate believes in operational excellence, continual process improvement and customer service.

WHAT WILL YOU WORK ON

If this is you, you’ll be working with the Cybersecurity Incident Response team and performing these key tasks:

  • Perform log analysis and correlate disparate datasets to identify abnormal behavior.

  • Respond to security events, driving issues to closure, and engaging all appropriate resources.

  • Document Security process and procedures.

  • Support service request in-take process and communicate back to requestors promptly

  • Provide enforcement of security policies, standards and procedures

  • Staying current on security technologies, trends, standards and best practices

  • Continually update skills

  • Other duties and responsibilities as assigned

WHAT YOU BRING

  • Bachelor’s degree in computer science or related field, or equivalent work experience

  • Five years of information technology experience with three years in an information security-related role

  • Solid knowledge of information security principles and practices

  • Minimum five years of security monitoring experience and incident response activities; preferably within a professional services firm or similar environment

  • Strong knowledge of incident response and crisis management with the ability to identify both tactical and strategic solutions using strong verbal and written communication skills

  • Cloud security knowledge and skills; securing cloud environments as well as detecting and responding to cyber security incidents in the cloud

  • Log (network, security, access, OS, application, etc.) analysis skills and experience in relation to identifying and investigating security incidents

  • Proficiency with Linux/UNIX, Windows, and/or Mac OSX

  • Understanding of application security and dev-sec-ops

  • Coding/scripting experience (PowerShell, Python, Ruby, Java, VB Scripting etc.)

  • Malware analysis, virus exploitation and mitigation techniques experience.

  • Comfortable with interfacing with other internal or external organizations regarding security policy and standards violations, security controls failure and incident response situations

  • Understanding of network, desktop and server technologies, including experience with network intrusion methods, network containment, segregation techniques and technologies such as Intrusion Detection Systems (IDS) and Intrusion Protection Systems (IPS)

  • The ability to learn and apply new concepts quickly

  • Resolves problems independently and/or through a support team.

  • Ability to balance and prioritize work

  • Must be trustworthy in keeping sensitive data confidential

One or more of the following professional certifications preferred, but not required:

  • Certified Information Security Professional (CISSP)Global Information Assurance Certifications (GIAC)

  • Speaking a language in addition to English preferred, but not required

Una breve introduzione

IL NOSTRO PIANO DI ASSUNZIONE

01 Candidati

I nostri team sono composti da persone che apportano un'ampia varietà di competenze, conoscenze, input, idee e background. Vogliamo aiutarti a trovare il tuo posto: rivedi le descrizioni delle posizioni, i reparti e i team per trovare il ruolo adatto a te.

02 Incontra un/una recruiter o completa una valutazione

Se selezionato per un ruolo aziendale, un reclutatore ti contatterà per avviare il processo di colloquio e sarà il tuo contatto principale durante tutto il processo. Per i ruoli di vendita al dettaglio, completerai una valutazione interattiva che include una chat e quiz e richiederà circa 10-20 minuti per essere completata.  Indipendentemente dal ruolo, vogliamo conoscere te, la tua totalità, quindi non esitare a scoprire il modo in cui ti avvicini a un servizio di livello mondiale e ciò che ti rende unico.

03 Preparati per il colloquio

Affronta questa fase con sicurezza, facendo le tue ricerche, comprendendo cosa stiamo cercando e preparandoti a rispondere alle domande che sono state ideate per saperne di più su di te e sul tuo background.

Due persone che sorridono e si abbracciano in un ambiente esterno