Lead Security Engineer
Atlanta, Fulton County, Georgia, 30383, USA
Listed on 2026-02-14
-
IT/Tech
Cybersecurity, Systems Engineer, Network Security, Information Security
Overview
Why Seyfarth At Seyfarth, we understand that great people are the key to our success, and we provide the opportunities to match. If you join us, you’ll work with state-of-the-art technology in a friendly and professional environment, and we will continue to invest in your professional development. If you want the freedom to grow at a firm that is invested in your future, keep reading.
The Lead Network Security Engineer serves as a technical leader and subject‑matter expert responsible for the architecture, implementation, and governance of the firm’s security infrastructure across on‑premises and cloud environments. The role requires security expertise across multiple technologies, strong architectural thinking, and the ability to lead initiatives. This position has no direct reports, but provides guidance to other team members. The Lead has more expertise and experience, authority to supervise/lead complex security projects.
TheDay-To-Day Network Security Engineering
- Serve as the primary engineer and technical authority for Palo Alto firewalls, Panorama, Global Protect, Cisco Umbrella and Azure‑based firewalls.
- Define security standards, policies, and patterns for firewall management, VPN connectivity, and cloud‑integrated network security.
- Lead major upgrades, migrations, and platform improvements across the security infrastructure stack.
- Evaluate emerging technologies and recommend strategic adoption paths.
- Provide cross team support and security recommendation for various platforms in the environment such as Gigamon, Security Onion, Run Zero, Firemon and other Linux based platforms.
- Understanding of networking technology fundamentals of IPv4, Various TCP/UDP protocols and applications (DNS, DHCP, IPSec, VPN etc).
- Understanding of Identity and Access Management technologies such as Active Directory, Azure Entra, Privileged Access Management and MFA tooling.
- Act as the highest‑level escalation point for complex security, networking, and systems issues.
- Collaborate closely with other Information Technology and Information Security teams to ensure aligned and secure designs.
- Lead security fault‑finding efforts using advanced diagnostic and penetration‑testing‑derived techniques.
- Assist with the coordination and facilitation of red‑team and penetration‑test engagements, ensuring technical readiness and remediation alignment.
- Experience supporting digital forensics, Security Operations Center, and incident analysis workflows.
- Monitor and respond to cybersecurity threats, including ransomware, phishing, and insider threats targeting legal data.
- Ability to mentor an guide engineers, elevating team expertise across security domains.
- Strong communication skills to interface with leadership, vendors, and technical stakeholders.
- Demonstrated success managing complex projects involving multiple teams and vendors.
- Proven ability to translate technical risk into meaningful business impact.
- Assist with educating attorneys and staff on cybersecurity best practices, including secure communication, data handling, and remote work products.
- Detail-oriented, thorough and analytical, with capability to apply logic to solve problems.
- Initiative to actively seek new knowledge and improve skills.
- Develop and maintain a comprehensive security architecture that maps to the firm’s legal operations, data flows, and risk profile.
- Assist with conducting regular risk assessments and threat modeling for legal systems, client data repositories, and third-party integrations.
- Assist with maintaining an inventory of critical assets, including case management systems, document repositories, and privileged communication channels.
- Collaborate with legal, compliance, and IT teams to define security requirements based on regulatory obligations (e.g., ABA, GDPR, HIPAA).
- Design and maintain a secure enterprise architecture and layered security controls that protects client confidentiality, privileged communications, and sensitive legal data. This applies across endpoints, networks, cloud services, and mobile platforms.
- Develop and enforce security policies and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).