View all jobs

Information Security Engineer

Chicago, IL
SourcePro Search has a fantastic, direct hire opportunity for an experienced Information Security Engineer with our large and top ranked global law firm client. 
This role offers a high base and bonus as well as excellent benefits and professional growth potential. 
The successful candidate will have a degree in Information Security or a related field and at least 3 years of experience in a professional services environment.

Design, implement, administer, troubleshoot, and support security infrastructure on the network, including the following:
  • Multicontext firewalls and clustering
  • Intrusion detection and prevention
  • Vulnerability management
  • Centralized log management
  • Data Loss Prevention
  • Content Filtering
  • VMWare and Microsoft Windows systems
  • Non-Windows authentication controls, i.e., cloud-based identity management, Cisco, and Palo Alto Networks
Demonstrate awareness of security best practices across common technologies, advocating for additional controls as necessary to ensure optimal security.
Examples of technologies to be addressed include the following:
  • Active Directory
  • Group Policy
  • Windows desktop systems and “locked down” desktop management
  • VMWare and Microsoft Windows Server systems
  • Non-Windows authentication controls, i.e., cloud-based identity management, Cisco, and Palo Alto Networks
  • Two-factor authentication
  • Network access control
Participate in all efforts to develop security policies and meet client or other compliance requirements:
  • Lead efforts to document security standards and procedures, demonstrating best practices to auditors or reviewers.
  • Review business processes, recommend and implement supportable security changes, including any relevant tools to better secure those processes.
  • Evaluate, implement, and enforce security practices around mobile and remote solutions, including Citrix, VPN, and MDM.
  • Maintain and coordinate incident response planning, assisting in execution of the incident response plan as needed.
  • Investigate actual and suspected security breaches.
  • Ensure consistent policies are applied to any hosted or cloud-based services being utilized by the firm.
  • Conduct log review and reporting on security devices and identified Windows systems.
  • Generate evidence for compliance/audit.

Work with vendors as necessary to supplement our security capabilities and recommend their use when appropriate.

Share This Job

Powered by