Cybersecurity Senior Incident Response Analyst

Cybersecurity Senior Incident Response Analyst

Full-Time 55000 - 65000 € / year (est.) No home office possible
Koitecc Solutions

At a Glance

  • Tasks: Join a global team to monitor and respond to cybersecurity incidents 24/7.
  • Company: JPMorgan Chase & Co., a leader in financial services with a commitment to security.
  • Benefits: Competitive salary, training opportunities, and a diverse, inclusive workplace.
  • Other info: Flexible shift patterns, including weekends, with excellent career growth potential.
  • Why this job: Protect over $18 trillion in assets while developing your cybersecurity skills.
  • Qualifications: 3+ years in information security, SOC analysis, and incident response required.

The predicted salary is between 55000 - 65000 € per year.

As a member of the team within the JPMorgan Chase & Co. Security Operations Center (SOC), you will fit into a global team that provides 24x7 monitoring and incident response, acting as the frontline for attacks against the firms' infrastructure. As a SOC analyst, your role will include triaging alerts using a security incident and event management (SIEM) solution, start-to-finish case investigation, threat hunting, file analysis, as well as getting involved in projects that aim to improve the capability of the team. You’ll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You’ll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you’ll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.

Qualifications

  • Minimum of 3 years of experience working in information security, with a focus on security operations center (SOC) analysis and incident response.
  • Understanding of TCP/IP networking, including knowledge of routing, switching, and network protocols such as HTTP(S), DNS, DHCP, SMTP, and FTP.
  • Familiarity with network security technologies such as firewalls, proxies, and VPNs along with email security technologies and protocols.
  • Knowledge of security threats, attack methodologies, and mitigation strategies (such as phishing, port scanning, web application attacks, DDoS, lateral movement).
  • Experience performing log analysis using SIEM tools and performing packet capture (PCAP) analysis.
  • Knowledge in Windows and Linux operating systems and how to investigate them for signs of compromise.
  • Experience with file analysis tools and understanding of malware analysis techniques, including dynamic and static analysis, to extract indicators, write reports, and implement mitigations.
  • Experience with cloud technologies and platforms, including knowledge of cloud security architecture and how an attacker can utilize these platforms.
  • Ability to demonstrate a structured, analytical approach to investigating alerts and/or indicators and documenting your findings in a manner that both peer and executive level colleagues can understand.
  • Appreciation of the wider roles of interconnecting and collaboration with cyber security teams (such as forensics, threat intelligence, penetration testing, vulnerability management, and red team).
  • Willing to work a shift pattern that includes weekend work.

Highly Desired

  • A degree in Computer Science, Information Security, or a related field.
  • Industry‑recognized security certifications, such as CompTIA Security+, CySA+, or CASP+; GIAC GSEC, GCIH, or GCFA; or ISC2 CISSP or CCSP.
  • Scripting knowledge (such as Python) including its application to cybersecurity use cases.
  • Financial sector experience.

We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs.

Cybersecurity Senior Incident Response Analyst employer: Koitecc Solutions

At JPMorgan Chase & Co., we pride ourselves on being an exceptional employer, offering a dynamic work culture that fosters collaboration and innovation within our Security Operations Center. Our commitment to employee growth is evident through access to ongoing training and industry conferences, empowering you to enhance your skills while contributing to the protection of significant financial assets. Join us in a role where your expertise will be valued, and enjoy the unique advantage of working in a diverse environment that prioritises inclusion and supports your professional journey.

Koitecc Solutions

Contact Detail:

Koitecc Solutions Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Cybersecurity Senior Incident Response Analyst

Tip Number 1

Network like a pro! Attend industry meetups, webinars, and conferences to connect with fellow cybersecurity enthusiasts. You never know who might have the inside scoop on job openings or can put in a good word for you.

Tip Number 2

Show off your skills! Create a personal project or contribute to open-source initiatives that showcase your incident response capabilities. This not only builds your portfolio but also demonstrates your passion for cybersecurity.

Tip Number 3

Tailor your approach! When reaching out to potential employers, mention specific projects or challenges they face and how your experience aligns with their needs. This shows you've done your homework and are genuinely interested.

Tip Number 4

Apply through our website! We love seeing candidates who take the initiative. Plus, it gives you a chance to highlight your unique skills and experiences directly to us, making it easier for us to see why you're a great fit.

We think you need these skills to ace Cybersecurity Senior Incident Response Analyst

Incident Response
Security Operations Centre (SOC) Analysis
Threat Hunting
File Analysis
Security Incident and Event Management (SIEM)
Log Analysis
Packet Capture (PCAP) Analysis

Some tips for your application 🫡

Tailor Your CV:Make sure your CV is tailored to the Cybersecurity Senior Incident Response Analyst role. Highlight your experience in SOC analysis, incident response, and any relevant certifications. We want to see how your skills match what we're looking for!

Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a great fit for our team. Don’t forget to mention any specific projects or experiences that relate to the job description.

Show Off Your Skills:In your application, be sure to showcase your technical skills, especially in areas like SIEM tools, log analysis, and network security. We love seeing candidates who can demonstrate their knowledge of attack methodologies and mitigation strategies!

Apply Through Our Website:We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you’ll be able to keep track of your application status. Plus, we love seeing applications come directly from our site!

How to prepare for a job interview at Koitecc Solutions

Know Your Tech Inside Out

Make sure you brush up on your knowledge of networking protocols and security technologies. Be ready to discuss how you’ve used SIEM tools for log analysis or how you’ve tackled specific incidents in the past. The more you can demonstrate your technical expertise, the better!

Showcase Your Problem-Solving Skills

Prepare to share examples of how you've approached threat hunting or incident response. Think about a time when you identified a gap in monitoring and how you addressed it. This will show your analytical skills and your proactive approach to cybersecurity.

Stay Current with Cyber Threats

Familiarise yourself with the latest attack methodologies and mitigation strategies. Being able to discuss recent threats or trends in cybersecurity will not only impress your interviewers but also show that you’re passionate about staying ahead in the field.

Communicate Clearly and Confidently

Practice explaining complex technical concepts in simple terms. You’ll need to communicate effectively with both peers and executives, so being able to articulate your findings clearly is crucial. Consider doing mock interviews to refine your communication skills.