Listing Description
Job Description
Working in cybersecurity takes passion for technology, speed, a desire to learn, and vigilance in order to keep every asset safe. You’ll be on the front lines of innovation, working with a highly motivated team focused on analyzing, designing, developing and delivering solutions built to stop adversaries and strengthen our operations. Your research and work will ensure stability, capacity and resiliency of our products. Working with your internal team, as well as technologists and innovators across our global network, your ability to identify threats, provide intelligent analysis and positive actions will stop crimes and strengthen our data.
As a member of the Attack Analysis team, you will fit into a Global team providing 24/7 monitoring and Incident Response, acting as the frontline for attacks against the firms’ infrastructure. As a technical lead, your role will include advanced analysis, threat hunting, evaluation of new security technology as well as ensuring larger technology projects at the company are ready to be integrated into the Attack Analysis team and monitoring function. There is also an emphasis on coaching and mentoring in this role; you'll work to bring up the technical expertise of the entire team around you. This could include running training sessions for the team in range or virtual environments, leading hunting exercises, serving as a technical escalation point and coaching the team through adopting monitoring responsibility.
Cloud: You will be one of the team specialists on Cloud technologies. You'll work to help mature the Attack Analysis team in how we secure, monitor and respond to incidents in both private and public cloud environments. You'll work with internal security engineering and Cloud engineering teams to ensure that Attack Analysis requirements are represented in the architecture, design and implementation of Cloud environments. You'll help design, write and automate detection and incident response processes and tools for public and private cloud environments.
As a Attack Analysis Cloud Lead, you will use defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.
Key areas of focus include: Public/Private Cloud Engineering and Incident Response, Digital and Network Forensics, Threat Modeling, developing or finding/researching exploits.
QualificationsThis role requires a wide variety of strengths and capabilities, including:
Primary Qualifications:
- Significant experience in Security Operations, Cybersecurity Consulting, Incident Response, Computer Network Operations (CNO), Computer Network Defense (CND) or equivalent roles in a large, mission-critical environment.
- Significant experience with one or more of the following cloud environments at a large enterprise: AWS, Google Cloud, or Azure
- Experience with container security and orchestration – Docker, Containerd, Kubernetes, Cloud Foundry etc.
- Detailed understanding of IaaS and virtualization – service orientated architecture designed around the delivery of Infrastructure components as a service
- Familiar with configuration & release management tools commonly used in CI/CD pipelines (e.g. Ansible, Chef, Puppet, etc.).
- Experience with the creation and tuning of alerting rules from a SIEM and other devices in response to changing threats.
- Excellent written and verbal communication skills to describe security event details and technical analysis with audiences within the cybersecurity organization and other technology groups.
- Experience with threat hunting on a large, enterprise network both as an individual and leading hunting exercises with other team members.
- Experience with log analysis from multiple sources (e.g. firewall, IDS, endpoints) to identify and investigate security events and anomalies.
- Experience with malware analysis (both static and dynamic), binary triage, and file format analysis
- Experience with packet-level analysis (e.g., Wireshark, tcpdump, tshark) and knowledge of TCP/IP protocols (OSI layers 3-7) for investigating network traffic.
- Experience using scripting languages (Python, Powershell, Bash, etc.) to parse machine-generated data, interact with REST APIs and automate repetitive tasks.
Additional Technical Qualifications:
- Experience developing Lambda functions
- Experience with regular expressions and their applications.
- Experience with host forensics including memory forensics, file system analysis and building host-level timelines.
- Knowledge of operating system internals (Windows, UNIX)
- Knowledge with command line tools across Windows and UNIX.
About Us
As a part of our commitment to health and safety, we have implemented various COVID-related health and safety requirements for our workforce. These requirements may include sharing information in the firm’s vaccine record tool, vaccination or regular testing, mask wearing, social distancing and daily health checks. Requirements may change in the future with the evolving public health landscape. JPMorgan Chase will consider accommodation requests.
About the Team
High Risk Roles (HRR) are sensitive roles within the technology organization that require high assurance of the integrity of staff by virtue of 1) sensitive cybersecurity and technology functions they perform within systems or 2) information they receive regarding sensitive cybersecurity or technology matters. Users in these roles are subject to enhanced pre-hire screening which includes both criminal and credit background checks (as allowed by law). The enhanced screening will need to be successfully completed prior to commencing employment or assignment.
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided