At a Glance
- Tasks: Monitor and respond to cyber threats, conducting investigations and improving team capabilities.
- Company: Join JPMorgan Chase & Co., a leader in financial services with a commitment to security.
- Benefits: Competitive salary, training opportunities, and a diverse, inclusive work environment.
- Other info: Work in a dynamic team with excellent career growth and collaboration opportunities.
- Why this job: Protect over $18 trillion in assets while developing your cybersecurity skills.
- Qualifications: 3+ years in information security, SOC analysis, and incident response required.
The predicted salary is between 55000 - 70000 € per year.
As a member of the team within the JPMorgan Chase & Co. Security Operations Center (SOC), you will fit into a global team that provides 24x7 monitoring and incident response, acting as the frontline for attacks against the firms’ infrastructure. As a SOC analyst, your role will include triaging alerts using a security incident and event management (SIEM) solution, start-to-finish case investigation, threat hunting, file analysis, as well as getting involved in projects that aim to improve the capability of the team. You’ll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You’ll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you’ll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.
Qualifications
- Minimum of 3 years of experience working in information security, with a focus on security operations center (SOC) analysis and incident response.
- Understanding of networking TCP/IP networking, including knowledge of routing, switching, and network protocols such as HTTP(S), DNS, DHCP, SMTP, and FTP.
- Familiarity with network security technologies such as firewalls, proxies, and VPNs along with email security technologies and protocols.
- Knowledge of security threats, attack methodologies, and mitigation strategies (such as phishing, port scanning, web application attacks, DDoS, lateral movement).
- Experience performing log analysis using SIEM tools and performing packet capture (PCAP) analysis.
- Knowledge in Windows and Linux operating systems and how to investigate them for signs of compromise.
- Experience with file analysis tools and understanding of malware analysis techniques, including dynamic and static analysis, to extract indicators, write reports, and implement mitigations.
- Experience with cloud technologies and platforms, including knowledge of cloud security architecture and how an attacker can utilize these platforms.
- Ability to demonstrate a structured, analytical approach to investigating alerts and/or indicators and documenting your findings in a manner that both peer and executive level colleagues can understand.
- Appreciation of the wider roles of interconnecting and collaboration with cyber security teams (such as forensics, threat intelligence, penetration testing, vulnerability management, and red team).
- Willing to work a shift pattern that includes weekend work.
Highly Desired
- A degree in Computer Science, Information Security, or a related field.
- Industry-recognized security certifications, such as CompTIA Security+, CySA+, or CASP+; GIAC GSEC, GCIH, or GCFA; or ISC2 CISSP or CCSP.
- Scripting knowledge (such as Python) including its application to cybersecurity use cases.
- Financial sector experience.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs.
Cybersecurity Senior Incident Response Analyst in London employer: TwinThread
At JPMorgan Chase & Co., we pride ourselves on being an exceptional employer, offering a dynamic work culture that fosters collaboration and innovation within our Security Operations Center. Our commitment to employee growth is evident through continuous training opportunities and participation in industry conferences, ensuring that our team remains at the forefront of cybersecurity. Located in a vibrant city, we provide a supportive environment where diverse talents thrive, making a meaningful impact in protecting significant assets every day.
StudySmarter Expert Advice🤫
We think this is how you could land Cybersecurity Senior Incident Response Analyst in London
✨Tip Number 1
Network, network, network! Get out there and connect with professionals in the cybersecurity field. Attend meetups, webinars, or conferences to meet potential employers and learn about job openings that might not be advertised.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your incident response projects, threat hunting investigations, or any relevant work you've done. This will give you an edge and demonstrate your hands-on experience to hiring managers.
✨Tip Number 3
Don’t just apply for jobs; tailor your approach! Research the company and its security operations. When you get an interview, mention specific threats or incidents relevant to their industry to show you’re genuinely interested and knowledgeable.
✨Tip Number 4
Apply through our website! We’ve got a range of opportunities waiting for you. Plus, it’s a great way to ensure your application gets seen by the right people in our team. Don’t miss out!
We think you need these skills to ace Cybersecurity Senior Incident Response Analyst in London
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Cybersecurity Senior Incident Response Analyst role. Highlight your experience in SOC analysis, incident response, and any relevant certifications. We want to see how your skills match what we're looking for!
Showcase Your Skills:In your application, don’t just list your skills—show us how you've used them! Whether it's threat hunting or log analysis, give us examples of your work that demonstrate your expertise in cybersecurity.
Be Clear and Concise:When writing your cover letter, keep it clear and concise. We appreciate straightforward communication, so get to the point while still showcasing your passion for cybersecurity and your fit for the team.
Apply Through Our Website:We encourage you to apply through our website for the best chance of being noticed. It’s the easiest way for us to track your application and ensure it gets into the right hands!
How to prepare for a job interview at TwinThread
✨Know Your Tech Inside Out
Make sure you brush up on your knowledge of networking protocols and security technologies. Be ready to discuss how you've used SIEM tools for log analysis and any experience you have with packet capture. This role is all about technical expertise, so show them you know your stuff!
✨Showcase Your Incident Response Skills
Prepare to share specific examples of past incidents you've handled. Talk about your approach to triaging alerts and conducting investigations. Highlight any successful threat hunting or mitigation strategies you've implemented, as this will demonstrate your hands-on experience.
✨Demonstrate Analytical Thinking
This position requires a structured, analytical approach to problem-solving. Be prepared to walk through your thought process when investigating alerts. Use clear, concise language that both technical and non-technical colleagues can understand, showcasing your ability to communicate effectively.
✨Stay Current with Cybersecurity Trends
Familiarise yourself with the latest threats and attack methodologies. Mention any recent conferences or training you've attended, and be ready to discuss how these experiences have shaped your understanding of cybersecurity. Showing that you're proactive about learning will impress your interviewers!