Skip to content
mimi

Information Security Engineer IV

Dechert LLP

Philadelphia · On-site Full-time Lead $140k – $175k/yr Today

About the role

About

The Information Security Engineer IV is a key member of the cyber security team that is responsible for designing and implementing security solutions that protect the Firm from internal and external threats, while also enabling the business to execute and innovate. This role is responsible for managing the controls that protect the organization's computer networks, systems, and data from cyberattacks, working closely with IT teams to identify, assess, and mitigate security risks, and supporting incident response to contain the damage from security incidents and prevent future attacks.

The Information Security Engineer IV provides guidance for addressing current security issues and possesses effective communication and organizational skills, with the ability to guide less experienced coworkers. In this role, the engineer anticipates client needs, proactively identifies ways to improve client satisfaction, and takes a broad perspective to solve complex problems by identifying and implementing innovative solutions.

The Information Security Engineer IV is accountable for planning and executing security projects to improve the Firm's overall security posture, for creating and maintaining security-related documentation, and for other various security-related tasks. The position is responsible for the protection of all Information Assets, including physical and digital data, technology infrastructure, cloud and on-premise applications, user endpoints, and other Technology Resources. The ideal candidate is passionate about security, is intellectually curious, and thrives on learning and teaching alike.

ESSENTIAL JOB FUNCTIONS:

  • Research, design, and implement cybersecurity solutions for the organization's systems and products in compliance with the organization's applicable security policies and standards.
  • Research, validate, and deploy solutions meeting security and business needs.
  • Work with IT and internal and external business partners to ensure that security is factored into the evaluation, selection, installation, and configuration process of hardware and software.
  • Analyze and make recommendations to improve network, system, and application architectures.
  • Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
  • Remain current with new security threats and assess systems to ensure they can defend the business.
  • Evaluate and implement new security technologies to address emerging threats.
  • Build and administer core network and systems security controls, including: Next Gen firewalls, ZTNA - Zero Trust Network Architecture, intrusion detection and prevention, anti-malware, application whitelisting, host intrusion prevention, endpoint detection and response (EDR), vulnerability scanners, content monitoring/filtering, and security monitoring (SIEM).
  • Plan and execute Information Security projects.
  • Represent the security team on projects owned by other IT teams.
  • Perform security and privacy reviews of IT services and changes (e.g., new technologies being added to the environment or that are undergoing significant changes).
  • Monitor change management database activity to stay abreast of developments in the IT environment.
  • Conduct regular security assessments to identify vulnerabilities and potential risks.
  • Collaborate actively with senior technologists on other IT teams to design solutions that satisfy the priorities of each individual IT team involved, while also providing the best possible user experience and appropriate security assurance.
  • Establish architectures and baseline configurations for various security technologies, including: anti-malware, endpoint detection and response (EDR), security monitoring, systems security, network security, identity and access management, public-key infrastructure (PKI), deception technologies, DLP, and web/email content filtering.
  • Design and maintain strategies for Information Security documentation, including runbooks, procedures, processes, and hardware and software inventory detail.
  • Implement and operate technical security solutions across a wide range of technologies and serve as a third-tier support resource and SME for these technologies as required.
  • Serve as a member of the Computer Security Incident Response Team (CSIRT), assisting with incident response (IR) with the IR and security operations center (SOC) efforts.
  • Assist in the review and update of cybersecurity policies, architectures, and standards.
  • Assist with threat and vulnerability management activities, including triage of new vulnerabilities, root cause analysis, threat modeling, and mitigation planning.
  • Apply cybersecurity tools and techniques to automate security tasks, streamline incident response, and enhance overall security posture.
  • Automate workflows for security processes and procedures.
  • Identify and drive improvements to Information Security programs.
  • Assist with Information Security program management, including defining and documenting corporate security policies and procedures, security metrics, and coordinating the security awareness program.
  • Provide technical guidance, training, and direction to less experienced staff.
  • May require on-call as assigned.
  • Other duties as assigned.

QUALIFICATIONS / KSAs

  • Bachelor's degree in Computer Science, Information Systems, Computer Engineering, or related discipline, or equivalent experience and technical background.
  • A minimum of 2+ years of experience in cybersecurity; previous experience in a security engineering role highly desired.
  • CISSP, GSEC, CISA, or similar certification desired.
  • Technical expertise in one or more of the following: VPN, firewall, network monitoring, intrusion detection, web server security and wireless security, cloud, and the Internet of Things (IoT).
  • Practical experience with implementing security controls such as database security, web content filtering, anomaly detection and response, and vulnerability scanning.
  • Strong technical knowledge and understanding of security concepts, for example: network/perimeter security, security event monitoring, vulnerability assessment, intrusion detection and response, encryption technologies, enterprise authentication (e.g., SAML/SSO, Active Directory, etc.), EDR, PAM, and content monitoring/filtering.
  • Working knowledge of network and security protocols including TCP/IP, SMTP, FTP, SSH, TLS, SSL, HTTP, IPSec, and other VPN protocols.
  • ZTNA experience.
  • Proficiency with at least one scripting language (e.g., Perl, Python, and PowerShell).
  • Experience with relevant security standards and regulations such as PCI DSS and HIPAA, with the ability to assess compliance requirements and implement necessary controls to ensure adherence to these standards.
  • Applies expertise, knowledge, and skills to the business in order to address complex problems and less typical situations.
  • Interprets internal/external business issues and recommends best practices in own discipline; manages costs for specific projects.
  • Strong written and verbal communication skills.
  • Ability to speak and explain complex security issues to audiences without similar backgrounds.
  • Ability to effectively communicate business risk as it relates to information security.
  • Explains difficult concepts with confidence in the subject matter.
  • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one.
  • Strong problem-solving and troubleshooting skills.
  • Excellent time management and organizational skills to effectively meet multiple objectives.
  • Manages own time to meet objectives; forecasts and plans resource requirements.
  • Results oriented, self-motivated, and capable of performing several tasks simultaneously.
  • Motivates and persuades team members to adopt a point of view by being a team leader.
  • The desire, commitment, and ability to be a team player.
  • Professional attitude and presentation.

Additional Job Description

At the time of this posting, the salary range for this position in New York, Boston, and Washington, DC is $140,000 - $175,000 annually. Actual compensation is commensurate with job related knowledge, skills, experience, and location of the position.

Location(s)

Philadelphia Boston, Chicago, Dallas, New York, Washington DC

Time Type

Full time

Skills

Active DirectoryDLPEDRHTTPIPSecIoTITNetwork SecurityPci DSSPerlPowerShellPythonSAMLSecurity Information and Event Management (SIEM)SSOTCP/IPTLSVulnerability ScanningVPNWeb SecurityZero Trust Network Architecture (ZTNA)

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free