Wilmington, DE, USA
5 days ago
Cyber Intelligence Senior Associate

Join our elite Cybersecurity Intelligence team and be at the forefront of innovative security strategies. In this dynamic role, you'll harness cutting-edge technology and intelligence to protect our digital landscape, making a real-world impact on global cybersecurity. Your expertise will shape the future of secure digital operations, safeguarding critical assets and fortifying our cyber defenses.

As a Cybersecurity Intelligence Senior Associate in Cybersecurity Technology & Controls, you will be an integral member of a team that safeguards the firm's digital assets and infrastructure from cyber threats. Utilizing your extensive knowledge of cybersecurity, you will proactively identify and assess global and industry-specific attack vectors, emerging trends, and potential risks. Your expertise in threat assessment, intelligence analysis, and security research are vital for providing insights and recommendations to enhance the firm's security posture and protect its clients. By collaborating with cross-functional teams and deeply analyzing the threat landscape, your insights will inform and shape JPMorgan Chase's cybersecurity strategy.

Cybersecurity Operations’ Supplier Threat Intelligence and Incident Response (STIIR) team is responsible for identifying and assessing cyber threats to JPMC’s third-party partners and supply chain and leads the firm’s incident response function when a JPMC third party experiences a cyber incident.  As a Third Party Cyber Operations Specialist on the STIIR team, you will be at the forefront of identifying and mitigating cyber threats to and from our third-party partners. Your work will directly contribute to the security and resilience of JPMC's extended enterprise.

Job responsibilities

Proactively monitor and analyze global cyber threats, using intelligence sources and advanced analytical techniques to identify risks to the firm’s systems, data, and clientsPerform in-depth security research and threat hunting, including log analysis, using Security Information and Event Management (SIEM) tools for log aggregation and correlation, and network traffic analysis to identify malicious activities or abnormal data flowsConduct risk assessments to identify vulnerabilities, apply techniques to detect fraud, and develop strategies to mitigate fraud risks within the organization and systemsEngage with engineering teams to transition and implement new systems and processes.Develop and deliver comprehensive reporting, including regular and ad hoc reports, based on the team’s data.Maintain metrics to support program objectives and performance evaluation.Improve process management, ensuring quality assurance and adherence to standard operating procedures.Document and standardize processes within organizational frameworks.Build and enhance analytical capabilities to support data-driven decision-making.Analyze diverse data sets to uncover trends and opportunities.

Required qualifications, capabilities, and skills

Obtain 3+ years of experience in cybersecurity intelligence, threat assessment, or security research, focusing on cyber threat identificationProficiency in scripting languages (Python, Bash, JavaScript, PowerShell) and experience in automating threat detection, analysis, and responseDemonstrated ability in analyzing Open-Source Intelligence (OSINT) and utilizing advanced analytical techniques to identify emerging threats and trendsStrong knowledge of security architecture and design, with experience in operational-level security solutions and risk mitigation strategiesExcellent communication skills, both written and verbal, with the ability to engage with diverse stakeholders.Ability to work independently and collaboratively in a fast-paced environment.Strong Excel and PowerPoint skills.Strong problem-solving and analytical skills and attention to detail.
Confirm your E-mail: Send Email