and representing clients of all sizes and sectors in various investigation and litigation matters. The primary focus will be on cases involving cybersecurity, digital privacy, Internet speech... (including defamation, stalking, threats, and First Amendment issues), cybercrime, white collar crime, intelle...
Title: Associate - Federal Judicial Clerks Only (Multi Office) Job Responsibilities: The Associate position at the law firm entails a wide range of responsibilities that demand both legal expertise and the ability to manage various tasks efficiently. Key responsibilities include: - Effectively communicating,...
Title: Privacy + Cyber Associate Job Responsibilities: The Privacy + Cyber Associate will be responsible for managing significant litigation and case management tasks. Key responsibilities include: - Managing day-to-day case activities - Leading fact investigations - Researching legal issues and developing...
Title: Cyber and Data Privacy Attorney Job Responsibilities: The Cyber and Data Privacy Attorney will be responsible for providing comprehensive legal services within the law firm's national and international cyber and data privacy practice. The attorney will be engaged in the following...
Title: Trademark Litigation Associate Job Responsibilities: The Trademark Litigation Associate will be responsible for handling litigation in various courts, including the Court of Chancery, Superior Court, and the District of Delaware. The role also requires experience litigating in federal court. The candidate...
Firm Seeks Experienced Government Contracts Associate Job Title: Government Contracts Associate Salary: Competitive based on experience Experience: At least 4-5 years in a law firm setting Location: Flexible across our offices in Boston, East Brunswick, Hartford, Indianapolis, Miami, New...
is tasked with overseeing cybersecurity, forensics, incident response, and... physical security operations. Key responsibilities include: - Implementing comprehensive strategies for network monitoring and intrusion detection using defense tools such as firewalls and intrusion detection/prevention systems. - Performing log-based and endpoint-based threat de...