The Information Security Manager will oversee the Information Security and work with the Director of Information Security as well as the Desktop and Server teams to help protect the information assets of the Firm. They will oversee the assist with implementing and supporting information security policies, security operations, and audit/risk. The Information Security Manager is responsible for coordinating analyst deliverables and is expected to stay up to date with current and emerging trends to help reduce the Firm’s exposure to new and existing threats.
Active monitoring and rapid response to security events is critical to this role. Although not common, some of the security events may happen outside of normal work hours which will require after-hours response and support.
The Information Security Manager is responsible for keeping track of current IS projects and ensuring timely completion of deliverables. They will be responsible for tracking the progress of Infosec team members on identified projects and following up when necessary to ensure timely and accurate completion of projects that meet both firm and user expectations.
The IS Manager will establish and maintain SLA’s for team deliverables, and ensure that common tasks are formally documented. They will also assist the team in tracking progress and following up on team work.
Responsibilities:
Phishing
- Coordinate scheduled phishing campaigns for content, delivery, follow-up, and reporting.
- Communicate with helpdesk for phishing-related issues as well as respond to user inquiries.
- Actively take steps to reduce phishing risk.
Monitoring and Alerting
- Work with outside security vendors to monitor systems events and ensure coverage.
- Oversee first-level response incoming events for MDR vendor and Defender.
- Triage alerts and follow appropriate procedures to determine severity.
- Maintain and ensure the confidentiality of client and firm data.
- Monitor and respond to tickets for Information Security Group.
Vulnerability Management
- Coordinate the Firm’s vulnerability scanning software to identify, classify, prioritize, mitigate, and remediate software vulnerabilities.
- Work with infrastructure team and desktop engineering team to remediate biggest risks.
- Monitor and document progress towards security goals.
- Track overall progress on reducing vulnerability risk.
Operations
- Oversee security events from Microsoft Security Products.
- Actively work to improve security posture through vulnerability management, attack surface reduction, and environment hardening.
- Support compatibility with Mac laptops for normal firm tasks.
- Support project for remote browser capability.
- Work with third parties for annual penetration tests.
- Coordinate threat hunting and research trending CVE’s.
Audit
- Oversee evidence gathering for ISO audit.
- Manage policies and procedures to ensure accuracy and timely reviews.
- Supervise timely and accurate reviews of Outside Counsel Guidelines, Client Security Assessments, and responses to RFP’s/RFI’s.
Additional duties Include:
- Assist in preparation and tracking of client security assessments.
- Work with Director of Information Security on Security budget.
- Work with desktop and server teams for patch management.
- Interface with networking team as needed.
- Support evidence collection and preservation for ISO 27001 audit.
- Assist in annual testing of disaster recovery and business continuity plans.
- Special projects as assigned.
- Assume additional responsibilities as requested.
- This role requires 60% office presence; remote work is permissible 40% of the time.
Qualifications:
- Bachelor’s degree in Cybersecurity or Computer Science required.
- A minimum of 5 years’ Information Security experience and prior experience managing staff is required.
- Previous experience working in a law firm or professional services strongly preferred.
- Knowledge of threat hunting tactics and incident response.
- Working knowledge of TTP’s (Threats, Tactics, and Procedures) of Threat Actors.
- Demonstrable knowledge of vulnerability scanning tools (Tenable, Rapid7, or Qualys).
- Familiarity with popular cybersecurity tools for threat hunting and vulnerability scanning.
- Experience with outsourced MDR (SentinelOne, eSentire, Rapid7 IDR, Cybereason, etc.).
- Strong knowledge of Microsoft Defender suite of products CompTIA Security+, CEH, CISA, CRISC, CISM, or preferably CISSP.
- Possess excellent verbal and written communication skills with an ability to influence others.
- Ability to function in a fast-paced, service-oriented environment, prioritize multiple projects on a daily basis, and adjust to shifting priorities.
- Strong planning, project management and organizational skills.
- Strong sense of urgency.
- Facility for analyzing, working with and presenting data.
- Ability to collaborate and gain the respect, trust, and confidence of the Firm’s attorneys and professional staff.
- Possess a “hands-on” tactical approach.
- Creative and proactive approach to problem solving.
- Facilitate teamwork and identify opportunities to develop new processes/infrastructure.
- Demonstrated ability to grasp and implement new concepts quickly.
- Strong analytical abilities, resourcefulness, and attention to detail.
- Ability to work independently and as part of a team with a proactive and positive style that fosters collaborative working relationships.
- Demonstrated ability to motivate and develop teams.
- Proven leadership and management abilities.
- Demonstrated experience in employee relations, performance improvement and separations.
- Outstanding sense of customer service, with demonstrated ability to instill this in others.
- Deep personal commitment to integrity, excellent judgment, and the highest standards of ethics.
- Must display the highest level of diplomacy, tact and discretion, with comfort in handling and maintaining confidential information.
- Excellent computer skills, including proficiency in using Microsoft Word, Outlook, Excel and PowerPoint. Ability to quickly get up to speed and master new applications and software is critical.
#Indeed