Aderant North America, Inc

Senior Security Engineer

Job Post Information* : Posted Date 19 hours ago(8/28/2025 2:50 PM)
Requisition ID
2025-3012
# of Openings
1

Overview

Aderant is seeking a Senior Security Engineer.

 

Aderant is a global industry leading software company providing comprehensive business management solutions for law firms and other professional services organizations with a mission to help them run a better business. We are motivated by a collective desire to drive the legal industry to the forefront of innovation. With over 2,500 clients around the world, including 95 of the top AmLaw 100 firms, we are changing the outside perception of the legal sphere; where there was once resistance to modernization, we are creating a culture that embraces new ideas and technology.

 

At Aderant, the “A” is more than just a letter. It is a representation of how we fulfill our foundational purpose, serving our clients. It embodies our core values and reminds us that to achieve success, every day must start with the “A”. We bring the “A” to life by fostering a culture of innovation, collaboration, and personal growth. We encourage our diverse teams to bring their whole selves to work – ideas, experience, and passion – to drive our mission forward. Our people are our strength.

Role Description

We are seeking a highly skilled and experienced Senior Security Engineer to join our Information Security team. This individual will play a critical role in protecting our infrastructure, applications, and data by designing, implementing, and managing security controls across on-premises, cloud, and hybrid environments. The ideal candidate will have strong hands-on expertise with endpoint protection, vulnerability management, firewalls, network security, cloud platforms (AWS & Azure), and Identity and Access Management (IAM). 

Qualifications

Education & Experience 

  • Bachelor’s degree in Computer Science, Cybersecurity, or related field (or equivalent experience). 

  • 5–8+ years of experience in cybersecurity or IT security engineering roles. 

  • Proven hands-on expertise with CrowdStrike, Rapid7, firewalls, and IAM solutions. 

Technical Skills 

  • Strong knowledge of network protocols, firewalls, IDS/IPS, and VPN technologies. 

  • In-depth experience with AWS and Azure security services (e.g., Guard Duty, Security Hub, Azure Security Center). 

  • Familiarity with scripting and automation (Python, PowerShell, or Bash). 

  • Solid understanding of SIEM platforms, incident response workflows, and log analysis. 

Soft Skills 

  • Strong problem-solving and analytical skills. 

  • Excellent communication skills with the ability to collaborate across technical and non-technical teams. 

  • Ability to manage multiple priorities and deliver under pressure. 

  • Possess a get it done attitude 

 

Responsibilities

Security Operations & Monitoring 

  • Manage, monitor, and fine-tune CrowdStrike EDR solutions to detect, investigate, and respond to threats. 

  • Oversee vulnerability management lifecycle using Rapid7, including scanning, prioritization, remediation, and reporting. 

  • Analyze security incidents and work closely with the team to triage and resolve them. 

Network & Perimeter Security 

  • Manage enterprise firewalls, VPNs, and intrusion detection/prevention systems. 

  • Conduct regular audits of network security controls and enforce segmentation and zero-trust principles. 

  • Collaborate with IT, cloud, and infrastructure teams to secure endpoints, servers, and applications. 

Cloud Security 

  • Implement and maintain security best practices for AWS and Azure, including monitoring, logging, encryption, and key management. 

  • Ensure compliance with cloud security frameworks and develop guardrails for secure deployments. 

  • Automate security checks and configurations using cloud-native and third-party tools. 

Identity & Access Management 

  • Administer and enhance IAM solutions, including role-based access control (RBAC), single sign-on (SSO), and multifactor authentication (MFA). 

  • Regularly review user access privileges, conduct audits, and enforce least-privilege principles. 

  • Partner with HR and IT to ensure timely onboarding and offboarding processes. 

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed