At a Glance
- Tasks: Analyse malware, reverse engineer code, and develop innovative cyber capabilities.
- Company: Join JPMC's cutting-edge Malware Analysis and Applied Discovery team.
- Benefits: Gain mentorship, competitive salary, and opportunities for professional growth.
- Other info: Collaborative environment with strong focus on ethical practices and career advancement.
- Why this job: Dive into the exciting world of cyber intelligence and make a real impact.
- Qualifications: Basic coding skills and a passion for cybersecurity are essential.
The predicted salary is between 40000 - 50000 £ per year.
JPMC's Malware Analysis and Applied Discovery (MAAD) team is a highly technical team specializing in analyzing malware targeting the firm and organizations around the world, while expanding the firm's cyber monitoring capabilities into new and exciting areas. We’re looking for a self‑motivated junior analyst with an insatiable curiosity toward all things cyber to join our team. You’ll spend a majority of your time designing, developing, and building innovative capabilities, while also hunting threats, investigating anomalies, and analyzing malware, with mentoring provided by senior members of our team.
Key Responsibilities
- Conducting malware analysis and reverse engineering of suspicious code
- Performing deep‑dive technical analysis of cyberattack tactics, techniques, and procedures (TTPs)
- Developing signatures to identify malware families, actor techniques, and other noteworthy code sequences
- Automating malware analysis and intelligence gathering processes
- Hunting for novel samples, indicators of compromise (IOCs), and actor TTPs in internal and external datasets
- Researching threats, vulnerabilities, and exploits to enhance monitoring and detection capabilities
- Partnering with the Incident Response (IR) teams to understand incidents and support technical analysis of malicious cyber events
- Documenting and presenting findings in comprehensive technical analysis reports
- Communicating effectively with business representatives, technology specialists, and vendors
- Assisting peer analysts in the production and dissemination of intelligence reports
- Contributing technical expertise and Cybersecurity perspectives to discussions regarding JPMC global technology infrastructure
Desired Qualifications
- Basic coding (scripting) experience (i.e. Python, C, JavaScript, VBScript, etc.)
- Familiarity with Cloud platforms (i.e. AWS, Azure, etc.) and Virtualization technologies (i.e. VMWare)
- Experience with some of the following: SIEM, SOAR, OSINT, IDA Pro, Ghidra, BinaryNinja, Wireshark, Jupyter, SQL, YARA, AWS Lambda
- A firm belief in doing what’s right and following ethical practices
- Foundational understanding of Forensics, Log Analysis, Incident Response, and / or Threat and Fraud Intelligence
- Knowledge in Operating Systems (i.e. Windows, Linux, Mac, Mobile), processor architectures (i.e. x86, x64), and computer networking
- Strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically
Cyber Intelligence Associate - Malware Reverse Engineer employer: Cyber Security training courses
Contact Detail:
Cyber Security training courses Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Intelligence Associate - Malware Reverse Engineer
✨Tip Number 1
Network like a pro! Reach out to professionals in the cyber field on LinkedIn or at industry events. We can’t stress enough how valuable personal connections can be in landing that dream job.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your malware analysis projects or any relevant coding work. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on common technical questions related to malware analysis and reverse engineering. We recommend practicing with friends or using mock interview platforms to build confidence.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace Cyber Intelligence Associate - Malware Reverse Engineer
Some tips for your application 🫡
Show Your Curiosity: When writing your application, let your passion for cyber intelligence shine through! We want to see that insatiable curiosity you have for malware and cyber threats. Share any personal projects or experiences that highlight your eagerness to learn and explore.
Tailor Your Skills: Make sure to align your skills with the job description. If you've got coding experience or familiarity with tools like Wireshark or Ghidra, mention them! We love seeing how your background fits into our team's needs, so don’t hold back on showcasing your relevant expertise.
Be Clear and Concise: We appreciate clear communication, especially when it comes to complex topics. Keep your application straightforward and avoid jargon overload. Present your thoughts in a way that’s easy to understand, just like you would in a technical analysis report.
Apply Through Our Website: Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it gives you a chance to explore more about our team and what we do!
How to prepare for a job interview at Cyber Security training courses
✨Know Your Malware
Dive deep into the latest malware trends and techniques. Familiarise yourself with common malware types and their behaviours, as well as the tools used for analysis like IDA Pro or Ghidra. This will not only impress your interviewers but also show your genuine interest in the field.
✨Show Off Your Coding Skills
Brush up on your coding skills, especially in Python or JavaScript. Be prepared to discuss how you've used scripting in past projects or how you would automate certain processes in malware analysis. Practical examples can really make you stand out!
✨Understand the Bigger Picture
Be ready to talk about how malware analysis fits into the broader cybersecurity landscape. Understand the role of Incident Response teams and how your work would contribute to the overall security posture of the organisation. This shows that you’re not just focused on the technical side but also on collaboration and communication.
✨Prepare for Technical Questions
Expect some technical questions that may involve problem-solving or case studies related to malware analysis. Practice explaining complex concepts in simple terms, as this will demonstrate your ability to communicate effectively with both technical and non-technical stakeholders.