Apply Now    

Security Analyst – Attack Analysis - Associate

Req #: 170108053
Location: London, ENG, UK
Job Category: Technology
Job Description:
Working in Cybersecurity takes pure passion for technology, speed, a constant desire to learn, and above all, vigilance in keeping every last asset safe and sound. You’ll be on the front lines of innovation, working with a highly-motivated team laser-focused on analyzing, designing, developing and delivering solutions built to stop adversaries and strengthen our operations. Your research and work will ensure stability, capacity and resiliency of our products and emerging industry trends. Working in tandem with your internal team, as well as technologists and innovators across our global network, your ability to identify threats, provide intelligent analysis and positive actions will stop adversaries and strengthen our data.
 
The Security Analyst in Attack Analysis will utilize their background in technology and incident response procedures to act as a defender of the firm.  As a security analyst on the Attack Analysis team, you will use defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.
 
Key responsibilities include:  
  • Correlate log data from multiple sources and develop "detect" to identify adversary behavior
  • Contribute to the maturity of cyber threat hunting framework within the team
  • Conduct network forensics, log analysis, and malware triage in support of security events/incidents
  • Recognize and organize attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations.
  • Examine network topologies to understand how data flows through the network
  • Assist in the creation of processes/procedures, technical documentation, as well as completion of projects
  • Develop internal tools and automate processes/work flows in support of incident response
  • Assist with incident handling functions as well as with direct response activities for security events/incidents
This role requires a wide variety of strengths and capabilities, including:
  • Knowledge of Cybersecurity organization practices, operations, risk management processes, principles, architectural requirements, engineering and threats and vulnerabilities, including incident response methodologies
  • Ability to collaborate with high-performing teams and individuals throughout the firm to accomplish common goals
  • Proficiency in the use of skills tools, staying current with skills, participating in multiple forums
  •  Experience with Agile and can work with at least one of the common frameworks is highly desired.
  • Ability to analyze vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence
  • Experience working in a security role performing Security Analysis, Incident Response, Attack Analysis, or Computer Network Defense (CND) capacity
  • Solid understanding of network protocols and experience conducting packet analysis using appropriate tools (e.g. tcpdump, wireshark, tshark)
  • Knowledge of SIEM products and the ability to develop advanced correlation rules
  • Programming experience in at least one of the following languages: Python, Perl, Powershell as well as an automation mindset
  • Knowledge of intrusion detection methodologies (IDS/IPS) and techniques for detecting host and network-based intrusions via intrusion detection technologies
  • Familiarity with Malware / Reverse Engineering with ability to assist in Static and Dynamic Analysis
  • Familiarity with multiple operating systems (e.g., Windows, Unix, Mac)

Preferred skills:

  • Experience working as a penetration/red team tester with the ability to translate adversary behavior across multiple platforms (e.g., Windows, Unix, Mac) into identifiable patterns
  • Understanding of post exploitation frameworks (e.g. Powersploit/Empire, Veil) and ability to identify activity associated with their usage
  • Experience working with statistics to provide context and visual representation of data (e.g. R, numpy)
  • Previous experience working as part of a Computer Security Incident Response Team (CSIRT)
  • Familiarity with web application vulnerabilities and OWASP Top 10 

Your expertise in cyber, combined with your desire to provide innovative security services, will be an asset to our Cybersecurity team. Help deliver high-quality security solutions across all our lines of business around the world by creating, designing, implementing, and maintaining next-level technology. The work you’ll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.

 

When you work at JP Morgan Chase & Co., you’re not just working at a global financial institution. You’re an integral part of one of the world’s biggest tech companies. In 14 technology hubs worldwide, our team of 40,000+ technologist design, build and deploy everything from enterprise technology initiatives to big data and mobile solutions, as well as innovations in electronic payments, cyber security, machine learning and cloud development. Our $9.5B+ annual investment in technology enables us to hire people to create innovative solutions that will not only transform the financial services industry, but also change the world.

 

At JP Morgan Chase & Co.  we value the unique skills of every employee, and we’re building a technology organization that thrives on diversity. We encourage professional growth and career development, and offer competitive benefits and compensation. If you’re looking to build your career as part of a global technology team tackling big challenges that impact the lives of people and companies all around the world, we want to meet you.

 

©2017 JPMorgan Chase & Co. JPMorgan Chase is an equal opportunity and affirmative action employer Disability/Veteran.

Apply Now    

Join our Talent Community

Not ready to apply? Leave your information with us and we will keep you up to date with new career opportunities.

Other Information

Apply Using LinkedIn

You can also apply using your LinkedIn® profile. It may save you some time because your information will be automatically transferred into our system. Just click on the LinkedIn logo when you get to the application screen and follow the directions.

Submit an Updated Résumé

During the application process, be sure you have an up-to-date copy of your Résumé, your cover letter and any other documentation you would like to submit.