OH, United States
20 hours ago
Security Operations Senior Associate - Networking

         Seize the opportunity to enhance cybersecurity, utilizing your skills in threat analysis and incident response to protect vital data and systems.

As a Security Operations Senior Associate at JPMorgan Chase within the Cybersecurity Technology and Controls, you will play an important role in safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Drawing on your knowledge of security principles, practices, and theories, you will collaborate with cross-functional teams to develop a coordinated approach to security and educate employees on best practices, policies, and procedures. Your work will have a direct impact on departmental outcomes, as you plan and ensure progress, identify gaps in information, and conduct analyses to solve complex cybersecurity problems. By utilizing your advanced analytical, technical, and problem-solving skills, you will contribute to the continuous improvement of our cybersecurity posture and help maintain the integrity, confidentiality, and availability of sensitive data and systems.

Working in cybersecurity takes passion for technology, speed, a desire to learn, and vigilance in order to keep every asset safe. You’ll be on the front lines of innovation, working with a highly motivated team focused on analyzing, designing, developing and delivering solutions built to stop adversaries and strengthen our operations. Your research and work will ensure stability, capacity, and resiliency of our products. Working with your internal team, as well as technologists and innovators across our global network, your ability to identify threats, provide intelligent analysis, and positive actions will stop crimes and strengthen our data.

 Job responsibilities

 

Monitor and analyze security infrastructure, contributing to detection and response to threats, vulnerabilities, and incidents to ensure the integrity, confidentiality, and availability of sensitive data and systems.Conduct in-depth security investigations, analyzing logs, network traffic, and other data sources to identify root causes, assess impact, and gather evidence for response and mitigation actions.Develop and maintain threat detection and response playbooks, incorporating industry best practices, regulatory requirements, and lessons learned from previous incidents.Collaborate with cross-functional teams to develop and implement coordinated security strategies, policies, and procedures, while educating employees on best practices.

 

Required qualifications, capabilities, and skills

 

Formal training or certification on security concepts and 3+ years of applied experience.General knowledge of cybersecurity organization practices, operations, risk management processes, principles, architectural requirements, engineering and threats and vulnerabilities, including incident response methodologiesDemonstrated experience in network traffic analysis, log analysis, vulnerability analysis, exploitation, and security investigation techniques to identify and respond to security incidents.Proficient in scripting to automate tasks, implement controls, and manipulate data.Working knowledge of security protocols, cryptography, authentication, authorization, and security architecture design principles.Proficient in the use of skills tools, staying current with skills, participating in multiple forums.Hands on practical experience of network concepts such as routing, switching, subnetting, and network topologies and ability to identify and mitigate network vulnerabilities and threats.Working knowledge of network protocols (TCP/IP, HTTP, HTTPS, DNS, DHCP).Experience in analyzing vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence.Experience of computer forensics, legal, government and jurisprudence as they relate to cybersecurity, operating systems, and methods for intelligence gathering and sharing.Experience in cloud computing, computer network defense, external organizations and academic institutions dealing with cybersecurity issues, financial authorities and regulations, identity management, incident management, information assurance, information management, information systems and network security and infrastructure design.

 

Preferred qualifications, capabilities, and skills

 

Exposure of OSI model and its layers, including how data flows through each layer.Cloud service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid).Meticulous attention to detail to ensure network security and integrity.Certifications such as CCNA, CySA+.
Confirm your E-mail: Send Email