JPMorgan Chase & Co. (NYSE: JPM) is a leading global financial services firm with assets of $2 trillion and operations in more than 60 countries. The firm is a leader in investment banking, financial services for consumers, small business and commercial banking, financial transaction processing, asset management, and private equity.
The Global Cybersecurity Services team is responsible for planning, building and operating all cyber security disciplines. Positioned under the Operational Control umbrella, this team is comprised of industry leading experts in threat analysis, alerting and monitoring, incident response, investigations and engineering. Our core services are focused on protecting JPMorgan Chase & Co. from all cyber related attacks and advancing our technological maturity in order to continue to combat these types of threats.
The Threat Management & Response division of Cybersecurity Services is responsible for intelligence, incident response, investigations, and plays a role in the development of processes, tools, & strategy to facilitate these activities.
Cyber Threat and Intelligence (CTI) holds the global mandate for JPMorgan Chase's cyber threat information and intelligence collection, analysis, and dissemination of finished product to JPMorgan Chase's population of security operations teams, information technology teams, information technology risk teams, and overall executive decision makers. This team also is responsible for external engagement with peer groups and information security circles over cyber threats and on the development of global cyber policy to address events ranging from intrusions, malware, DDoS, unauthorized access, insider attacks and loss of proprietary information. This includes developing deep understanding of global threat actors and the geopolitical drivers of cyberspace.
CTI also plays an integral role in the alerting, response, and mitigation of computer security incidents at JPMC and CTI works closely with the incident response team, various lines of business, and United States Government entities to mitigate risk to the firm.
Conduct deep dive technical analysis of cyber attack tools, tactics, and procedures.
Regularly develop and produce written intelligence reports and white papers constructed from technical analysis results and collected threat information for JPMC internal consumers.
Assist CTI peers in regular production and dissemination of intelligence reports.
Review threat information and maintain threat repository.
Contribute cybersecurity perspective to discussions and decisions regarding JPMC global technology infrastructure and technology deployments.
Partner with the incident response team and investigations team to understand incidents and support technical analysis of malicious cyber security events.
Communicate effectively with representatives of the Lines of Business, technology specialists, and vendors.
Work closely with the technology risk teams to assess risk and provide recommendations for improving our security posture.
Conduct advanced computer and network tests relating to various forms of malware analysis, computer intrusion, theft of information, denial of service and multi-national organized criminal groups.
3+ year's experience in a large, mission-critical environment.
2+ year's incident response and or Investigative experience.
10+ total years technology experience.
Experience in network intrusion methods, network containment, and segregation techniques and technologies experience.
Ability to apply a thorough knowledge of attacker capabilities, intentions, motives, and historical operations/targets to inform JPMC Cybersecurity strategies quickly, clearly and effectively.
IP Protocol Suite; knowledge of IP Routing protocols.
Proficiency with Windows & UNIX.
Strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically.
Knowledge of incident response, investigations and crisis management.
Ability to identify both tactical and strategic solutions.
Knowledge of computer forensics both host and network based.
Experience working with various major vendor developed and open source forensic tools.
Bachelor's Degree in Computer Science or related field or equivalent experience.
Malware analysis, virus exploitation and mitigation techniques experience.
Knowledge of Novell, Mac OSX operating systems.
Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third-party vendors.
Coding (scripting) experience e.g. Perl, VB Script, Python etc.
Experience in partnering with major government agencies and authorities around the world.
Experience in safely and legally maintain multi-national network for collection of threat information.
JPMorgan Chase is an Equal Opportunity and Affirmative Action Employer, M/F/D/V.
US-NJ-Jersey City-NOC 5 - 575 Washington / 02969
US-NY-Syracuse-Syracuse Univ - Lyman Hall / 50432
Central Technology & Ops
Yes, 25 % of the Time
JPMorgan Chase - 17 months ago
At JPMorgan Chase, the work we do matters. All of us are committed to putting our resources and our voices to work every day for our...