At a Glance
- Tasks: Analyse malware, reverse engineer code, and hunt for cyber threats.
- Company: Join JPMC's cutting-edge Malware Analysis and Applied Discovery team.
- Benefits: Gain mentorship, develop skills, and work in a dynamic tech environment.
- Other info: Collaborative culture with opportunities for growth and learning.
- Why this job: Make a real impact in cybersecurity while working with innovative technologies.
- Qualifications: Basic coding skills and a passion for all things cyber.
The predicted salary is between 30000 - 40000 £ per year.
JPMC's Malware Analysis and Applied Discovery (MAAD) team is a highly technical team specializing in analyzing malware targeting the firm and organizations around the world, while expanding the firm's cyber monitoring capabilities into new and exciting areas. We're looking for a self-motivated junior analyst with an insatiable curiosity toward all things cyber to join our team. You'll spend a majority of your time designing, developing, and building innovative capabilities, while also hunting threats, investigating anomalies, and analyzing malware, with mentoring provided by senior members of our team.
Key Responsibilities:
- Conducting malware analysis and reverse engineering of suspicious code
- Performing deep dive technical analysis of cyberattack tactics, techniques, and procedures (TTPs)
- Developing signatures to identify malware families, actor techniques, and other noteworthy code sequences
- Automating malware analysis and intelligence gathering processes
- Hunting for novel samples, indicators of compromise (IOCs), and actor TTPs in internal and external datasets
- Researching threats, vulnerabilities, and exploits to enhance monitoring and detection capabilities
- Partnering with the Incident Response (IR) teams to understand incidents and support technical analysis of malicious cyber events
- Documenting and presenting findings in comprehensive technical analysis reports
- Communicating effectively with business representatives, technology specialists, and vendors
- Assisting peer analysts in the production and dissemination of intelligence reports
- Contributing technical expertise and Cybersecurity perspectives to discussions regarding JPMC global technology infrastructure
Desired Qualifications:
- Basic coding (scripting) experience (i.e. Python, C, JavaScript, VBScript, etc.)
- Familiarity with Cloud platforms (i.e. AWS, Azure, etc.) and Virtualization technologies (i.e VMWare)
- Experience with some of the following: SIEM, SOAR, OSINT, IDA Pro, Ghidra, BinaryNinja, Wireshark, Jupyter, SQL, YARA, AWS Lambda
- A firm belief in doing what's right and following ethical practices
- Foundational understanding of Forensics, Log Analysis, Incident Response and / or Threat and Fraud Intelligence
- Knowledge in Operating Systems (i.e. Windows, Linux, Mac, Mobile), processor architectures (i.e. x86, x64), and computer networking
- Strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically
Cyber Intelligence Associate - Malware Reverse Engineer in London employer: JPMorganChase
Contact Detail:
JPMorganChase Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Intelligence Associate - Malware Reverse Engineer in London
✨Tip Number 1
Network like a pro! Reach out to professionals in the cyber field on LinkedIn or at industry events. We can’t stress enough how valuable personal connections can be in landing that dream job.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your malware analysis projects or any relevant coding work. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on common technical questions related to malware analysis and reverse engineering. We recommend practicing with friends or using mock interview platforms to build your confidence.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace Cyber Intelligence Associate - Malware Reverse Engineer in London
Some tips for your application 🫡
Show Your Passion for Cyber: When writing your application, let your enthusiasm for all things cyber shine through! We want to see that insatiable curiosity you have for malware analysis and threat hunting. Share any personal projects or experiences that highlight your interest in the field.
Tailor Your Skills to the Role: Make sure to align your skills with the job description. If you've got coding experience or familiarity with tools like Wireshark or Ghidra, mention them! We love seeing how your background fits into our team's needs, so don’t hold back on showcasing your relevant expertise.
Be Clear and Concise: We appreciate a well-structured application. Keep your writing clear and to the point, especially when discussing your technical skills and experiences. Remember, we’re looking for strong communication skills, so make it easy for us to understand your qualifications!
Apply Through Our Website: Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it gives you a chance to explore more about our team and what we do at StudySmarter.
How to prepare for a job interview at JPMorganChase
✨Know Your Malware
Before the interview, brush up on your malware analysis skills. Familiarise yourself with common malware types and their behaviours. Being able to discuss specific examples of malware you've analysed or reverse-engineered will show your passion and expertise.
✨Show Off Your Coding Skills
Since basic coding experience is a must, be prepared to talk about your scripting projects. Whether it's Python, JavaScript, or any other language, have examples ready that demonstrate your ability to automate processes or analyse data. This will highlight your technical capabilities.
✨Understand Cyber Tactics
Dive deep into the tactics, techniques, and procedures (TTPs) used by cyber attackers. Be ready to discuss recent cyber incidents and how you would approach analysing them. This shows that you're not just technically savvy but also aware of the broader cyber landscape.
✨Communicate Clearly
Strong communication skills are key in this role. Practice explaining complex technical concepts in simple terms. You might be asked to present findings or collaborate with non-technical teams, so demonstrating your ability to communicate effectively will set you apart.