Sidley Austin LLP

Information Security Architect

Recruiting Location US-IL-Chicago
Department
Information Technology

Summary

The Information Security Architect for the Security Operations function is responsible for providing design, implementation and support services for the Firm. This individual is responsible for designing, developing, implementing and maintaining the tools, technologies, and processes that support the ongoing security operations functions. The Information Security Architect acts as a subject matter expert and works with cross-functional teams as required to ensure continuous operational needs are met securely. This individual participates in Information Security Operations which provides timely response to potential technical or security issues related to implemented solutions.

Duties and Responsibilities

  • Design, build and help lead implementation of security technologies based on enterprise business strategy, business capabilities and business requirements
  • Partners with stakeholders within IT and various departments on projects and initiatives to apply security requirements for projects, develop security architecture, develop detailed designs, and providing support to help integrate security controls during solution deployment
  • Design and implement security architecture elements to both mitigate current and future threats as well as scale to meet business requirements across all relevant locations
  • Create and design forward-thinking solutions with consideration to overall user experience and user adoption while maintaining a high level of security that is consistent with all standards, policies and guidelines
  • Focus on continuous improvement of Sidley’s security posture through identification of existing security architecture gaps and make recommendations on enhancements
  • Provides user specific training and documentation to ensure successful deployment and maintenance of security-specific applications and tools
  • Develops technical designs for projects to meet information security requirements based on approved security architectures design
  • Define the principles, guidelines, standards and solution patterns to ensure solution decisions are aligned with the enterprise's future-state architecture vision
  • Serves as a Subject Matter Expert in tools and technologies and also serves as a point of contact for troubleshooting issues

Qualifications

To perform this job successfully, an individual must be able to perform the Duties and Responsibilities (Duties) above satisfactorily and meet the requirements below.  The requirements listed below are representative of the minimum knowledge, skill, and/or ability required.  Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions of the job.  If you need such an accommodation, please email staffrecruiting@sidley.com (current employees should contact Human Resources). 

 

Education and/or Experience: 

Required:

  • Bachelor’s degree or equivalent combination of education and/or experience, with a preference for those with a degree
  • Minimum of 5 years of experience in an Information Security role with at least two years in an incident response, threat analysis, or a security operation center role.
  • Relevant knowledge and experience in two or more of the following areas: incident response, threat analysis, malware response , security operations, Network Security/next generation firewall, proxy configuration and management
  • Demonstrated experience in threat detection technologies including two or more of the following: network or host intrusion prevention/detection systems (IPS/IDS), Endpoint Protection, Security Incident Event Management (SIEM), data loss prevention (DLP)
  • Demonstrated ability to analyze security events, perform initial triage, and determine appropriate next steps
  • Demonstrated experience in security projects development, security vendor or services management, and request for proposal processes and procedures

Preferred:

  • Certified Information Systems Security Professional (CISSP) or equivalent is preferred
  • One or more of the following technical certifications is preferred: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensics Analyst (GCFA), or GIAC Reverse Engineering Malware (GREM), EC-Council Certified Security Analyst

Other Skills and Abilities:

The following will also be required of the successful candidate:

  • Strong organizational skills
  • Strong attention to detail
  • Good judgment
  • Strong interpersonal communication skills
  • Strong analytical and problem solving skills
  • Able to work harmoniously and effectively with others
  • Able to preserve confidentiality and exercise discretion
  • Able to work under pressure
  • Able to manage multiple projects with competing deadlines and priorities

Sidley Austin LLP is an Equal Opportunity Employer

 

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed