As part of an international legal support team, including legal operations and program managers, this role is designed for a program manager who thrives on execution and process design. The role will support Sophos’s Legal Department by managing and guiding key processes across the Corporate and Employment legal functions, and other legal groups as time permits.
What You Will Do
- Provide program and administrative support to the Corporate legal team, including support for board meetings, drafting minutes and consents, drafting and interpreting policies, and educating officers and directors. Maintain litigation, legal hold, and e-discovery and subpoena response.
- Provide program and administrative support to the Employment legal team, including research and communication with selected outside counsel, creating and administering investigation programs, creating and administering training programs, drafting and interpreting policies, and providing pre-litigation and litigation support for queries and claims, and other activities supporting the employment lifecycle.
- Provide program and administrative support to the Procurement/Facilities teams, including project management, program management, administration of automation tools, and utilization of AI to achieve efficient and accurate work product.
- Assist in the implementation, administration, and ongoing maintenance of processes and automated systems.
- Create content and maintain knowledge management materials related to all processes and instructions for the supported legal functions, including developing training materials, FAQs, playbooks, checklists, and templates.
- Collaborate with the internal teams, as well as external counsel on cross-functional projects in conjunction with the Chief Legal Officer and their direct reports.
- Build partnerships with internal clients and provide training to promote awareness and engagement on relevant legal issues, policies, tools, and processes.
- Collaborate with attorneys on various legal projects and initiatives.
What You Will Bring
- 10+ years relevant experience, preferably in a technology company.
- Proven ability to handle multiple projects, prioritize and meet deadlines.
- Strong organizational, analytical, and problem-solving skills.
- Ability to establish effective working relationships with legal and cross-functional business teams.
- Ability to take initiative and exercise discretion and independent judgment.
- Collaborative spirit, positive attitude, and high level of integrity.
- Strong process orientation.
- Excellent oral and written communication and presentation skills.
- Experience in the cybersecurity industry is a plus.
Skills Required
- 10+ years relevant experience, preferably in a technology company
- Strong organizational, analytical, and problem-solving skills
- Excellent oral and written communication and presentation skills
- Strong process orientation
Sophos Compensation & Benefits Highlights
The following summarizes recurring compensation and benefits themes identified from responses generated by popular LLMs to common candidate questions about Sophos and has not been reviewed or approved by Sophos.
-
Leave & Time Off Breadth — Time away is positioned as broad, with company-wide wellness days plus dedicated learning days and paid volunteer time.
-
Parental & Family Support — Family-related leave appears more comprehensive than baseline offerings, including paid parental leave, caregiver leave, and extended bereavement leave.
-
Wellbeing & Lifestyle Benefits — Wellbeing support is emphasized through always-available assistance resources and a Calm subscription, suggesting a lifestyle-oriented benefits approach.
Sophos Insights
What We Do
Cybersecurity Evolved. As a worldwide leader in next-generation cybersecurity, Sophos protects nearly 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats. Powered by SophosLabs – a global threat intelligence and data science team – Sophos’ cloud-native and AI-enhanced solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cybercriminal tactics and techniques, including automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.
.png)






