The global Cybersecurity assessments team delivers next generation application and infrastructure penetration testing. As part of the team, your primary responsibility will be performing hands on penetration testing of some of JPMC’s most critical applications, platforms, and the perimeter. You will work with application developers to not only understand root cause and mitigate vulnerabilities, but also to identify where vulnerabilities can be identified earlier in the SDLC.
Responsibilities:
- Conduct in-depth manual penetration tests, identifying vulnerabilities in Web/Mobile Applications, Thick Clients, On-Prem and Cloud Infrastructures
- Reporting on findings and vulnerabilities including presenting results to non-technical managers
- Develop customized tools and automation scripts to improve identification of vulnerabilities at scale
- Leading multi-personnel projects
Minimum qualifications:
- Manual penetration testing experience (beyond running automated tools) against a wide variety of applications including web, mobile and thick clients, internal and external facing infrastructures
- Bachelor’s degree or equivalent experience
- Foundational knowledge of cybersecurity organization practices, operations, risk management processes, principles, architectural requirements, engineering and threats and vulnerabilities, including incident response methodologies
- Ability to collaborate with high-performing Agile teams and individuals throughout the firm to accomplish goals
- Ability to analyze vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence
- Foundational knowledge of: computer forensics; legal, government and jurisprudence as they relate to cybersecurity, and methods for intelligence gathering and sharing
- Foundational knowledge of: operating systems, command line administration and scripting
- Foundational knowledge of: cloud computing, computer network defense, external organizations and academic institutions dealing with cybersecurity issues, financial authorities and regulations, identity management, incident management, information assurance, information management, information systems and network security and infrastructure design
- Good understanding of application and infrastructure testing methodologies and vulnerabilities
- Adept at explaining technical jargon to non-technical parties
- Excellent report writing and presentation skills
- Willingness to learn and drive to excel is a must
Preferred qualifications:
- Proficiency in security concepts for both Windows and Unix-like Operating Systems
- Experience in source code review and/or building software with multiple programming languages (i.e. Python, Java, Rust, etc.)
- Experience in reverse engineering standalone, thick client and mobile applications
- Certifications like CREST (CRT, CCT), OSCP, OSCE, GXPN, GRE