Cybersecurity Analyst II

Kirkland and Ellis
Austin, United States of America
27 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate

Job location

Austin, United States of America

Tech stack

Microsoft Word
Microsoft Excel
Microsoft Windows
Azure
Microsoft Outlook
Cloud Computing
Cloud Computing Security
CompTIA Security+
Computer Security
System Configuration
Information Leak Prevention
Information Security Management
Intrusion Detection and Prevention
Information Systems Security Architecture Professional
Log Analysis
Microsoft Security Essentials
Security Information and Event Management
Software Vulnerability Management
Cloud Platform System
Firewalls (Computer Science)
Azure Security Center
Web Filtering
Information Technology
Microsoft Sentinel
Splunk
Security Orchestration, Automation & Response

Job description

Are you driven to detect, analyze, and stop emerging cyber threats before they impact the business? As a Cybersecurity Analyst II, you will play a critical role in safeguarding the Firm's technology environment by monitoring, triaging, and responding to security incidents across enterprise systems. In this position, you'll analyze threat intelligence, conduct proactive threat hunting, and collaborate closely with internal technology and security teams to strengthen detection capabilities across our security platforms-including Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) tools. You'll serve as a trusted resource during incident response efforts while helping continuously enhance our Information Security Program.

  • Incident Monitoring & Response - Monitor, triage, and respond to security alerts and incidents across enterprise systems, ensuring timely containment, investigation, and resolution.
  • Threat Intelligence & Hunting - Leverage threat intelligence feeds to stay ahead of emerging risks and conduct proactive threat hunting to identify potential vulnerabilities.
  • Detection Engineering - Develop, implement, and refine detection rules within SIEM and EDR platforms to strengthen monitoring capabilities and reduce risk exposure.
  • Security Tool Management - Configure, maintain, and optimize security technologies to ensure effective performance and coverage.
  • Cross-Functional Collaboration - Partner with IT and infrastructure teams to promote secure system configurations and support remediation efforts.
  • Subject Matter Expertise - Act as a subject matter expert during security incident responses, providing guidance and technical insight.
  • Process & Documentation Excellence - Document and maintain incident response and monitoring processes to ensure consistency, compliance, and continuous improvement.
  • Program Advancement - Contribute to strengthening the organization's Information Security Program by identifying opportunities to enhance protection, efficiency, and awareness.
  • Knowledge Sharing & Continuous Improvement - Collaborate with fellow analysts and engineers to share insights, improve workflows, and develop efficient, scalable solutions.

Requirements

  • Education - Bachelor's degree preferred, ideally in Cybersecurity, Information Technology, or a related field (or equivalent experience).
  • Experience - At least six years of experience in an information technology-related field or a minimum of three years of direct cybersecurity experience.
  • Endpoint & Operating System Expertise - Strong knowledge of endpoint security technologies and Windows operating systems.
  • Cloud Security Knowledge - Experience securing cloud environments, particularly within Microsoft Azure.
  • Security Platform Experience - Hands-on experience with Endpoint Detection and Response (EDR) solutions such as CrowdStrike, Microsoft Defender for Endpoint (MDE), or SentinelOne.
  • SIEM & Log Analysis - Experience working with Security Information and Event Management (SIEM) platforms such as Microsoft Sentinel, LogRhythm, Google Security Operations (SecOps), Splunk, or Exabeam, including event analysis, log management, alert generation, investigations, and reporting.
  • Advanced Security Technologies - Experience with Security Orchestration, Automation, and Response (SOAR) platforms, as well as intrusion detection/prevention systems, firewalls, content filtering technologies, vulnerability management solutions, web proxies, Data Loss Prevention (DLP), and Cloud Access Security Brokers (CASB).
  • Microsoft Proficiency - Proficiency in Microsoft Outlook, Word, and Excel.
  • Certifications - Relevant certifications such as CompTIA Security+, Global Information Assurance Certification (GIAC) Information Security Fundamentals or Security Essentials, or Certified Information Systems Security Professional (CISSP) preferred.

About the company

At Kirkland & Ellis, we don't just meet the standard for legal excellence - we set it. Our culture is built on teamwork, ingenuity and an unwavering commitment to continuous growth. We tackle the most sophisticated legal challenges with bold ideas and innovative solutions, powered by the exceptional experience and ambition of our 7,000+ people, including 4,000+ attorneys, across 23 offices worldwide. Our dedicated professionals share our lawyers' commitment to excellence and show up each day to do meaningful work that helps drive global business, investment and innovation forward.

Apply for this position