Title: Privacy + Cyber Associate Job Responsibilities: - Manage day-to-day case activities, ensuring efficient and effective case progression. - Lead fact investigations to gather and analyze relevant information for cases. - Research legal issues and develop comprehensive litigation strategies. -...
to organizations investigating and responding to data privacy and cybersecurity incidents. The key responsibilities... include: - Overseeing and advising Associates as they collect information needed to understand the issue and scope of each situation. - Engaging and directing experts needed to appropriate...
Cybersecurity and Data Privacy Attorney... to data privacy and cybersecurity incidents. Collect information needed... to understand the issue and scope of each event, engage and direct experts needed to appropriately investigate and respond to the incident, and communicate to regulatory...
Cybersecurity and Data Privacy Attorney... to data privacy and cybersecurity incidents. Collect information needed... to understand the issue and scope of each event, engage and direct experts needed to appropriately investigate and respond to the incident, and communicate to regulatory...
with data privacy and cybersecurity incidents. Key responsibilities include: -... to data privacy and cybersecurity incidents. - Collecting information to... understand the issue and scope of each situation. - Engaging and directing experts to appropriately invest...
Administrative Assistant (Cybersecurity & Data Privacy) The... candidate will maintain complex calendars and coordinate travel arrangements. Directly communicate with internal and external customers via e-mail, phone and in-person. Intake new cases, open and close files according to strict guidelines. Draft...
counsel to individuals and organizations involved in class actions, regulatory investigations, and complex data privacy and cybersecurity matters. The key responsibilities... include: - Managing class actions and complex data matters with guidance from a supervising Partner. - Handling privacy-based tort, contract, an...
Law Clerk - Incident Response at Law Firm Law Firm is a highly successful, fast growing niche law firm focused exclusively on counseling organizations in the context of data privacy, including incident response, regulatory investigation, single-plaintiff and class action litigation...
and representing clients of all sizes and sectors in various investigation and litigation matters. The primary focus will be on cases involving cybersecurity, digital privacy, Internet speech... (including defamation, stalking, threats, and First Amendment issues), cybercrime, white collar crime, intelle...
Title: Cyber and Data Privacy Attorney Job Responsibilities: The Cyber and Data Privacy Attorney at the law firm will be part of the national and international cyber and data privacy practice. This role involves working with a fast-growing and energetic team that...
Title: Associate - Federal Judicial Clerks Only (Multi Office) Job Responsibilities: The Associate position at the law firm entails a wide range of responsibilities that demand both legal expertise and the ability to manage various tasks efficiently. Key responsibilities include: - Effectively communicating,...
Title: Privacy + Cyber Associate Job Responsibilities: The Privacy + Cyber Associate will be responsible for managing significant litigation and case management tasks. Key responsibilities include: - Managing day-to-day case activities - Leading fact investigations - Researching legal issues and developing...
Firm Seeks Experienced Government Contracts Associate Job Title: Government Contracts Associate Salary: Competitive based on experience Experience: At least 4-5 years in a law firm setting Location: Flexible across our offices in Boston, East Brunswick, Hartford, Indianapolis, Miami, New...
is tasked with overseeing cybersecurity, forensics, incident response, and... physical security operations. Key responsibilities include: - Implementing comprehensive strategies for network monitoring and intrusion detection using defense tools such as firewalls and intrusion detection/prevention systems. - Performing log-based and endpoint-based threat de...