At a Glance
- Tasks: Lead a dynamic team in cybersecurity, ensuring safety and resilience of our products.
- Company: Join a cutting-edge firm at the forefront of cybersecurity innovation.
- Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
- Why this job: Make a real impact by defending against cyber threats and shaping the future of security.
- Qualifications: Experience in cybersecurity, strong leadership skills, and a passion for technology.
- Other info: Collaborate globally and enjoy a vibrant work culture with excellent career advancement.
The predicted salary is between 72000 - 108000 ÂŁ per year.
Working in cybersecurity takes passion for technology, speed, a desire to learn, and vigilance in order to keep every asset safe. You’ll be on the front lines of innovation, working with a highly motivated team focused on analyzing, designing, developing and delivering solutions built to stop adversaries and strengthen our operations. Your research and work will ensure stability, capacity and resiliency of our products.
As a member of the Attack Analysis team, you will fit into a Global team providing 24/7 monitoring and Incident Response, acting as the frontline defense for attacks against the firms’ infrastructure. As a SOC Manager, you will serve as the direct manager of a team of SOC analysts. You’ll help guide them through their alert triage and case analysis function as well as provide feedback on a continuous basis. You’ll also work with them on coaching and career development to help them towards their own goals. In addition, you’ll be responsible for keeping track of alert and case metrics to ensure the team is meeting overall alert and case goals as well as identifying opportunities to improve and tune alerts. In an incident response scenario, the SOC Manager is responsible for assigning, coordinating and documenting the outcome of specific analysis workstreams and preparing communications to senior management.
Qualifications
This role requires a wide variety of strengths and capabilities, both technical and non-technical:
- Technical Skills:
- Experience with Cybersecurity Incident Response processes in an enterprise environment.
- Good level of knowledge in network fundamentals, for example; OSI Stack, TCP/IP, DNS, HTTP(S), SMTP.
- Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement.
- Experience or demonstrable knowledge in log and PCAP analysis.
- Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise.
- Foundational understanding of file analysis; extracting indicators, providing a report, implementing mitigations.
- Basic understanding for Cloud architecture and how an attacker can utilize these platforms.
- Ability to demonstrate the right approach to investigating alerts and/or indicators and document your findings in a manner that both peer and executive level colleagues can understand.
- Appreciation of the wider roles of interconnecting Cyber Security teams and collaboration with each of those (i.e. Forensics / Threat Intelligence / Penetration Testing / Vulnerability Management / “Purple Teaming” etc).
- Experience with communicating technical topics both in writing and verbally to senior management from a technical or non-technical background.
- Experience with delivering constructive feedback to a team on a continuous basis.
- Knowledge of metrics and data analysis for the purpose of identifying process improvements.
- Bachelor’s degree in Computer Science or Engineering, or equivalent professional experience.
- Minimum 3 years in managerial roles, with proven leadership and the ability to engage effectively with senior executives.
- Some exposure to global or multinational environments is a plus; comfortable collaborating across time zones and cultures.
- Working familiarity with major cloud platforms (AWS, Azure, GCP) and basic security considerations; able to collaborate effectively with cloud and security teams.
- Preferred security certifications (e.g., GIAC, CISSP, CEH); a demonstrated commitment to continuous learning is appreciated.
Security Operations Vice President employer: J.P. Morgan
Contact Detail:
J.P. Morgan Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Vice President
✨Tip Number 1
Network like a pro! Attend industry events, webinars, and meetups to connect with professionals in cybersecurity. We all know that sometimes it’s not just what you know, but who you know that can help you land that dream job.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, analyses, or any relevant work. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on common cybersecurity scenarios and incident response processes. We recommend practicing with a friend or using mock interview platforms to build your confidence and refine your answers.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace Security Operations Vice President
Some tips for your application 🫡
Show Your Passion for Cybersecurity: When writing your application, let your enthusiasm for technology and cybersecurity shine through. We want to see that you’re not just ticking boxes but genuinely excited about the role and the impact you can make.
Tailor Your Application: Make sure to customise your CV and cover letter to highlight relevant experiences and skills that match the job description. We love seeing how your background aligns with our needs, so don’t hold back on showcasing your expertise!
Be Clear and Concise: In your written application, clarity is key. Use straightforward language and avoid jargon where possible. We appreciate a well-structured application that’s easy to read and gets straight to the point.
Apply Through Our Website: We encourage you to submit your application directly through our website. It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it’s super easy to do!
How to prepare for a job interview at J.P. Morgan
✨Know Your Cybersecurity Basics
Make sure you brush up on your knowledge of network fundamentals and incident response processes. Be ready to discuss specific threats like phishing or DDoS attacks, and how you would respond to them. This shows that you’re not just familiar with the theory but can apply it in real-world scenarios.
✨Showcase Your Leadership Skills
As a SOC Manager, you'll be leading a team, so highlight your experience in coaching and providing feedback. Prepare examples of how you've guided teams through alert triage or case analysis, and how you’ve helped team members achieve their career goals. This will demonstrate your capability to manage and inspire.
✨Communicate Clearly and Effectively
You’ll need to communicate complex technical topics to both technical and non-technical audiences. Practice explaining your past experiences in a way that’s easy to understand. Use clear, concise language and avoid jargon where possible to ensure everyone is on the same page.
✨Be Ready to Discuss Metrics and Improvements
Familiarise yourself with metrics related to alert and case management. Be prepared to discuss how you’ve used data analysis to identify process improvements in previous roles. This shows that you’re results-driven and focused on continuous improvement, which is crucial for this position.