Employer Description
We offer a competitive total rewards package including base salary determined based on the role, experience, skill set, and location. For those in eligible roles, we offer discretionary incentive compensation which may be awarded in recognition of firm performance and individual achievements and contributions. We also offer a range of benefits and programs to meet employee needs, based on eligibility. These benefits include comprehensive health care coverage, on-site health and wellness centers, a retirement savings plan, backup childcare, tuition reimbursement, mental health support, financial coaching and more. Additional details about total compensation and benefits will be provided during the hiring process.
Job Description
As a Security Operations Associate in Cyber and Tech Controls line of business, you will contribute to safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Leveraging your in-depth understanding of security principles and practices, you will exercise initiative and judgment to resolve cybersecurity-related problems and contribute to the improvement of current working methods. Collaborating with cross-functional teams, you will develop a coordinated approach to cybersecurity and educate employees on best practices, policies, and procedures. Your work will have a direct impact on the integrity, confidentiality, and availability of sensitive data and systems within the department, ensuring a secure digital environment for JPMorgan Chase.
As part of theyou will detect, analyze and respond to cyber threats to JPMorgan Chase’s acquisitions. The team also conducts vulnerability intelligence, incident response, creates and disseminates intelligence and provides a gateway to the wider cybersecurity services in CTC Operations. As a member of ACT, you will have access to industry-leading cybersecurity products, and each acquisition’s unique environment will challenge you in new and interesting ways. A strong technical foundation and investigative mindset are essential and the ability to think outside of the box is strongly encouraged.
Job responsibilities
- Conduct security investigations, log analysis, threat hunting, and vulnerability impact assessment to proactively identify and mitigate potential risks, vulnerabilities, and security breaches
- Utilize security tools and technologies, such as Security Information and Event Management (SIEM), intrusion detection systems, endpoint detection, and malware analysis, to enhance threat detection and response capabilities
- Collaborate with cross-functional teams to implement coordinated security strategies, policies, and procedures
- Contribute to continuous improvement of security operations processes and methodologies, proposing enhancements to threat detection and response playbooks and contributing to the overall security posture of the organization
- Provide intelligence services to JPMorgan Chase’s acquisitions, including drafting and disseminating vulnerability and intelligence reports
- Liaise with JPMorgan Chase acquisitions regularly to maintain lines of communication, understand and document their cybersecurity posture and unique challenges, identifying uplift opportunities when possible.
- Triage and remediation of security alerts, along with end-to-end ownership of an investigation and active participation in incident response
- Working a shift schedule and complying to firmwide in office attendance policies
Required qualifications, capabilities, and skills
- 2+ years of experience in cybersecurity operations, network security, or a related field
- Demonstrated proficiency in scripting languages for automating security tasks and processes
- Strong understanding of security protocols, cryptography, authentication, authorization, and network security concepts
- Experience with security tools and technologies, including SIEM, intrusion detection systems, log analysis, and malware analysis
- Understanding how adversaries compromise networks, the different stages of an attack and how they can be detected
- Knowledge of typical enterprise security technologies, Windows and Linux operating systems (OS) and the ability to detect signs of compromise in these systems
- Good communication skills, including the ability to present potential risks and actual findings to a wide audience. Ability to communicate complex problems to a non-technical audience
- Strong logical and analytical thinking skills
Preferred qualifications, capabilities, and skills
- Knowledge of a range of cybersecurity tools
- Experience with Extended Detection & Response (XDR) tools
- Experience reviewing vulnerabilities and the effectiveness of the mitigatory measures
- A basic understanding of cloud architecture and an understanding of how attackers leverage these platforms
- Knowledge of scripting languages like Python, PowerShell, and JavaScript and understanding how scripting languages are used in a cybersecurity context.
- The ability to manage fluctuating workloads and conflicting priorities
- Experience with incident response