Cybersecurity Senior Incident Response Analyst in London

Cybersecurity Senior Incident Response Analyst in London

London Full-Time 50000 - 70000 € / year (est.) No home office possible
Koitecc Solutions

At a Glance

  • Tasks: Join a global team to monitor and respond to cybersecurity incidents 24/7.
  • Company: JPMorgan Chase & Co., a leader in financial services with a commitment to security.
  • Benefits: Competitive salary, training opportunities, and a diverse, inclusive workplace.
  • Other info: Dynamic role with opportunities for career growth and collaboration across teams.
  • Why this job: Protect over $18 trillion in assets while developing your cybersecurity skills.
  • Qualifications: 3+ years in information security, SOC analysis, and incident response required.

The predicted salary is between 50000 - 70000 € per year.

As a member of the team within the JPMorgan Chase & Co. Security Operations Center (SOC), you will fit into a global team that provides 24x7 monitoring and incident response, acting as the frontline for attacks against the firms' infrastructure. As a SOC analyst, your role will include:

  • Triage alerts using a security incident and event management (SIEM) solution
  • Start-to-finish case investigation
  • Threat hunting
  • File analysis
  • Involvement in projects that aim to improve the capability of the team

You’ll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You’ll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you’ll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.

Qualifications

  • Minimum of 3 years of experience working in information security, with a focus on security operations center (SOC) analysis and incident response.
  • Understanding of TCP/IP networking, including knowledge of routing, switching, and network protocols such as HTTP(S), DNS, DHCP, SMTP, and FTP.
  • Familiarity with network security technologies such as firewalls, proxies, and VPNs along with email security technologies and protocols.
  • Knowledge of security threats, attack methodologies, and mitigation strategies (such as phishing, port scanning, web application attacks, DDoS, lateral movement).
  • Experience performing log analysis using SIEM tools and performing packet capture (PCAP) analysis.
  • Knowledge in Windows and Linux operating systems and how to investigate them for signs of compromise.
  • Experience with file analysis tools and understanding of malware analysis techniques, including dynamic and static analysis, to extract indicators, write reports, and implement mitigations.
  • Experience with cloud technologies and platforms, including knowledge of cloud security architecture and how an attacker can utilise these platforms.
  • Ability to demonstrate a structured, analytical approach to investigating alerts and/or indicators and documenting your findings in a manner that both peer and executive level colleagues can understand.
  • Appreciation of the wider roles of interconnecting and collaboration with cyber security teams (such as forensics, threat intelligence, penetration testing, vulnerability management, and red team).
  • Willing to work a shift pattern that includes weekend work.

Highly Desired

  • A degree in Computer Science, Information Security, or a related field.
  • Industry‑recognized security certifications, such as CompTIA Security+, CySA+, or CASP+; GIAC GSEC, GCIH, or GCFA; or ISC2 CISSP or CCSP.
  • Scripting knowledge (such as Python) including its application to cybersecurity use cases.
  • Financial sector experience.

We recognise that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, colour, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs.

Cybersecurity Senior Incident Response Analyst in London employer: Koitecc Solutions

At JPMorgan Chase & Co., we pride ourselves on being an exceptional employer, offering a dynamic work culture that fosters collaboration and innovation within our Security Operations Center. Our commitment to employee growth is evident through access to ongoing training and industry conferences, empowering you to enhance your skills while contributing to the protection of significant financial assets. Join us in a role where your expertise will be valued, and enjoy the unique advantage of working in a diverse environment that champions inclusion and supports your professional journey.

Koitecc Solutions

Contact Detail:

Koitecc Solutions Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Cybersecurity Senior Incident Response Analyst in London

Tip Number 1

Network like a pro! Attend cybersecurity meetups, conferences, or even online webinars. The more people you know in the industry, the better your chances of landing that dream job.

Tip Number 2

Show off your skills! Create a portfolio showcasing your incident response projects, threat hunting investigations, or any cool scripts you've written. This will give potential employers a taste of what you can bring to their team.

Tip Number 3

Don’t just apply anywhere—apply through our website! We love seeing candidates who are genuinely interested in joining our team at StudySmarter. Tailor your application to highlight how your experience aligns with our needs.

Tip Number 4

Prepare for interviews by brushing up on common SOC scenarios and incident response techniques. Practice explaining your thought process clearly, as communication is key in this field. Remember, we want to see how you think!

We think you need these skills to ace Cybersecurity Senior Incident Response Analyst in London

Incident Response
Security Operations Centre (SOC) Analysis
Threat Hunting
Log Analysis using SIEM tools
Packet Capture (PCAP) Analysis
Networking TCP/IP
Network Security Technologies

Some tips for your application 🫡

Tailor Your CV:Make sure your CV is tailored to the Cybersecurity Senior Incident Response Analyst role. Highlight your experience in SOC analysis and incident response, and don’t forget to mention any relevant certifications or training you've completed.

Showcase Your Skills:In your application, showcase your skills in log analysis, threat hunting, and your understanding of networking protocols. Use specific examples from your past experiences to demonstrate how you’ve tackled similar challenges.

Be Clear and Concise:When writing your cover letter, be clear and concise. Explain why you’re passionate about cybersecurity and how your background makes you a great fit for the team. Remember, we want to see your personality shine through!

Apply Through Our Website:Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re serious about joining our team at StudySmarter.

How to prepare for a job interview at Koitecc Solutions

Know Your Stuff

Make sure you brush up on your knowledge of networking protocols and security technologies. Be ready to discuss how you've used SIEM tools in past roles, and have examples of incidents you've responded to. This will show that you’re not just familiar with the theory but have practical experience too.

Showcase Your Analytical Skills

Prepare to demonstrate your structured approach to investigating alerts. Think of a specific incident where you had to analyse logs or perform packet captures. Be ready to explain your thought process and how you documented your findings for both technical and non-technical audiences.

Stay Current with Threats

Familiarise yourself with the latest security threats and attack methodologies. Be prepared to discuss recent incidents in the cybersecurity landscape and how they could relate to the firm. This shows that you’re proactive and engaged with the industry.

Emphasise Collaboration

Highlight your experience working with other cybersecurity teams, like forensics or threat intelligence. Share examples of how collaboration has led to successful incident responses in your previous roles. This will demonstrate your understanding of the bigger picture in cybersecurity operations.