Join our talent network

Cyber Security Architect I

Job ID: 7920

Updated: Jul 9, 2024

Location: Chicago, IL, United States

Category: Security Governance

Share:

About Kirkland & Ellis

At Kirkland & Ellis, we are united in our ambition and drive to move forward. We share core values that help us achieve excellence: collaboration, talent empowerment, service, inclusion, respect and gratitude. Our people are our greatest asset, and we invest in the brightest talent and encourage a diversity of perspectives and strengths to create dynamic teams that operate at the pinnacle of their field. Our talented professionals show up every day knowing they will engage in meaningful work, continuous learning and professional development.
 
As one of the world’s leading law firms, we serve a broad range of clients with market-leading practices in private equity, M&A and other complex corporate transactions; investment fund formation and alternative asset management; restructurings; high-stakes commercial and intellectual property litigation; and government, regulatory and internal investigations. We handle the most complicated and sophisticated legal matters because we don’t just meet industry standards, we create them. We bring innovation and entrepreneurialism to every engagement and, as a result, have long-standing client relationships with leading global corporations and financial sponsors. With 6,500 employees (including 3,500 lawyers) operating from 20 offices across the United States, Europe, the Middle East and Asia, we are one of the largest law firms in the world and a top financial performer.

Essential Job Functions

The Cyber Security Architect I role is part of the Security Governance department and reports to the Director of Cyber Security Architecture and Forensics. The Security Governance department leads in protecting the firm from Cyber and Physical threats, and assists with assuring compliance to contractual, legal, and ethical requirements. Risk to the firm is reduced by providing clear direction for the secure delivery of technology, active identification of risks, and rapid response to threats. Security Governance is led by the CSO who reports to the CAO and works directly with the firm’s General Counsel.

ESSENTIAL FUNCTIONS

  • Evaluating and implementing new technologies, technical configurations, and policies and standards.
  • Evaluating currently deployed technologies against established good practices and providing reasoned recommendations for improvements.
  • Ability to come to expert level knowledge of security solutions that will be implemented at the Firm.
  • Ensuring delivery of project goals and strong hand over practices to operational teams.
  • Assisting with defining security reference architecture.
  • Creation of Project Security Whitepapers describing the security risks of new solutions.
  • Participating in the overall Architecture community at Kirkland
  • Conduct risk assessments of vulnerabilities and threats to our systems and networks.  Develop strategies to mitigate risks and ensure ongoing compliance with industry and regulatory requirements.
  • Voting member of the Architecture Review board
  • Participating in the development and delivery of the firmwide cyber security strategy.
  • Providing input in the assessment of enterprise cyber risk.
  • Supporting investigations and incident response activities.
  • Writing technical documentation.

OTHER FUNCTIONS

  • Communication
  • Developing organizational mission, objectives, milestones, and plans with little supervision. 
  • Independent and persuasive business writing.
  • Listening, understanding, and articulating technical and non-technical information (both written and oral formats) to customers, peers and/or management in a one-on-one or team context with some oversight.
  • Effective production support activities, including technical writing and the creation of documentation, training, and other communications without frequent supervision.
  • Has developed active listening skills.
  • Decision Making
  • Produces effective and practical decisions and problem solutions based on a mixture of analysis, experience, and judgment. 
  • Provides innovative and insightful ideas. 
  • Perceives the cross impact on other engagements.
  • Determines personnel needs and staffing.
  • Interpersonal Skills
  • Capable of defusing complex interpersonal issues effectively.
  • Negotiates skillfully in very difficult situations with both internal and external groups.
  • Inspires and motivates.
  • Recognized as a positive and motivational leader on the team.
  • Strategic/Change Leadership
  • Builds strategy and focuses on six months to one-year plans. 
  • Contributes individually or through others on complex issues or initiatives. 
  • Facilitates group progress on complex issues and initiatives.
  • Program/Project Management
  • Spearheads complex programs that span multiple inter-organizational units and clients.
  • Interfaces with senior management.

Qualifications & Requirements

The following experience and education does not need to be consecutive and is preferred.  Any combination of experience, education, and certification that demonstrates that the candidate can be successful in the position will be considered.

Education, Work Experience, Skills

  • Minimum five (5) years of experience in Information Technology operational and/or engineering roles of which at least three (3) years of experience in IT security, compliance, or risk management developing and deploying security technologies, policies, standards, and procedures.
  • Understanding of industry standard frameworks such as ISO 27001, NIST 800-53, CSF, CIS, ATT&CK Matrix.
  • Bachelor’s degree or better in Cyber Security or similar is preferred

Technologies/Software

  • Advanced Endpoint Security
  • Agent Based Data Loss Prevention (Host DLP)
  • Application Allow\Blocklisting
  • Azure IaaS & PaaS Security
  • Cloud Access Security Broker (CASB)
  • Cloud Security Posture Management (CSPM)
  • M365 Security Suite
  • Azure, OCI IaaS
  • Network IPS/IDS
  • Next Generation Firewall
  • Privileged Access Management
  • SIEM
  • Vulnerability Management
  • Web Application Firewall (WAF)

Certificates, Licensures, Registrations

  • CISSP, CISM and technically focused certifications is preferred.

WORK ENVIRONMENT

This job operates in a professional office environment.

How to Apply

Thank you for your interest in Kirkland & Ellis LLP.  To complete an application and submit your resume, please click "Apply Now."

Equal Employment Opportunity

All employment decisions, including the recruiting, hiring, placement, training availability, promotion, compensation, evaluation, disciplinary actions, and termination of employment (if necessary) are made without regard to the employee’s race, color, creed, religion, sex, pregnancy or childbirth, personal appearance, family responsibilities, sexual orientation or preference, gender identity, political affiliation, source of income, place of residence, national or ethnic origin, ancestry, age, marital status, military veteran status, unfavorable discharge from military service, physical or mental disability, or on any other basis prohibited by applicable law.

Closing Statement

The www.kirkland.com job postings and recruiting mailbox are for candidates only. If you are a recruiter, search firm or employment agency, and do not have a signed contract with Kirkland & Ellis LLP ("K&E") and have not been asked specifically to submit candidates, you will not be compensated in any way for your referral of a candidate even if K&E hires the candidate. Direct contact with K&E employees in an attempt to present candidates is inappropriate and will be a factor in determining any future professional relationship with the Firm. #LI-Hybrid #LI-JN1