Cyber Defense at Micron is about one major guiding principal, protecting Micron’s Intellectual Property. The Intelligence Analyst is driving the knowledge from the outside into Micron for greater awareness and action.
For more than 35 years, Micron’s teams of dreamers, visionaries, and scientists have redefined innovation—designing and building some of the world’s most advanced memory and semiconductor technologies.
The Cyber Intelligence Collection and Integration position requires the Analyst to be well connected to external Information Security Communities and forums. Through these relationships the Analyst will need to understand the impact of the intelligence to Micron’s unique business needs and concerns. The Analyst will need to determine how each piece of intelligence will impact the risk to Micron’s IT environment. With the Intelligence that poses a threat to Micron the Analyst will work with the Managed Service Providers and the Cyber Engineering team to put in place IoC (Indicators of Compromise) into our many Security controls and monitoring systems. The Analyst will also work closely with the Cyber Proactive Threat Analyst to help determine potential areas to focus on based on solid intelligence.
Responsibilities will include, but are not limited to, the following:
- Compiling and analyzing cyber threat information and making recommendations based on suspected or known context in order to draw insights and conclusions regarding its relative threat to the company
- Producing, editing, and distributing a variety of concise and actionable threat analysis and warning products in written and presentation form to an audience that spans a range of customers from senior company executives to security analysts
- Conducting studies and making recommendations to identify cyber threats, threat vectors, threat actors, and threat trends
- Identifying and developing threat signatures from all available sources and providing direction to Proactive Threat teams to remediate
- Implementing and supporting standard procedures for incident response
- Participating in internal and external threat intelligence and cybersecurity forums (IT-ISAC, Infragard, etc)
Successful candidates for this position will have:
- Excellent communication skills, with an emphasis on the ability to discuss technical issues with non-technical people
- Have an in-depth understanding in at least three of the following areas: Telecommunications, Network, and Internet Security; Operations Security; Risk and Compliance; Access Control Systems and Methodologies; Security Architectures and Models; Security Management Practices; Law Enforcement; Investigative techniques
- Excellent Organizational skills and the ability to follow Incidents to their conclusion
- Independent and self-directed
- Ability to react to high pressure dynamic changing environments
- Strong problem solving and analytical skills
Additionally, it’s preferred that candidates for this position have:
- 3 years of experience in Information Security
- 5 years of experience in the following:
- Information Technology with some Information Security experience and a proven track record of working with diverse set of customers to solve business problems.
- CCFP or CISSP certification
Bachelor’s or master’s degree in computer science, management information systems, business administration, criminal justice, or related discipline