成为 NIKE, Inc. 团队的一员
NIKE, Inc. 不仅仅是为全球顶尖运动员提供装备,更是一个发掘潜力、突破边界、创造无限可能的地方。我们致力于寻找善于成长、思考、梦想和创造的人才。我们的企业文化因拥抱多元化、鼓励想象力而蓬勃发展。Nike 寻觅奋斗者、领导者和梦想者的加入。NIKE, Inc. 员工以出色的专业技能迎接挑战,满怀激情地投身于不断变化的行业发展之中。
WHO YOU’LL WORK WITH
This role is part of the Insider Threat Operations (ITO) team within Corporate Information Security, and reports to the Director of Greater China Corporate Information Security (CIS) based out of GC HQ (Shanghai, China), providing subject matter expertise to support ITO Analysts, working across peer groups and engagement with other stakeholders. You will work with ITO team members and other key stakeholders; Corporate Information Security Operations Teams, Resilience, Legal, HR, Governance, Data Protection, etc.
WHO WE ARE LOOKING FOR
We’re looking for a Senior Cyber Defense Analyst, Insider Threat. This role is a critical team member in NIKE’s Corporate Information Security group and supports NIKE’s Insider Threat program. The Sr. Insider Threat Analyst will conduct technical analysis and investigate user activity data and alerts to identify indicators of data compromise or loss of Nike Intellectual Property. In addition to producing investigative leads, Analyst will review data in support of security inquiries and data loss prevention alerts.
We’re seeking a high character, self-motivated, and results-oriented professional who thrives in a high-impact, high-reward environment. The successful candidate will bring a high level of passion for building and driving the operations of the Insider Threat Operations team. A solid communications foundation is a must, and we are looking for a person who is motivated to work the details to ensure our organization operates effectively. In addition, the candidate will get to work alongside truly talented teams and help them enhance their performance by promoting collaboration, innovation and a sense of ownership.
- Bachelor's degree in Intelligence, Social Sciences, Computer Sciences or a related field
- Experience with analytical problem solving and familiarity with conducting operations relating to insider threat, counterintelligence investigations, or counterespionage.
- Familiarity with data analytics tools used for insider threat information collection on computer networks or knowledge of other insider threat risk scoring data analytics tools and programs.
- Understanding of insider threat analysis, user activity data, and DLP data.
- Experience with the modus operandi of insider threat and associated capabilities and motivations.
- Experience in support of government or large corporate Insider Threat Programs.
- Demonstrated leadership ability, including the ability to influence and motivate others in a cross-functional team (both directly and indirectly)
- Ability to establish an independent view, while effectively collaborating with peers in a team environment
- Strong analytical skills and experience creating and presenting executive reports and briefings
- Vision to anticipate problems and provide workable solutions.
- Strong verbal and written communication, as well as information-seeking skills
- Strong analytical and quantitative skills; ability to use data and metrics to drive recommendations
- Proficient in Microsoft PowerPoint, Word, Excel; Mac skills also highly preferred
- Security certifications preferred but equivalent knowledge will be considered.
- Certified Information Security Professional (CISSP)
- Global Information Assurance Certification (GIAC)
WHAT YOU’LL WORK ON
If this is you, you’ll be working with the Insider Threat Operations team and performing these key tasks:
- Analysis and Assessment. Conduct all-source analysis, cyber analysis, and investigative analysis. Coordinate the application of insider risk models and assign risk levels for insiders. Access and integrate information from client’s network monitoring tools and other data analytics tools and sources to decipher underlying trends or uncover anomalies and discern obscure patterns and attributes.
- Data Triage. Conduct data triage of anomalous events collected by approved user and entity behavior analytics (UEBA), Data Loss Prevention (DLP) and other client network and endpoint monitoring tools. Elevate and investigate anomalous events of concern.
- Insider Threat Investigations. Support insider threat investigation according to requirements in the established policies and procedures. Document findings in written reports.
- Analytic Case Support. Conduct case support to client’s insider threat activities and requirements pursuant to investigations, administrative or security inquiries, security risk assessments, or other adjudicative assessments.
- Briefings and Reports. Prepare and present analysis, in the form of briefings and reports. Briefings and reports must be free from style and grammatical errors, shall address all investigative and analytical findings, and be suitable for publication to client stakeholders.
我们的招聘策略
01 申请
我们的团队拥有多元化的技能组合、知识库、意见、想法和背景。 希望你能找到适合自己的职位,因此请查看职位描述、部门和团队,找到适合你的职位。
02 与招聘人员会面或进行评估
如果被选中担任公司职位,招聘人员将会联系你开启面试流程,并在整个过程中担任你的主要联系人。 如果是零售职位,你需要完成互动式评估,包括聊天和测验,用时约 10 到 20 分钟。 无论担任什么职位,我们都希望充分了解你。因此,请尽情展现你如何提供世界一流的服务以及你的独特之处。
03 面试
从容开启这一阶段,做好充分调查,了解候选人标准并根据个人情况和背景准备可能会被问到的问题。