Latest Job Opportunities in India
Discover top job listings and career opportunities across India. Stay updated with the latest openings in IT, government, and more.
Check Out Jobs!Read More
Remote Security Engineer – Infrastructure
US Job Description Company Information Reed Smith is a dynamic international law firm dedicated to helping clients move their businesses forward. Through an inclusive culture and innovative mindset, we deliver smarter, more creative legal services that lead to better outcomes for our clients. Our deep industry knowledge, long-standing relationships and collaborative structure make us the partner of choice in complex disputes, transactions and regulatory matters. Across more than 30 offices in the US, Europe, the Middle East and Asia, our team of 3,000 people (including more than 1,600 lawyers) works as one global partnership to drive progress for our clients, ourselves and our communities. Position Summary Under the supervision of the Security Manager, the Security Engineer – Infrastructure is responsible for supporting the security and compliance of a company’s infrastructure, including networks, servers, workstations, and communications systems. This role works closely with IT teams to ensure all infrastructure components meet company, industry, and ISO 27001 security standards. The Security Engineer reviews and secures infrastructure, develops risk mitigation strategies, and contributes to enterprise-wide security projects and initiatives. Responsibilities include serving as a key resource for consultation on security matters, maintaining access controls, and addressing escalations related to security audits, incident response, and internal security concerns. The Security Engineer is also involved in the design, implementation, and support of LAN/WAN, remote access, IDS/IPS, PKI, and firewall/unified threat management systems, as well as identity and access management, endpoint security management, domain management, and DNS management. The Security Engineer is also a contributing member of the Cybersecurity Incident Response Team (CIRT). Job Duties and Responsibilities Manage and maintain an organization’s public key infrastructure (PKI) systems, ensuring secure encryption, certificate management, and cryptographic key lifecycle processes are in place and operating effectively. Implement and oversee encryption solutions to protect data in storage, in transit and used across both on-premises and cloud environments, ensuring compliance with company and industry security standards. Secure cloud environments (including AWS, Azure, and GCP) by ensuring adherence to internal security policies and industry best practices, and helping implement and manage identity management, access control, and data protection within cloud services. Collaborate with external vendors to securely integrate external systems into the company’s infrastructure, ensuring secure connectivity, interoperability, and compliance with security requirements. Deploy, manage, and maintain firewalls, including Firewall as a Service (FWaaS), Unified Threat Management (UTM) solutions, and Secure Web Gateways (SWG), to secure network traffic and enforce consistent security policies. Implement and manage advanced security technologies such as Cloud Access Security Brokers (CASB), Zero Trust Network Access (ZTNA) and other solutions to enhance the company’s security posture. Serve as the primary escalation point for security incidents and audits, and lead or assist in the development of mitigation strategies, post-incident reviews, and compliance reviews to ensure ongoing compliance with the ISO 27001 standard. Act as an internal consultant to IT teams and departments, providing specialized expertise in infrastructure security, cloud environments, and endpoint protection. Lead reviews of infrastructure security components, recommend improvements, and develop risk mitigation strategies aligned with the company’s security posture and industry requirements. Continuously monitor internal control systems to ensure appropriate access levels and security configurations are maintained across all infrastructure components. Analyze daily security events and alerts in the context of company policies, prioritize and escalate issues as appropriate to support effective and timely incident response. Evaluate security policies and procedures to identify opportunities for improvement and ensure alignment with company standards, industry requirements, and regulatory expectations. Provide technical support and administration for LAN/WAN, remote access, IDS/IPS, and unified threat management systems, including troubleshooting, analysis, testing, and deployment of new hardware and security applications. Deploy and manage anti-virus policies and endpoint detection and response agents in collaboration with system owners to ensure effective endpoint security management. Manage the availability and security of the company’s public domains and DNS records, and coordinate with relevant stakeholders as required. Perform all other duties as assigned. The job duties and responsibilities listed are not exhaustive and may be supplemented as necessary. Reed Smith reserves the right to review or modify job duties and responsibilities at any time. Education Requirements: Bachelor’s degree in computer science, business, engineering, or related field; Or equivalent work experience is required. CISSP certification or progress towards CISSP certification is preferred. Experience: At least five years of experience in the field of information systems, including at least one year of experience managing systems projects. Proven background in applying advanced IT security concepts and comprehensive understanding of contemporary hardware and software architectures in a multi-site, mission-critical environment. Experience developing and implementing security policies and procedures, security awareness programs, and participating in IT audits is preferred. Hands-on experience in operating system security, cryptographic techniques, forensic analysis, penetration testing, and vulnerability/risk assessment. Previous experience in the legal profession or professional services environment is preferred but not required. Skills: Ability to design and implement secure infrastructure solutions compatible with enterprise architecture and industry security standards. Proficient in configuring and securing cloud environments (e.g. AWS, Azure, GCP), including identity management, access controls, and encryption. Strong project coordination skills, with the ability to support and organize information security audits and related initiatives. Proficient in collecting, analyzing and interpreting complex security-related data to assess risk and system performance. Proficiency in applying and enforcing security policies, standards and procedures across technical environments. Ability to interpret and operate security regulations, compliance requirements and internal control frameworks. Skilled in identifying infrastructure risks and recommending and supporting mitigation strategies. Proven ability to evaluate third-party systems and tools and securely integrate them into existing infrastructure, ensuring compliance with established security standards and practices. Skilled in negotiating issues and solving problems effectively within complex technical environments. Other Supervisory Responsibilities: None Equipment Used: Information Security Management software and hardware; Personal computer and other office equipment such as telephone, calculator, copier, scanner, etc. ESSENTIAL JOB FUNCTIONS: Ability to sit and/or stand for extended periods, as the role involves extensive computer use and meetings. Intense use of eye, finger, hand, and wrist dexterity associated with prolonged computer use, including typing and using a mouse. Efficiently use computers, communications devices, and other digital collaboration tools. Accurately read and interpret written documents, computer screens, and other visual displays to perform operational and administrative tasks. You must have sufficient visual acuity to perform these responsibilities effectively. Ability to hear and understand verbal communication, including conversations, instructions, phone calls, and video, to facilitate effective collaboration and coordination with team members and stakeholders. Communicate effectively, both verbally and in writing, with internal teams and stakeholders to exchange technical information, coordinate activities, and ensure mutual understanding in support of security infrastructure and operations. Exercise independent judgment and discretion in decision-making, maintaining flexibility and cognitive flexibility while adapting to changing priorities, ambiguity and dynamic work situations. Ability to evaluate complex situations and determine appropriate actions. Ability to maintain focus, apply critical thinking, and make sound decisions in a fast-paced, dynamic work environment. High attention to detail and ability to manage multiple priorities effectively. Ability to regulate emotions and manage stress effectively to maintain focus, decision-making, and composure in high-pressure or fast-paced work environments. Ability to work independently and manage tasks and deadlines in a remote or hybrid work environment without direct supervision. Ability to interact professionally with colleagues and stakeholders, and maintain constructive and collaborative working relationships. Ability to handle sensitive or confidential security-related information with discretion, ensuring compliance with company policies and regulatory requirements. Ability to collaborate across geographically distributed teams and adapt to different communication styles, time zones and work hours. Working Conditions: The position is remote. However, the individual must reside within one or two hours of commuting distance from the Pittsburgh office. This is to accommodate potential emergencies, special circumstances or occasional work requests in the office. Click apply for full job details
https://weworkremotely.com/remote-jobs/reed-smith-llp-security-engineer-infrastructure-remote



