As a Security Operations Associate in Cybersecurity & Tech Controls. Cybersecurity Operations, you will contribute to safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Leveraging your in-depth understanding of security principles and practices, you will exercise initiative and judgment to resolve cybersecurity-related problems and contribute to the improvement of current working methods. Collaborating with cross-functional teams, you will develop a coordinated approach to cybersecurity and educate employees on best practices, policies, and procedures. Your work will have a direct impact on the integrity, confidentiality, and availability of sensitive data and systems within the department, ensuring a secure digital environment for JPMorgan Chase.
Job responsibilities
- Conduct security investigations, log analysis, threat hunting, and vulnerability impact assessment to proactively identify and mitigate potential risks, vulnerabilities, and security breaches
- Utilize security tools and technologies, such as Security Information and Event Management (SIEM), intrusion detection systems, endpoint detection, and malware analysis, to enhance threat detection and response capabilities
- Collaborate with cross-functional teams to implement coordinated security strategies, policies, and procedures
- Contribute to continuous improvement of security operations processes and methodologies, proposing enhancements to threat detection and response playbooks and contributing to the overall security posture of the organization
- Be able to work a shift pattern that includes weekend work
Required qualifications, capabilities, and skills
- Bachelor's Degree in Computer Science, Cybersecurity or related field
- 2+ years of experience in cybersecurity operations, network security, or a related field
- Demonstrated proficiency in scripting languages for automating security tasks and processes
- Strong understanding of security protocols, cryptography, authentication, authorization, and network security concepts
- Experience with security tools and technologies, including SIEM, intrusion detection systems, log analysis, and malware analysis
- Demonstrate a structured, analytical approach to investigating alerts and/or indicators and documenting findings in a manner that both peer and executive level colleagues can understand
Preferred qualifications, capabilities, and skills
- Basic understanding of Cloud architectures, how to secure these environments and how an adversary might attack these environments