Listing Description
Job Description
Working in cybersecurity takes passion for technology, speed, a desire to learn, and vigilance in order to keep every asset safe. You’ll be on the front lines of innovation, working with a highly motivated team focused on analyzing, designing, developing and delivering solutions built to stop adversaries and strengthen our operations. Your research and work will ensure stability, capacity and resiliency of our products. Working with your internal team, as well as technologists and innovators across our global network, your ability to identify threats, provide intelligent analysis and positive actions will stop crimes and strengthen our data.
As a member of the Attack Analysis team, you will fit into a Global team providing 24/7 monitoring and Incident Response, acting as the frontline for attacks against the firms’ infrastructure. As a technical lead, your role will include advanced analysis, threat hunting, evaluation of new security technology as well as ensuring larger technology projects at the company are ready to be integrated into the Attack Analysis team and monitoring function. There is also an emphasis on coaching and mentoring in this role; you'll work to bring up the technical expertise of the entire team around you. This could include running training sessions for the team in range or virtual environments, leading hunting exercises, serving as a technical escalation point and coaching the team through adopting monitoring responsibility.
Key areas of focus include: Detection Engineering
You will be one of the team’s subject matter experts on Splunk – you will help mature how JPMC utilizes Splunk for various use-cases within Cyber Operations.The ideal candidate will be someone with previous SOC experience who enjoys researching TTPs and the threat landscape and translating that research data into high quality detections. Additionally - you'll work to help mature the Attack Analysis team in how we secure, monitor and respond to incidents on-prem as well as both private and public cloud environments. You'll work with internal security engineering teams to ensure that Attack Analysis requirements are represented in the architecture, design and implementation of various environments. You'll help design, write and automate detection and incident response processes and tools
Primary Qualifications:
- Significant experience in Security Operations, Cybersecurity Consulting, Incident Response, Computer Network Operations (CNO), Computer Network Defense (CND) or equivalent roles in a large, mission-critical environment.
- Experience with the creation and tuning of alerting rules from a SIEM and other devices in response to changing threats.
- Ability to research TTPs and develop high fidelity detections in various tools/languages including but not limited to: Splunk, CrowdStrike , Suricata, Snort
- Ability to use data science and analytical skills to identify anomalies over large datasets
- Excellent written and verbal communication skills to describe security event details and technical analysis with audiences within the cybersecurity organization and other technology groups.
- Experience with threat hunting on a large, enterprise network both as an individual and leading hunting exercises with other team members.
- Experience with log analysis from multiple sources (e.g. firewall, IDS, endpoints) to identify and investigate security events and anomalies.
- Experience with malware analysis (both static and dynamic), binary triage, and file format analysis
- Experience with packet-level analysis (e.g., Wireshark, tcpdump, tshark) and knowledge of TCP/IP protocols (OSI layers 3-7) for investigating network traffic.
- Experience using scripting languages (Python, Powershell, Bash, etc.) to parse machine-generated data, interact with REST APIs and automate repetitive tasks.
About Us
As a part of our commitment to health and safety, we have implemented various COVID-related health and safety requirements for our workforce. These requirements may include sharing information in the firm’s vaccine record tool, vaccination or regular testing, mask wearing, social distancing and daily health checks. Requirements may change in the future with the evolving public health landscape. JPMorgan Chase will consider accommodation requests.
About the Team
High Risk Roles (HRR) are sensitive roles within the technology organization that require high assurance of the integrity of staff by virtue of 1) sensitive cybersecurity and technology functions they perform within systems or 2) information they receive regarding sensitive cybersecurity or technology matters. Users in these roles are subject to enhanced pre-hire screening which includes both criminal and credit background checks (as allowed by law). The enhanced screening will need to be successfully completed prior to commencing employment or assignment.
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided