Security Operations Senior Associate
LONDON, LONDON, United Kingdom
JPMorgan Chase & Co.
Seize the opportunity to enhance cybersecurity, utilizing your skills in threat analysis and incident response to protect vital data and systems.
As a Senior Incident Response Analyst, you will play an important role in safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Drawing on your knowledge of security principles, practices, and theories, you will collaborate with cross-functional teams to develop a coordinated approach to security and educate employees on best practices, policies, and procedures. Your work will have a direct impact on departmental outcomes, as you plan and ensure progress, identify gaps in information, and conduct analyses to solve complex cybersecurity problems. By utilizing your advanced analytical, technical, and problem-solving skills, you will contribute to the continuous improvement of our cybersecurity posture and help maintain the integrity, confidentiality, and availability of sensitive data and systems.
Job responsibilities
- Monitor and analyze security infrastructure, contributing to detection and response to threats, vulnerabilities, and incidents to ensure the integrity, confidentiality, and availability of sensitive data and systems
- Conduct in-depth security investigations, analyzing logs, network traffic, and other data sources to identify root causes, assess impact, and gather evidence for response and mitigation actions
- Develop and maintain threat detection and response playbooks, incorporating industry best practices, regulatory requirements, and lessons learned from previous incidents
- Collaborate with cross-functional teams to develop and implement coordinated security strategies, policies, and procedures, while educating employees on best practices
Required qualifications, capabilities, and skills
- 4+ years of experience working in information security, with a focus on security operations center (SOC) analysis and incident response
- Advanced knowledge of security protocols, cryptography, authentication, authorization, and security architecture design principles
- Good level of knowledge in network fundamentals, for example; OSI Stack, TCP/IP, DNS, HTTP(S), SMTP
- Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, lateral movement
- Good level of knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise
- Demonstrated experience in log analysis and PCAP analysis, vulnerability analysis, exploitation, and security investigation techniques to identify and respond to security incidents
- Good level of understanding of file analysis; extracting indicators, providing a report, implementing mitigations
- Ability to demonstrate a structured, analytical approach to investigating alerts and/or indicators and documenting your findings in a manner that both peer and executive level colleagues can understand
- Experience with cloud technologies and platforms, including knowledge of cloud security architecture and how an attacker can utilize these platforms
- Experience with file analysis tools and understanding of malware analysis techniques, including dynamic and static analysis, to extract indicators, write reports, and implement mitigations
- Willing to work a shift pattern that includes weekend work
Highly desired
- A degree in Computer Science, Information Security, or a related field
- Industry-recognized security certifications, such as CompTIA Security+, CySA+, or CASP+; GIAC GSEC, GCIH, or GCFA; or ISC2 CISSP or CCSP
- Financial sector experience
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CASP+ CCSP CISSP Cloud CompTIA Computer Science Cryptography DNS GCFA GCIH GIAC GSEC Incident response Linux Log analysis Malware PCAP SMTP SOC TCP/IP Threat detection Vulnerabilities Windows
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.