As an Assessments & Exercises Vice President in the Cybersecurity and Technology Controls line of business, you will contribute significantly to enhancing the firm's cybersecurity or resiliency posture by using industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology. Design and deploy risk-driven tests and simulations (or manage a highly skilled team that does) and inform analysis to clearly outline root-causes. In this role, you will evaluate preventative controls, incident response processes, and detection capabilities, and advise cross-functional teams on security strategy and risk management.
JPMC’s Assurance Operations organization is looking to expand its Cybersecurity Red Team with an experienced Social Engineering Operator specializing in phishing and vishing assessments. The primary focus of this role will be to perform and manage hands-on offensive security activities leveraging social engineering skillsets as part of Red Team engagements against critical JPMC assets. The successful candidate will have a proven track record in cybersecurity assessments, to include social engineering operations like phishing and vishing, and will be able to demonstrate a general knowledge of computer networking fundamentals, modern threats and vulnerabilities, attack methodologies, and testing tools related to social engineering. The Cybersecurity Red Team consists of highly skilled and qualified members who conduct advanced adversary emulation operations to replicate cybersecurity threats targeting the firm. This position is anticipated to require the use of one or more High Risk Role (HRR) systems, which mandates successful completion of enhanced screening, including criminal and credit background checks, before starting employment and annually thereafter.
Job responsibilities
Perform and manage hands-on offensive security activities leveraging social engineering skillsets as part of Red Team engagements against critical JPMC assetsContinuously update and expand knowledge of emerging social engineering tactics, techniques, and procedures used by threat actors. Leverage expertise to conduct thorough social engineering assessments. Routinely provide subject matter expertise to enhance the firm's educational and training programsProduce comprehensive reports detailing cybersecurity and social engineering vulnerabilities, threats, and mitigation strategies. Effectively communicate complex technical and social engineering-related information to diverse audiences, including senior leadership, through clear written reports and engaging visual presentationsDesign and execute testing and simulations – such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm’s strategy and compliance with regulatory requirementsEvaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluationCollaborate closely with cross-functional teams to develop comprehensive assessment reports – including detailed findings, risk assessments, and remediation recommendations – making data-driven decisions that encourage continuous improvementUtilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy and risk management. Engage with peers and industry groups that share threat intelligence analytics
Required qualifications, capabilities, and skills
5+ years of experience in cybersecurity or resiliency, with demonstrated exceptional organizational skills to plan, design, and coordinate the development of offensive security testing, assessments, or simulation exercises Knowledge of US financial services sector cybersecurity or resiliency organization practices, operations risk management processes, principles, regulations, threats, risks, and incident response methodologiesAbility to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation, and proficiency in multiple security assessment methodologies (e.g., Open Worldwide Application Security Project (OWASP) Top Ten, National Institute of Standards and Technology (NIST) Cybersecurity Framework), offensive testing tools, or resiliency testing equivalentsExperience planning and executing social engineering assessments, including phishing, vishing, smishing, pretexting, baiting, and other tacticsUnderstanding of human psychology, with a strong knowledge of psychological principles and techniques used to influence and manipulate human behaviorExcellent communication, collaboration, and report writing skills, with the ability to influence and engage stakeholders across various functions and levelsAbility to collaborate with high-performing teams and individuals throughout the firm to accomplish common goalsBroad experience in multiple businesses or verticals, with organizational and cultural understanding of call centers, payments processes, client service/sales organizations, and operational support staffThe ability to articulate and visually present complex technical and fraud subject matter to a wide and senior audienceAbility to analyze and produce reports about cybersecurity and fraud vulnerabilities, threats, designs, and procedures Candidate should have the ability to perform targeted, covert security tests with vulnerability identification, exploitation, and post-exploitation activities
Preferred qualifications, capabilities, and skills
Social engineering background (or intelligence, law enforcement, or similar experience)Experience in data analysis and visualization, including dashboard developmentIntermediate to advanced knowledge and hands-on experience with scripting, with a strong emphasis/proficiency in PythonExperience with AI/ML technologies and tools and operationalizing their use in Red Teaming (e.g., developing video and audio deepfakes, etc.)