Information Security Architect
Chicago, IL, United States
Summary:
The Information Security Architect for the Security Operations function is responsible for providing design, implementation and support services for the Firm. This individual is responsible for designing, developing, implementing and maintaining the tools, technologies, and processes that support the ongoing security operations functions. The Information Security Architect acts as a subject matter expert and works with cross-functional teams as required to ensure continuous operational needs are met securely. This individual participates in Information Security Operations which provides timely response to potential technical or security issues related to implemented solutions.
Duties and Responsibilities:
Design, build and help lead implementation of security technologies based on enterprise business strategy, business capabilities and business requirements
Partners with stakeholders within IT and various departments on projects and initiatives to apply security requirements for projects, develop security architecture, develop detailed designs, and providing support to help integrate security controls during solution deployment
Design and implement security architecture elements to both mitigate current and future threats as well as scale to meet business requirements across all relevant locations
Create and design forward-thinking solutions with consideration to overall user experience and user adoption while maintaining a high level of security that is consistent with all standards, policies and guidelines
Focus on continuous improvement of Sidleys security posture through identification of existing security architecture gaps and make recommendations on enhancements
Provides user specific training and documentation to ensure successful deployment and maintenance of security-specific applications and tools
Develops technical designs for projects to meet information security requirements based on approved security architectures design
Define the principles, guidelines, standards and solution patterns to ensure solution decisions are aligned with the enterprise's future-state architecture vision
Serves as a Subject Matter Expert in tools and technologies and also serves as a point of contact for troubleshooting issues
Qualifications:
To perform this job successfully, an individual must be able to perform the Duties and Responsibilities (Duties) above satisfactorily and meet the requirements below. The requirements listed below are representative of the minimum knowledge, skill, and/or ability required. Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions of the job. If you need such an accommodation, please email [email protected] (current employees should contact Human Resources).
Education and/or Experience:
Required:
Bachelors degree or equivalent combination of education and/or experience, with a preference for those with a degree
Minimum of 5 years of experience in an Information Security role with at least two years in an incident response, threat analysis, or a security operation center role.
Relevant knowledge and experience in two or more of the following areas: incident response, threat analysis, malware response , security operations, Network Security/next generation firewall, proxy configuration and management
Demonstrated experience in threat detection technologies including two or more of the following: network or host intrusion prevention/detection systems (IPS/IDS), Endpoint Protection, Security Incident Event Management (SIEM), data loss prevention (DLP)
Demonstrated ability to analyze security events, perform initial triage, and determine appropriate next steps
Demonstrated experience in security projects development, security vendor or services management, and request for proposal processes and procedures
Preferred:
Certified Information Systems Security Professional (CISSP) or equivalent is preferred
One or more of the following technical certifications is preferred: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensics Analyst (GCFA), or GIAC Reverse Engineering Malware (GREM), EC-Council Certified Security Analyst
Other Skills and Abilities:
The following will also be required of the successful candidate:
Strong organizational skills
Strong attention to detail
Good judgment
Strong interpersonal communication skills
Strong analytical and problem solving skills
Able to work harmoniously and effectively with others
Able to preserve confidentiality and exercise discretion
Able to work under pressure
Able to manage multiple projects with competing deadlines and priorities
Sidley Austin LLP is an Equal Opportunity Employer
#J-18808-Ljbffr