About Cognite
Learn more about Cognite here
Our values
Impact: Cogniters strive to make an impact in all that they do. We are result-oriented, always asking ourselves.
Ownership: Cogniters embrace a culture of ownership. We go beyond our comfort zones to contribute to the greater good, fostering inclusivity and sharing responsibilities for challenges and success.
Relentless: Cogniters are relentless in their pursuit of innovation. We are determined and deliverable (never ruthless or reckless), facing challenges head-on and viewing setbacks as opportunities for growth.
About the role and the team
The Security Operations team’s mission: “Through detection, enable teams and individuals to respond and recover. With analysis, improve the organization's ability to identify and protect”.
As a Security Engineer in Cognite Security Operations, you are at the center of security events. In order to achieve our mission, we are integrated in the business. This applies from the input the team receives to how the output is delivered. We base and prioritize our work on business needs, and in return we provide actionable insights and where possible concrete actions.
In the context of NIST Cybersecurity Framework (CSF) the Cognite Security Operations core activities reside in Detect and Protect. However, in order to ensure velocity and continuous improvement we have to avoid having a “throw-over-the-fence” culture - this is deeply embedded in Cognite’s culture and reflected in our values.
In order to achieve the above, orchestration and automation is key. The Security Operations team should always seek to offload work to software and machines. In all our work, we should have a mindset of avoiding doing the same thing twice.
You will have the opportunity to shape and influence how we work as a team and as an organization, e.g. by presenting your proposals in an architecture forum, receiving feedback from product managers, developers, engineers and architects.
As a team we support the development of junior staff members to gain greater perspective on IT and OT security, and customer expectations and usage patterns.