Join our cybersecurity team, implementing innovative strategies and tools to protect sensitive data and maintain a secure digital environment.
As a Security Operations - SOC Analyst in Cybersecurity Technology Controls, you will contribute to safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Leveraging your in-depth understanding of security principles and practices, you will exercise initiative and judgment to resolve cybersecurity-related problems and contribute to the improvement of current working methods. You’ll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. Collaborating with cross-functional teams, you will develop a coordinated approach to cybersecurity and educate employees on best practices, policies, and procedures. Your work will have a direct impact on the integrity, confidentiality, and availability of sensitive data and systems within the department, ensuring a secure digital environment for JPMorgan Chase.
Job responsibilities
Conduct security investigations, log analysis, threat hunting, and vulnerability impact assessment to proactively identify and mitigate potential risks, vulnerabilities, and security breachesUtilize security tools and technologies, such as Security Information and Event Management (SIEM), intrusion detection systems, endpoint detection, and malware analysis, to enhance threat detection and response capabilitiesCollaborate with cross-functional teams to implement coordinated security strategies, policies, and proceduresContribute to continuous improvement of security operations processes and methodologies, proposing enhancements to threat detection and response playbooks and contributing to the overall security posture of the organizationRequired qualifications, capabilities, and skills
2+ years of experience in cybersecurity operations, network security, or a related fieldDemonstrated proficiency in scripting languages for automating security tasks and processesExperience in network fundamentals, for example; OSI Stack, TCP/IP, DNS, HTTP(S), SMTPKnowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromiseStrong understanding of security protocols, cryptography, authentication, authorization, and network security conceptsExperience with security tools and technologies, including SIEM, intrusion detection systems, log analysis, and malware analysisExperience or demonstrable knowledge in log analysis and PCAP analysisKnowledge of the wider roles of interconnecting Cyber Security teams and collaboration with each of those (i.e. Forensics / Threat Intelligence / Penetration Testing / Vulnerability Management / “Purple Teaming” etc.)