×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Analyst II

Job in Austin, Travis County, Texas, 78716, USA
Listing for: Kirkland & Ellis
Full Time position
Listed on 2026-03-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

About Kirkland & Ellis

At Kirkland & Ellis, we don’t just meet the standard for legal excellence — we set it. Our culture is built on teamwork, ingenuity and an unwavering commitment to continuous growth. We tackle the most sophisticated legal challenges with bold ideas and innovative solutions, powered by the exceptional experience and ambition of our 7,000+ people, including 4,000+ attorneys, across 22 offices worldwide.

Our dedicated professionals share our lawyers’ commitment to excellence and show up each day to do meaningful work that helps drive global business, investment and innovation forward.

What You’ll Do

Are you driven to detect, analyze, and stop emerging cyber threats before they impact the business? As a Cybersecurity Analyst II, you will play a critical role in safeguarding the Firm’s technology environment by monitoring, triaging, and responding to security incidents across enterprise systems.

In this position, you’ll analyze threat intelligence, conduct proactive threat hunting, and collaborate closely with internal technology and security teams to strengthen detection capabilities across our security platforms—including Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) tools. You’ll serve as a trusted resource during incident response efforts while helping continuously enhance our Information Security Program.

  • Incident Monitoring & Response – Monitor, triage, and respond to security alerts and incidents across enterprise systems, ensuring timely containment, investigation, and resolution.
  • Threat Intelligence & Hunting – Leverage threat intelligence feeds to stay ahead of emerging risks and conduct proactive threat hunting to identify potential vulnerabilities.
  • Detection Engineering – Develop, implement, and refine detection rules within SIEM and EDR platforms to strengthen monitoring capabilities and reduce risk exposure.
  • Security Tool Management – Configure, maintain, and optimize security technologies to ensure effective performance and coverage.
  • Cross-Functional Collaboration – Partner with IT and infrastructure teams to promote secure system configurations and support remediation efforts.
  • Subject Matter Expertise – Act as a subject matter expert during security incident responses, providing guidance and technical insight.
  • Process & Documentation Excellence – Document and maintain incident response and monitoring processes to ensure consistency, compliance, and continuous improvement.
  • Program Advancement – Contribute to strengthening the organization’s Information Security Program by identifying opportunities to enhance protection, efficiency, and awareness.
  • Knowledge Sharing & Continuous Improvement – Collaborate with fellow analysts and engineers to share insights, improve workflows, and develop efficient, scalable solutions.
What You’ll Bring
  • Education – Bachelor’s degree preferred, ideally in Cybersecurity, Information Technology, or a related field (or equivalent experience).
  • Experience – At least six years of experience in an information technology-related field or a minimum of three years of direct cybersecurity experience.
  • Endpoint & Operating System Expertise – Strong knowledge of endpoint security technologies and Windows operating systems.
  • Cloud Security Knowledge – Experience securing cloud environments, particularly within Microsoft Azure.
  • Security Platform Experience – Hands‑on experience with Endpoint Detection and Response (EDR) solutions such as Crowd Strike, Microsoft Defender for Endpoint (MDE), or Sentinel One.
  • SIEM & Log Analysis – Experience working with Security Information and Event Management (SIEM) platforms such as Microsoft Sentinel, Log Rhythm, Google Security Operations (Sec Ops), Splunk, or Exabeam, including event analysis, log management, alert generation, investigations, and reporting.
  • Advanced Security Technologies – Experience with Security Orchestration, Automation, and Response (SOAR) platforms, as well as intrusion detection/prevention systems, firewalls, content filtering technologies, vulnerability management solutions, web proxies, Data Loss Prevention (DLP), and Cloud Access Security Brokers (CASB).
  • Micr…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary