Join our talent network

Security GRC Manager

Job ID: 5848

Updated: Jul 7, 2021

Location: Chicago, IL, United States

Category: Security Governance

Share:

Essential Job Functions

POSITION OVERVIEW

The Security GRC Manager serves on the Governance, Risk Compliance (GRC) team, leads and executes the programs within the GRC team, serves in a mentoring role, is a subject matter expert for Information Security (consulting to technical / non-technical management and the user community), and performs key risk management functions within the Security Governance department. Primary functions include lifecycle management of client responses, Policy & Standards lifecycle management, Security Vendor Risk program management, Security Awareness, Controls Assurance, and GRC platform and program management.

ESSENTIAL FUNCTIONS

  • Oversee, evaluate, and supports the documentation, validation, assessment, and authorization processes necessary to assure that existing and new information technology (IT) systems meet the organization's cybersecurity and risk requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.
  • Consult with customers to gather and evaluate functional requirements. Provides guidance to customers about applicability of information systems to meet business needs. 
  • Serve as a subject matter expert for Information Security, consulting to technical management non-technical management, and attorneys as necessary.
  • Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.
  • Develop and maintain cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.  Define and participate in long-term strategy and planning for GRC programs
  • Conduct evaluations of an IT program or its individual components to determine compliance with published standards.
  • Lead the management and support of the GRC technology and Security Governance solutions. Create and maintain system, procedural and support documentation.
  • Manage and support the 3rd Party Security Vendor Risk Management program and lifecycle.
  • Document and perform Risk Assessments for third-parties (e.g., vendors and service providers). Respond to security assessments, questionnaires and audits from clients and third-party business partners.
  • Lead in the creation and maintenance of security policies, standards, processes and guidelines for approval by Firm management. Evaluate exception requests and make approval recommendations to management.
  • Lead and oversee the lifecycle of the Security Awareness program.  This includes roadmap development, plan, coordinate, measure, and evaluate cyber training/education courses, methods, and techniques based on instructional needs.  

•     Vulnerability Management: collect information on emerging threats including software vulnerabilities. Coordinate triage of and response to vulnerability information. Disseminate this information regularly to firm staff and management as appropriate.

Qualifications & Requirements

QUALIFICATIONS

Education, Work Experience, Skills

  • Bachelor's degree or five (5) years of work experience in IT Security is required.
  • Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), Certified Information Security Manager (CISM), or other relevant training and certifications are preferred.
  • Strong knowledge on Security frameworks and technologies such as ISO 27001, NIST, SOC, SIG… is required
  • Prior IT Security experience in the legal industry experience is preferred.
  • Technical writing experience is required.  Experience with instructional content, educational writing, and technical writing strongly preferred.
  • Four (4) years of Information Security experience required. Those containing hands on technical experience are preferred.
  • Three or more years of experience managing timelines and being self-directed preferred.
  • Governance, Risk, and Compliance (GRC) tool management (Administrative and/or Engineering) is preferred.
  • Client focus, including tact and diplomacy is required.
  • Interview, gather, and understand content from subject-matter experts
  • Ability to perform as primary Security Subject Matter Expert (SME) in a senior or lead capacity.
  • Ability to facilitate and lead project and vendor risk assessments with relative independence and provide guidance on secure design and operation.
  • Ability to independently complete and assist in completing client security questionnaires and security assessments concerning the Firm’s security program and controls.
  • Ability to communicate an effective security awareness message throughout the organization.
  • Demonstrate ability to create and maintain security policy, standard, guideline and procedure documents.
  • Demonstrate ability to effectively communicate deeply technical topics at an appropriate level of detail to varied audiences - including IT Subject Matter Experts, senior management and non-technical users
  • Strong knowledge on Security frameworks and technologies such as ISO 27001, NIST, SOC, SIG
  • Experience (Administration or Engineering) in GRC platforms
  • Additional skills mapped to Knowledge, Skills, and Abilities (KSAs) based on NIST SP 800-181.

 

Technologies/Software

  • Broad awareness of and exposure to diverse security tools and their capabilities, including commercial and open-source options.  
  • Strong knowledge of risk management principles and practices.
  • Strong knowledge of security administration and role-based security controls.
  • Strong knowledge and use of GRC platforms.
  • Knowledge of host and network-based anti-malware technologies.
  • Knowledge of authentication technologies and interactions between diverse authentication platforms, both on-site and remote.
  • Knowledge of client and server firewalling technologies and capabilities.
  • Knowledge of security event management (SIEM), event correlation and analysis technologies.
  • Knowledge of data encryption technologies.
  • Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities.
  • Knowledge of web filtering and email SPAM prevention techniques.
  • Knowledge of vulnerability assessment and forensic investigations tools.
  • Knowledge of mobile device security and Mobile Device Management solutions.
  • Knowledge of Privileged Access Management technologies.

Relevant Security Technologies

  • Windows Authentication and Active Directory integration
  • Anti-Malware and AEP technologies
  • Encryption
  • Security Incident and Event Management
  • Web Filtering
  • IDS/IPS
  • Firewalls
  • Vulnerability management tools
  • Mobile Device Management
  • Privileged Access Management

 

Certificates, Licensures, Registrations

  • Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), Certified Information Security Manager (CISM), or other relevant training and certifications are preferred.

How to Apply

Thank you for your interest in Kirkland & Ellis LLP.  To complete an application and submit your resume, please click "Apply Now."

Equal Employment Opportunity

All employment decisions, including the recruiting, hiring, placement, training availability, promotion, compensation, evaluation, disciplinary actions, and termination of employment (if necessary) are made without regard to the employee’s race, color, creed, religion, sex, pregnancy or childbirth, personal appearance, family responsibilities, sexual orientation or preference, gender identity, political affiliation, source of income, place of residence, national or ethnic origin, ancestry, age, marital status, military veteran status, unfavorable discharge from military service, physical or mental disability, or on any other basis prohibited by applicable law.

Closing Statement

The www.kirkland.com job postings and recruiting mailbox are for candidates only. If you are a recruiter, search firm or employment agency, and do not have a signed contract with Kirkland & Ellis LLP ("K&E") and have not been asked specifically to submit candidates, you will not be compensated in any way for your referral of a candidate even if K&E hires the candidate. Direct contact with K&E employees in an attempt to present candidates is inappropriate and will be a factor in determining any future professional relationship with the Firm.