At a Glance
- Tasks: Monitor and respond to cyber threats, conducting investigations and improving team capabilities.
- Company: Join JPMorgan Chase & Co., a leader in financial services with a commitment to security.
- Benefits: Competitive salary, training opportunities, and a diverse, inclusive work environment.
- Other info: Work in a dynamic team with excellent career growth and learning opportunities.
- Why this job: Protect over $18 trillion in assets while developing your cybersecurity skills.
- Qualifications: 3+ years in information security, SOC analysis, and incident response required.
The predicted salary is between 50000 - 70000 € per year.
As a member of the team within the JPMorgan Chase & Co. Security Operations Center (SOC), you will fit into a global team that provides 24x7 monitoring and incident response, acting as the frontline for attacks against the firms’ infrastructure. As a SOC analyst, your role will include triaging alerts using a security incident and event management (SIEM) solution, start-to-finish case investigation, threat hunting, file analysis, as well as getting involved in projects that aim to improve the capability of the team. You’ll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You’ll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you’ll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.
Qualifications
- Minimum of 3 years of experience working in information security, with a focus on security operations center (SOC) analysis and incident response.
- Understanding of networking TCP/IP networking, including knowledge of routing, switching, and network protocols such as HTTP(S), DNS, DHCP, SMTP, and FTP.
- Familiarity with network security technologies such as firewalls, proxies, and VPNs along with email security technologies and protocols.
- Knowledge of security threats, attack methodologies, and mitigation strategies (such as phishing, port scanning, web application attacks, DDoS, lateral movement).
- Experience performing log analysis using SIEM tools and performing packet capture (PCAP) analysis.
- Knowledge in Windows and Linux operating systems and how to investigate them for signs of compromise.
- Experience with file analysis tools and understanding of malware analysis techniques, including dynamic and static analysis, to extract indicators, write reports, and implement mitigations.
- Experience with cloud technologies and platforms, including knowledge of cloud security architecture and how an attacker can utilize these platforms.
- Ability to demonstrate a structured, analytical approach to investigating alerts and/or indicators and documenting your findings in a manner that both peer and executive level colleagues can understand.
- Appreciation of the wider roles of interconnecting and collaboration with cyber security teams (such as forensics, threat intelligence, penetration testing, vulnerability management, and red team).
- Willing to work a shift pattern that includes weekend work.
Highly Desired
- A degree in Computer Science, Information Security, or a related field.
- Industry-recognized security certifications, such as CompTIA Security+, CySA+, or CASP+; GIAC GSEC, GCIH, or GCFA; or ISC2 CISSP or CCSP.
- Scripting knowledge (such as Python) including its application to cybersecurity use cases.
- Financial sector experience.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs.
Cybersecurity Senior Incident Response Analyst employer: TwinThread
At JPMorgan Chase & Co., we pride ourselves on being an exceptional employer, offering a dynamic work culture that fosters collaboration and innovation within our Security Operations Center. Our commitment to employee growth is evident through continuous training opportunities and participation in industry conferences, ensuring that our team remains at the forefront of cybersecurity. Located in a vibrant city, we provide a supportive environment where diversity and inclusion are celebrated, making it a rewarding place for professionals dedicated to protecting vital assets.
StudySmarter Expert Advice🤫
We think this is how you could land Cybersecurity Senior Incident Response Analyst
✨Tip Number 1
Network, network, network! Get out there and connect with professionals in the cybersecurity field. Attend meetups, webinars, or conferences to meet potential employers and learn about job openings that might not be advertised.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your incident response projects, threat hunting investigations, or any relevant work you've done. This will give you an edge and demonstrate your hands-on experience to potential employers.
✨Tip Number 3
Don’t just apply for jobs; tailor your approach! Research the companies you're interested in and understand their security challenges. When you reach out, mention how your skills can help them tackle those specific issues.
✨Tip Number 4
Apply through our website! We’ve got loads of opportunities waiting for you. Plus, it’s a great way to ensure your application gets seen by the right people. Don’t miss out on your chance to join a fantastic team!
We think you need these skills to ace Cybersecurity Senior Incident Response Analyst
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Cybersecurity Senior Incident Response Analyst role. Highlight your experience in SOC analysis, incident response, and any relevant certifications. We want to see how your skills match what we're looking for!
Showcase Your Skills:In your application, don’t just list your skills—show us how you've used them! Whether it's threat hunting or log analysis, give us examples of your work that demonstrate your expertise in cybersecurity.
Be Clear and Concise:When writing your cover letter, keep it clear and concise. We appreciate straightforward communication, so get to the point while still showcasing your passion for cybersecurity and your fit for the team.
Apply Through Our Website:We encourage you to apply through our website for the best chance of being noticed. It’s the easiest way for us to track your application and ensure it gets into the right hands!
How to prepare for a job interview at TwinThread
✨Know Your Tech Inside Out
Make sure you brush up on your knowledge of networking protocols and security technologies. Be ready to discuss TCP/IP, firewalls, and SIEM tools in detail. The more familiar you are with these concepts, the more confident you'll feel during the interview.
✨Showcase Your Incident Response Skills
Prepare to share specific examples of past incidents you've handled. Highlight your analytical approach to triaging alerts and how you’ve contributed to improving team capabilities. Real-life scenarios will demonstrate your expertise and problem-solving skills.
✨Stay Updated on Cyber Threats
Familiarise yourself with the latest trends in cybersecurity threats and attack methodologies. Being able to discuss current threats like phishing or DDoS attacks will show that you're proactive and engaged in the field, which is crucial for a SOC analyst role.
✨Emphasise Collaboration and Communication
Since this role involves working closely with various cybersecurity teams, be prepared to talk about your experience collaborating with others. Highlight your ability to document findings clearly for both technical and non-technical audiences, as effective communication is key in this position.