Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

JPMorgan Cyber Intelligence Vice President - Malware Analyst 
United States, Texas, Plano 
693995941

01.04.2025

Lead cybersecurity intelligence at a top firm, safeguarding digital assets and enhancing threat detection and response capabilities. Harness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats.

As a Cybersecurity Intelligence Vice President in Cybersecurity & Tech Controls Malware Analysis team, you will play a critical role in safeguarding the firm's digital assets and infrastructure from cyber threats. Responsible for identifying, assessing, and mitigating risks, you will inform and influence control measures across the organization. Your expertise in analyzing complex issues and developing innovative solutions, along with your ability to collaborate with diverse teams, will be crucial in enhancing the firm's security posture. As a subject matter expert, you will contribute to strategic cybersecurity initiatives and continuously improve our threat detection and response capabilities. Your work significantly impacts the firm's operations, fiscal management, public image, employee morale, and client relationships.

Job responsibilities

  • Implement proactive threat intelligence strategies using advanced analytics and emerging technologies to identify and mitigate risks
  • Develop custom threat-hunting queries and rules for specific threat indicators in large data sets using data analysis tools or specialized languages
  • Enhance threat detection and response capabilities, staying current with cybersecurity trends, sharing insights, and implementing best practices
  • Build and maintain strong relationships with stakeholders, sharing threat intelligence and best practices to achieve operational goals and improve cybersecurity operations
  • Conduct malware analysis and reverse engineering of suspicious code
  • Perform deep dive technical analysis of cyberattack tactics, techniques, and procedures (TTPs)
  • Develop signatures to identify malware families, actor techniques, and other noteworthy code sequences
  • Automate malware analysis and intelligence gathering processes
  • Hunt for novel samples, indicators of compromise (IOCs), and actor TTPs in internal and external datasets
  • Research threats, vulnerabilities, and exploits to enhance monitoring and detection capabilities
  • Partner with the Incident Response (IR) teams to understand incidents and support technical analysis of malicious cyber events
  • Document and present findings in comprehensive technical analysis reports

Required qualifications, capabilities, and skills

  • 5+ years of experience in cybersecurity, focusing on threat intelligence, analysis, and mitigation
  • Expertise in advanced threat hunting, security research, and Open-Source Intelligence (OSINT) for risk identification and assessment
  • Proficiency in coding and scripting languages (C/C++, Python, Bash, JavaScript, PowerShell) and experience with Security Information and Event Management (SIEM) tools (Splunk, Elasticsearch) for automating threat detection and response
  • 5+ years focusing on Malware Analysis and Reverse Engineering
  • An insatiable curiosity towards all things Cyber
  • Experience with debuggers, disassemblers, and other malware analysis tools (i.e. IDA Pro, Ghidra, Sandboxes, x64dbg, WinDbg)
  • Knowledge in Operating Systems (i.e. Windows, Linux, Mac, Mobile), processor architectures (i.e. x86, x64, ARM, ARM64), and computer networking
  • Strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically
  • Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third-party vendors.

Preferred qualifications, capabilities, and skills

  • Prior background in Forensics, Log Analysis, Incident Response and / or Threat Intelligence
  • Experience in developing both tactical and strategic tools and capabilities
  • Expertise in advanced threat hunting, security research, and Open-Source Intelligence (OSINT) for risk identification and assessment