Join our cybersecurity team, implementing innovative strategies and tools to protect sensitive data and maintain a secure digital environment.
As a Security Operations Associate in Cybersecurity Operations, you will contribute to safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Leveraging your in-depth understanding of security principles and practices, you will exercise initiative and judgment to resolve cybersecurity-related problems and contribute to the improvement of current working methods. Collaborating with cross-functional teams, you will develop a coordinated approach to cybersecurity and educate employees on best practices, policies, and procedures. Your work will have a direct impact on the integrity, confidentiality, and availability of sensitive data and systems within the department, ensuring a secure digital environment for JPMorgan Chase.
Job responsibilities
Conduct security investigations, log analysis, threat hunting, and vulnerability impact assessment to proactively identify and mitigate potential risks, vulnerabilities, and security breachesUtilize security tools and technologies, such as Security Information and Event Management (SIEM), intrusion detection systems, endpoint detection, and malware analysis, to enhance threat detection and response capabilitiesCollaborate with cross-functional teams to implement coordinated security strategies, policies, and proceduresContribute to continuous improvement of security operations processes and methodologies, proposing enhancements to threat detection and response playbooks and contributing to the overall security posture of the organizationWork a shift pattern that includes weekend work every four weeksRequired qualifications, capabilities, and skills
2+ years of experience in cybersecurity operations, network security, or a related fieldStrong understanding of security protocols, cryptography, authentication, authorization, and network security conceptsExperience with security tools and technologies, including SIEM, intrusion detection systems, log analysis, and malware analysisKnowledge in network concepts and protocols, for example; OSI Stack, TCP/IP, DNS, HTTP(S), SMTPUnderstanding the approach threat actors take to attack a network; phishing, port scanning, web application attacks, lateral movementKnowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromiseAbility to demonstrate the right approach to investigating alerts and/or indicators and document your findings in a manner that both peer and executive level colleagues can understandPreferred qualifications, capabilities, and skills
Demonstrated proficiency in scripting languages for automating security tasks and processesFoundational understanding of file analysis; extracting indicators, providing a report, implementing mitigationsBasic understanding of Cloud architecture and how an attacker can utilize these platforms