Shape the future of cybersecurity through advanced digital forensics, contributing to firm-wide innovation and security.
Job responsibilities
- Utilize digital forensic tools to support internal investigations and cybersecurity related matters
- Conduct detailed analyses of potential breaches and provide root cause analysis and impact assessments
- Prepare comprehensive investigation reports and assist in developing in-house training programs
- Collaborate with cross-functional teams in Legal, Technology, and HR to support incident response and regulatory proceedings.
- Innovate and implement forensic research projects to stay ahead of emerging technologies for the firm
- Conduct in-depth digital forensic investigations with advanced analysis to gather, preserve, and analyze evidence from various sources
- Partner with cybersecurity operations teams to pinpoint vulnerabilities, bolster security, and proactively mitigate potential risks
- Conduct detailed assessments of JPMorgan Chase’s digital forensics risk and control environment to identify control gaps, deficiencies, and weaknesses and contribute to the development and implementation of remediation plans
- Engage in projects that improve forensic techniques and processes across teams
Required qualifications, capabilities, and skills
- 3+ years in digital forensics, cybersecurity operations, or similar role
- Experience should primarily be in digital forensics, incident response, and malware analysis
- Inherent understanding of how forensic tools produce their results and the ability to explain that information both to technical and non-technical audiences
- Expertise in computer forensic best practices and industry-standard methodologies
- Proficiency with tools like X-Ways, Volexity Surge, EnCase, Volatility, and Wireshark
- Excellent communication skills and attention to detail
- Demonstrated proficiency in scripting languages like Python, Bash, JavaScript, or PowerShell for automation and data analysis
- Experienced in detailed analysis of digital artifacts, network traffic, and logs to identify malicious activity or user behavior
- Developing knowledge of e-discovery processes, incident response, and threat intelligence
Preferred qualifications, capabilities, and skills
- Experience with acquisition and analysis of data from cloud platforms (AWS, Azure, GCP)
- Experience with memory forensics
- Relevant certifications (e.g., GCFA, GNFA, GCIH)
- Ability to automate tasks using scripting languages such as Python, Bash/ZSH, and PowerShell
- Experience with malware reverse engineering