LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

Cybersecurity Senior Incident Response Analyst

at J.P. Morgan

Back to all Cybersecurity jobs
J.P. Morgan logo
Bulge Bracket Investment Banks

Cybersecurity Senior Incident Response Analyst

at J.P. Morgan

Mid LevelNo visa sponsorshipCybersecurity

Posted 12 days ago

No clicks

Compensation
Not specified GBP

Currency: £ (GBP)

City
Not specified
Country
United Kingdom

Join JPMorgan Chase & Co.'s Security Operations Center (SOC) in London, providing 24x7 monitoring and incident response. Triage alerts using SIEM, perform start-to-finish case investigations, threat hunting, and file/malware analysis while identifying gaps and creating rule logic. Collaborate with cyber security teams (forensics, threat intel, penetration testing, vulnerability management, and red team) and participate in training and conferences to enhance the team's capabilities. Shift patterns may include weekend work as you help protect the firm's assets and deposits.

Location: LONDON, United Kingdom

As a member of the team within the JPMorgan Chase & Co. Security Operations Center (SOC), you will fit into a global team that provides 24x7 monitoring and incident response, acting as the frontline for attacks against the firms’ infrastructure. As a SOC analyst, your role will include triaging alerts using a security incident and event management (SIEM) solution, start-to-finish case investigation, threat hunting, file analysis, as well as getting involved in projects that aim to improve the capability of the team.  You’ll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You’ll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you’ll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.

 

Qualifications

This role requires a wide variety of strengths and capabilities, including:

  • Minimum of 3 years of experience working in information security, with a focus on security operations center (SOC) analysis and incident response.
  • Understanding of networking TCP/IP networking, including knowledge of routing, switching, and network protocols such as HTTP(S), DNS, DHCP, SMTP, and FTP.
  • Familiarity with network security technologies such as firewalls, proxies, and VPNs along with email security technologies and protocols.
  • Knowledge of security threats, attack methodologies, and mitigation strategies (such as phishing, port scanning, web application attacks, DDoS, lateral movement).
  • Experience performing log analysis using SIEM tools and performing packet capture (PCAP) analysis.
  • Knowledge in Windows and Linux operating systems and how to investigate them for signs of compromise.
  • Experience with file analysis tools and understanding of malware analysis techniques, including dynamic and static analysis, to extract indicators, write reports, and implement mitigations.
  • Experience with cloud technologies and platforms, including knowledge of cloud security architecture and how an attacker can utilize these platforms.
  • Ability to demonstrate a structured, analytical approach to investigating alerts and/or indicators and documenting your findings in a manner that both peer and executive level colleagues can understand.
  • Appreciation of the wider roles of interconnecting and collaboration with cyber security teams (such as forensics, threat intelligence, penetration testing, vulnerability management, and red team).
  • Willing to work a shift pattern that includes weekend work.

Highly Desired:

  • A degree in Computer Science, Information Security, or a related field.
  • Industry-recognized security certifications, such as CompTIA Security+, CySA+, or CASP+; GIAC GSEC, GCIH, or GCFA; or ISC2 CISSP or CCSP.
  • Scripting knowledge (such as Python) including its application to cybersecurity use cases.
  • Financial sector experience.


 

As a SOC Analyst, you will work alongside a highly skilled team to protect our organization from cyber threats.

Cybersecurity Senior Incident Response Analyst

at J.P. Morgan

Back to all Cybersecurity jobs
J.P. Morgan logo
Bulge Bracket Investment Banks

Cybersecurity Senior Incident Response Analyst

at J.P. Morgan

Mid LevelNo visa sponsorshipCybersecurity

Posted 12 days ago

No clicks

Compensation
Not specified GBP

Currency: £ (GBP)

City
Not specified
Country
United Kingdom

Join JPMorgan Chase & Co.'s Security Operations Center (SOC) in London, providing 24x7 monitoring and incident response. Triage alerts using SIEM, perform start-to-finish case investigations, threat hunting, and file/malware analysis while identifying gaps and creating rule logic. Collaborate with cyber security teams (forensics, threat intel, penetration testing, vulnerability management, and red team) and participate in training and conferences to enhance the team's capabilities. Shift patterns may include weekend work as you help protect the firm's assets and deposits.

Location: LONDON, United Kingdom

As a member of the team within the JPMorgan Chase & Co. Security Operations Center (SOC), you will fit into a global team that provides 24x7 monitoring and incident response, acting as the frontline for attacks against the firms’ infrastructure. As a SOC analyst, your role will include triaging alerts using a security incident and event management (SIEM) solution, start-to-finish case investigation, threat hunting, file analysis, as well as getting involved in projects that aim to improve the capability of the team.  You’ll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You’ll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you’ll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.

 

Qualifications

This role requires a wide variety of strengths and capabilities, including:

  • Minimum of 3 years of experience working in information security, with a focus on security operations center (SOC) analysis and incident response.
  • Understanding of networking TCP/IP networking, including knowledge of routing, switching, and network protocols such as HTTP(S), DNS, DHCP, SMTP, and FTP.
  • Familiarity with network security technologies such as firewalls, proxies, and VPNs along with email security technologies and protocols.
  • Knowledge of security threats, attack methodologies, and mitigation strategies (such as phishing, port scanning, web application attacks, DDoS, lateral movement).
  • Experience performing log analysis using SIEM tools and performing packet capture (PCAP) analysis.
  • Knowledge in Windows and Linux operating systems and how to investigate them for signs of compromise.
  • Experience with file analysis tools and understanding of malware analysis techniques, including dynamic and static analysis, to extract indicators, write reports, and implement mitigations.
  • Experience with cloud technologies and platforms, including knowledge of cloud security architecture and how an attacker can utilize these platforms.
  • Ability to demonstrate a structured, analytical approach to investigating alerts and/or indicators and documenting your findings in a manner that both peer and executive level colleagues can understand.
  • Appreciation of the wider roles of interconnecting and collaboration with cyber security teams (such as forensics, threat intelligence, penetration testing, vulnerability management, and red team).
  • Willing to work a shift pattern that includes weekend work.

Highly Desired:

  • A degree in Computer Science, Information Security, or a related field.
  • Industry-recognized security certifications, such as CompTIA Security+, CySA+, or CASP+; GIAC GSEC, GCIH, or GCFA; or ISC2 CISSP or CCSP.
  • Scripting knowledge (such as Python) including its application to cybersecurity use cases.
  • Financial sector experience.


 

As a SOC Analyst, you will work alongside a highly skilled team to protect our organization from cyber threats.