At a Glance
- Tasks: Analyse malware, reverse engineer code, and develop innovative cyber capabilities.
- Company: Join JPMC's cutting-edge Malware Analysis and Applied Discovery team.
- Benefits: Gain hands-on experience, mentorship, and exposure to advanced cyber technologies.
- Other info: Collaborative environment with opportunities for growth and learning.
- Why this job: Dive into the exciting world of cyber threats and make a real impact.
- Qualifications: Basic coding skills and a passion for cybersecurity are essential.
The predicted salary is between 40000 - 50000 £ per year.
JPMC's Malware Analysis and Applied Discovery (MAAD) team is a highly technical team specializing in analyzing malware targeting the firm and organizations around the world, while expanding the firm's cyber monitoring capabilities into new and exciting areas. We're looking for a self-motivated junior analyst with an insatiable curiosity toward all things cyber to join our team. You'll spend a majority of your time designing, developing, and building innovative capabilities, while also hunting threats, investigating anomalies, and analyzing malware, with mentoring provided by senior members of our team.
Key Responsibilities
- Conducting malware analysis and reverse engineering of suspicious code
- Performing deep dive technical analysis of cyberattack tactics, techniques, and procedures (TTPs)
- Developing signatures to identify malware families, actor techniques, and other noteworthy code sequences
- Automating malware analysis and intelligence gathering processes
- Hunting for novel samples, indicators of compromise (IOCs), and actor TTPs in internal and external datasets
- Researching threats, vulnerabilities, and exploits to enhance monitoring and detection capabilities
- Partnering with the Incident Response (IR) teams to understand incidents and support technical analysis of malicious cyber events
- Documenting and presenting findings in comprehensive technical analysis reports
- Communicating effectively with business representatives, technology specialists, and vendors
- Assisting peer analysts in the production and dissemination of intelligence reports
- Contributing technical expertise and Cybersecurity perspectives to discussions regarding JPMC global technology infrastructure
Desired Qualifications
- Basic coding (scripting) experience (i.e. Python, C, JavaScript, VBScript, etc.)
- Familiarity with Cloud platforms (i.e. AWS, Azure, etc.) and Virtualization technologies (i.e VMWare)
- Experience with some of the following: SIEM, SOAR, OSINT, IDA Pro, Ghidra, BinaryNinja, Wireshark, Jupyter, SQL, YARA, AWS Lambda
- A firm belief in doing what's right and following ethical practices
- Foundational understanding of Forensics, Log Analysis, Incident Response and / or Threat and Fraud Intelligence
- Knowledge in Operating Systems (i.e. Windows, Linux, Mac, Mobile), processor architectures (i.e. x86, x64), and computer networking
- Strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically
Cyber Intelligence Associate - Malware Reverse Engineer employer: Jpmorgan Chase & Co.
Contact Detail:
Jpmorgan Chase & Co. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Intelligence Associate - Malware Reverse Engineer
✨Tip Number 1
Network like a pro! Attend cyber security meetups, webinars, or conferences to connect with industry professionals. We can’t stress enough how important it is to build relationships; you never know who might help you land that dream job!
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your malware analysis projects or any relevant coding work. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on your technical knowledge and practicing common interview questions. We recommend doing mock interviews with friends or mentors to boost your confidence and refine your answers.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are genuinely interested in joining our team!
We think you need these skills to ace Cyber Intelligence Associate - Malware Reverse Engineer
Some tips for your application 🫡
Show Your Curiosity: When writing your application, let your passion for cyber intelligence shine through! We want to see that insatiable curiosity you have for all things cyber. Share any personal projects or experiences that highlight your eagerness to learn and explore.
Tailor Your Skills: Make sure to align your skills with the job description. If you've got coding experience or familiarity with tools like Wireshark or Ghidra, mention them! We love seeing how your background fits into our team's needs.
Be Clear and Concise: While we appreciate detail, clarity is key! When documenting your experiences or presenting your findings, keep it straightforward. We want to understand your thought process without getting lost in jargon.
Apply Through Our Website: Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!
How to prepare for a job interview at Jpmorgan Chase & Co.
✨Know Your Malware
Dive deep into the world of malware analysis before your interview. Familiarise yourself with common malware types, reverse engineering techniques, and tools like IDA Pro or Ghidra. Being able to discuss specific examples of malware you've analysed or studied will show your genuine interest and expertise.
✨Brush Up on Coding Skills
Since basic coding experience is a must, make sure you're comfortable with scripting in languages like Python or JavaScript. Prepare to discuss any projects or scripts you've worked on that relate to automating processes or analysing data. This will demonstrate your technical capabilities and problem-solving skills.
✨Understand Cyber Tactics
Get familiar with cyberattack tactics, techniques, and procedures (TTPs). Be ready to explain how you would approach analysing a cyber incident or threat. Showing that you can think critically about these scenarios will impress the interviewers and highlight your analytical mindset.
✨Communicate Clearly
Strong communication skills are key in this role. Practice explaining complex technical concepts in simple terms, as you might need to present findings to non-technical stakeholders. Being able to articulate your thoughts clearly will set you apart and show that you can bridge the gap between technical and business discussions.