Listing Description
The Cybersecurity Intelligence Group (CIG) holds the global mandate for JPMC's cyber intelligence collection, analysis, and dissemination of finished products to the firm's Cybersecurity & Technology Controls teams, lines of business, and overall executive decision makers. The team is also responsible for tracking threats and incidents involving the firm's third-party suppliers, subsidiaries, and key clients to address events such as intrusions, malware, DDoS, unauthorized access, insider attacks, and loss of proprietary information. This includes developing a deep understanding of global threat actors and their tactics, techniques, and procedures employed during cyberattacks. CIG also plays an integral role in the alerting, response, and mitigation of incidents at JPMC and works closely with other internal teams and external partners to mitigate risk to the firm.
CIG’s Malware Analysis and Active Defense component conducts technical research in support of the above goals. As a Senior Malware Analyst / Reverse Engineer you’ll perform complex static and dynamic analysis of malicious code identified through internal investigations and from external sources ranging from commodity malware to Advanced Persistent Threat (APT) nation-state malware. We’re looking for a self-motivated individual with a proven track record in reverse engineering malware and an insatiable curiosity towards all things Cyber to join our team.
Key responsibilities:
- Conducting malware analysis and reverse engineering of suspicious code
- Performing deep dive technical analysis of cyberattack tactics, techniques, and procedures (TTPs)
- Developing signatures to identify malware families, actor techniques, and other noteworthy code sequences
- Automating malware analysis and intelligence gathering processes
- Hunting for novel samples, indicators of compromise (IOCs), and actor TTPs in internal and external datasets
- Researching threats, vulnerabilities, and exploits to enhance monitoring and detection capabilities
- Partnering with the Incident Response (IR) teams to understand incidents and support technical analysis of malicious cyber events
- Documenting and presenting findings in comprehensive technical analysis reports
- Communicating effectively with business representatives, technology specialists, and vendors
- Assisting peer analysts in the production and dissemination of intelligence reports
- Contributing technical expertise and Cybersecurity perspectives to discussions regarding JPMC global technology infrastructure
Desired Qualifications:
- A proven track record in reverse engineering malware and an insatiable curiosity towards all things Cyber
- Experience with debuggers, disassemblers, and other malware analysis tools (i.e. IDA Pro, Ghidra)
- Coding (scripting) experience (i.e. Python, C, JavaScript, VBScript, etc.)
- Prior background in Forensics, Log Analysis, Incident Response, Threat Intelligence, and / or Security Research
- Knowledge in Operating Systems (i.e. Windows, Linux, Mac, Mobile), processor architectures (i.e. x86, x64), and computer networking
- Experience in developing both tactical and strategic tools and capabilities
- Strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically.
- Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third-party vendors.
- 5+ years of professional experience in Information Technology
- 3+ years of professional experience in malware analysis / reverse engineering
- Bachelor's Degree in Computer Science or related field or equivalent experience
About Us
As a part of our commitment to health and safety, we have implemented various COVID-related health and safety requirements for our workforce. These requirements may include sharing information in the firm’s vaccine record tool, vaccination or regular testing, mask wearing, social distancing and daily health checks. Requirements may change in the future with the evolving public health landscape. JPMorgan Chase will consider accommodation requests.
About the Team
High Risk Roles (HRR) are sensitive roles within the technology organization that require high assurance of the integrity of staff by virtue of 1) sensitive cybersecurity and technology functions they perform within systems or 2) information they receive regarding sensitive cybersecurity or technology matters. Users in these roles are subject to enhanced pre-hire screening which includes both criminal and credit background checks (as allowed by law). The enhanced screening will need to be successfully completed prior to commencing employment or assignment.
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided