At a Glance
- Tasks: Monitor and respond to cybersecurity incidents, protecting vital assets.
- Company: Join JPMorgan Chase & Co., a leader in financial security.
- Benefits: Competitive salary, training opportunities, and a chance to make a real impact.
- Other info: Dynamic team environment with opportunities for growth and collaboration.
- Why this job: Be on the frontline of cybersecurity, safeguarding trillions in assets.
- Qualifications: 3+ years in information security with SOC analysis experience.
The predicted salary is between 55000 - 70000 £ per year.
As a member of the team within the JPMorgan Chase & Co. Security Operations Center (SOC), you will fit into a global team that provides 24x7 monitoring and incident response, acting as the frontline for attacks against the firm's infrastructure. As a SOC analyst, your role will include triaging alerts using a security incident and event management (SIEM) solution, start-to-finish case investigation, threat hunting, file analysis, as well as getting involved in projects that aim to improve the capability of the team. You'll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You'll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you'll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.
Qualifications
- Minimum of 3 years of experience working in information security, with a focus on security operations center (SOC) analysis and incident response.
- Understanding of networking TCP/IP networking, including knowledge of routing, switching, and network protocols such as HTTP(S), DNS, DHCP, SMTP, and FTP.
- Familiarity with network security technologies such as firewalls, proxies, and VPNs along with email security technologies and protocols.
- Knowledge of security threats, attack methodologies, and mitigation strategies (such as phishing, port scanning, web application attacks, DDoS, lateral movement).
- Experience performing log analysis using SIEM tools and performing packet capture (PCAP) analysis.
- Knowledge in Windows and Linux operating systems and how to investigate them for signs of compromise.
- Experience with file analysis tools and understanding of malware analysis techniques, including dynamic and static analysis, to extract indicators, write reports, and implement mitigations.
- Experience with cloud technologies and platforms, including knowledge of cloud security architecture and how an attacker can utilize these platforms.
- Ability to demonstrate a structured, analytical approach to investigating alerts and/or indicators and documenting your findings in a manner that both peer and executive level colleagues can understand.
- Appreciation of the wider roles of interconnecting and collaboration with cyber security teams (such as forensics, threat intelligence, penetration testing, vulnerability management, and red team).
- Willing to work a shift pattern that includes weekend work.
Highly Desired
- A degree in Computer Science, Information Security, or a related field.
- Industry-recognized security certifications, such as CompTIA Security+, CySA+, or CASP+; GIAC GSEC, GCIH, or GCFA; or ISC2 CISSP or CCSP.
- Scripting knowledge (such as Python) including its application to cybersecurity use cases.
- Financial sector experience.
Cybersecurity Senior Incident Response Analyst in London employer: JP Morgan
Contact Detail:
JP Morgan Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cybersecurity Senior Incident Response Analyst in London
✨Tip Number 1
Network with industry professionals! Attend cybersecurity meetups, conferences, or online forums. Engaging with others in the field can lead to job opportunities and insider tips that you won't find on job boards.
✨Tip Number 2
Showcase your skills through practical demonstrations. Create a portfolio of your incident response projects or threat hunting investigations. This hands-on evidence can really set you apart during interviews.
✨Tip Number 3
Prepare for technical interviews by brushing up on your knowledge of SIEM tools and packet analysis. Practise explaining your thought process clearly, as communication is key in a SOC environment.
✨Tip Number 4
Don't forget to apply through our website! We often have openings that might not be advertised elsewhere. Plus, it shows you're genuinely interested in joining our team at StudySmarter.
We think you need these skills to ace Cybersecurity Senior Incident Response Analyst in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Cybersecurity Senior Incident Response Analyst role. Highlight your experience in SOC analysis and incident response, and don’t forget to mention any relevant certifications or training you've completed.
Showcase Your Skills: In your application, showcase your skills in log analysis, threat hunting, and your understanding of networking protocols. Use specific examples from your past experiences to demonstrate how you’ve tackled similar challenges.
Be Clear and Concise: When writing your cover letter, be clear and concise. Explain why you’re passionate about cybersecurity and how your background makes you a great fit for the team. Remember, we want to see your personality shine through!
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re serious about joining our team at StudySmarter.
How to prepare for a job interview at JP Morgan
✨Know Your Stuff
Make sure you brush up on your knowledge of networking protocols and security technologies. Be ready to discuss how you've used SIEM tools in the past and any specific incidents you've responded to. This will show that you’re not just familiar with the theory but have practical experience too.
✨Showcase Your Analytical Skills
Prepare to demonstrate your structured approach to investigating alerts. Think of examples where you’ve had to analyse logs or perform packet captures. Being able to articulate your thought process will impress the interviewers and show them you can handle the complexities of the role.
✨Stay Current with Threats
Familiarise yourself with the latest cybersecurity threats and attack methodologies. Be ready to discuss recent incidents in the news and how they could relate to the firm. This shows that you’re proactive and engaged with the industry, which is crucial for a SOC analyst.
✨Collaborate and Communicate
Highlight your experience working with other cybersecurity teams. Be prepared to talk about how you’ve collaborated with forensics, threat intelligence, or red teams in the past. Good communication skills are key, especially when explaining complex findings to both technical and non-technical colleagues.