Expoint - all jobs in one place

המקום בו המומחים והחברות הטובות ביותר נפגשים

Limitless High-tech career opportunities - Expoint

JPMorgan Security Operations Associate - Attack Analysis 
United States, New York, New York 
551630261

31.08.2024

As a Security Operations Associate in Cybersecurity and Technology Controls, you will contribute to safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Leveraging your in-depth understanding of security principles and practices, you will exercise initiative and judgment to resolve cybersecurity-related problems and contribute to the improvement of current working methods. Collaborating with cross-functional teams, you will develop a coordinated approach to cybersecurity and educate employees on best practices, policies, and procedures. Your work will have a direct impact on the integrity, confidentiality, and availability of sensitive data and systems within the department, ensuring a secure digital environment for JPMorgan Chase.

As a member of the Attack Analysis team within the JPMorgan Chase & Co. SOC, you will fit into a global team providing 24/7 monitoring and Incident Response, acting as the frontline for attacks against the firms’ infrastructure. As a SOC analyst, your role will include monitoring alerts triggered from in-house bespoke signatures in a SIEM, start to finish case investigation, threat hunting, file analysis, as well as getting involved in projects that aim to improve the capability of the team. You’ll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You’ll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you’ll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.

Job responsibilities

  • Conduct security investigations, log analysis, threat hunting, and vulnerability impact assessment to proactively identify and mitigate potential risks, vulnerabilities, and security breaches
  • Utilize security tools and technologies, such as Security Information and Event Management (SIEM), intrusion detection systems, endpoint detection, and malware analysis, to enhance threat detection and response capabilities
  • Collaborate with cross-functional teams to implement coordinated security strategies, policies, and procedures
  • Contribute to continuous improvement of security operations processes and methodologies, proposing enhancements to threat detection and response playbooks and contributing to the overall security posture of the organization

Required qualifications, capabilities, and skills

  • 2+ years of experience in cybersecurity operations, network security, or a related field
  • Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement
  • Demonstrated proficiency in scripting languages (Python) for automating security tasks and processes
  • Strong understanding of security protocols, cryptography, authentication, authorization, and networking (ie. OSI Stack, TCP/IP, DNS, HTTP(S), SMTP) concepts
  • Experience with security tools and technologies, including SIEM, intrusion detection systems, log analysis, packet capture (PCAP) analysis and malware analysis
  • Foundational understanding of file analysis; extracting indicators, providing a report, implementing mitigations
  • Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise
  • Basic understanding for Cloud architecture and how an attacker can utilize these platforms
  • Ability to demonstrate the right approach to investigating alerts and/or indicators and document your findings in a manner that both peer and executive level colleagues can understand
  • Appreciation of the wider roles of interconnecting Cyber Security teams and collaboration with each of those (i.e. Forensics / Threat Intelligence / Penetration Testing / Vulnerability Management / “Purple Teaming” etc)
  • Willing to work a shift pattern that includes weekend work every four weeks