Expoint - all jobs in one place

המקום בו המומחים והחברות הטובות ביותר נפגשים

Limitless High-tech career opportunities - Expoint

JPMorgan Security Operations Senior Associate - 
United States, Ohio 
320143921

30.11.2024

As a Security Operations Senior Associate - Data Loss Prevention / Insider Threat within the Cybersecurity - Data Loss Prevention team, you will play an important role in safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Drawing on your knowledge of security principles, practices, and theories, you will collaborate with cross-functional teams to develop a coordinated approach to security and educate employees on best practices, policies, and procedures. Your work will have a direct impact on departmental outcomes, as you plan and ensure progress, identify gaps in information, and conduct analyses to solve complex cybersecurity problems. By utilizing your advanced analytical, technical, and problem-solving skills, you will contribute to the continuous improvement of our cybersecurity posture and help maintain the integrity, confidentiality, and availability of sensitive data and systems.

Job responsibilities

  • Perform daily operational real time monitoring and analysis of internal security events in accordance with standard operating procedures
  • Review network and endpoint DLP events to determine the risk and impact to the firm and deliver findings in a clear, concise and fact-based manner
  • Conduct in-depth security investigations, analyzing logs, network traffic, and other data sources to identify root causes, assess impact, and gather evidence for response and mitigation actions
  • Collaborate with cross-functional teams to develop and implement coordinated security strategies, policies, and procedures, while educating employees on best practices

Required qualifications, capabilities, and skills

  • 3+ years of experience in cybersecurity operations, including threat detection, incident response, and vulnerability management
  • Demonstrated experience in network traffic analysis, log analysis, and security investigation techniques to identify and respond to security incidents
  • Understand investigation activities and the ability to follow data / build a case, with foundational knowledge of cybersecurity organizational practices, operations, risk management processes, principles, architectural requirements, engineering, threats and vulnerabilities - including incident response methodologies
  • Proficiency in the use of Splunk, staying current with skills, participating in multiple forums related to cybersecurity, Data Loss Prevention or Insider Threat
  • Proficiency in scripting to automate tasks, implement controls, and manipulate data
  • Advanced knowledge of security protocols, cryptography, authentication, authorization, and security architecture design principles
  • Ability to collaborate with high-performing Agile teams and individuals throughout the firm to accomplish goals.

Preferred qualifications, capabilities, and skills

  • Knowledge of Data Loss Prevention (DLP), potentially including experience developing risk-aligned DLP monitoring rules, knowledge of DLP systems, and products or experience on a security assurance operations team, performing DLP triage operational functions
  • Experience reviewing logs, developing Splunk queries and dashboards, and automating manual tasks is a plus
  • Foundational knowledge of: computer forensics; legal, government, and jurisprudence - relating to cybersecurity, operating systems, and methods for intelligence gathering and sharing preferable
  • Ability to analyze vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence
  • Understands foundational cloud computing, computer network defense, external organization and academic institutions dealing with cybersecurity issues
  • Experience with financial authorities and regulations, identity and incident management, information assurance, information management, information systems, network security, and infrastructure design is preferable
  • Knowledge and experience related to insider threat monitoring and operations is a plus