Security Operations Senior Associate, Cybersecurity Operations

Singapore

JPMorgan Chase & Co.

View company page

Seize the opportunity to enhance cybersecurity, utilizing your skills in threat analysis and incident response to protect vital data and systems.

As a Security Operations Senior Associate in Acquisition Cybersecurity Team, you will play an important role in safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Drawing on your knowledge of security principles, practices, and theories, you will collaborate with cross-functional teams to develop a coordinated approach to security and educate employees on best practices, policies, and procedures. Your work will have a direct impact on departmental outcomes, as you plan and ensure progress, identify gaps in information, and conduct analyses to solve complex cybersecurity problems. By utilizing your advanced analytical, technical, and problem-solving skills, you will contribute to the continuous improvement of our cybersecurity posture and help maintain the integrity, confidentiality, and availability of sensitive data and systems.

Job responsibilities

  • Monitor and analyze security infrastructure, contributing to detection and response to threats, vulnerabilities, and incidents to ensure the integrity, confidentiality, and availability of sensitive data and systems
  • Conduct in-depth security investigations, analyzing logs, network traffic, and other data sources to identify root causes, assess impact, and gather evidence for response and mitigation actions
  • Develop and maintain threat detection and response playbooks, incorporating industry best practices, regulatory requirements, and lessons learned from previous incidents
  • Collaborate with cross-functional teams to develop and implement coordinated security strategies, policies, and procedures, while educating employees on best practices
  • Review intelligence sources and provide actionable information regarding threats and vulnerabilities to JPMC acquisitions
  • Identify gaps in security controls and articulate the corresponding risk to senior leaders and other stakeholders

Required qualifications, capabilities, and skills

  • Bachelor’s degree or equivalent in computer science or related fields
  • 3+ years of experience in cybersecurity operations, including threat detection, incident response, and vulnerability management
  • Demonstrated experience in Windows and/or Linux operating systems (OS), network traffic analysis, log analysis, vulnerability analysis, exploitation, and security investigation techniques to identify and respond to security incidents
  • Possesses critical thinking skills and able to take a structured, analytical approach to investigating alerts and indicators of compromise (IOCs)
  • Understanding how adversaries compromise networks including phishing, port-scanning, web application, distributed denial-of-service (DDoS) attacks, and lateral movement
  • Ability to extract IOCs, report findings, and implement mitigatory measures
  • Able to adapt to new and unfamiliar environments
  • Advanced knowledge of security protocols, cryptography, authentication, authorization, and security architecture design principles
  • Proficiency in scripting to automate tasks, implement controls, and manipulate data
  • Possesses good communication skills and able to articulate cybersecurity related risks and findings to a wide audience 
  • Willing to work a scheduled shift pattern that includes one day of the weekend every two weeks or as required. The shift pattern will also require analysts to work up to ten hours a day for four days a week or eight hours a day for five days a week

Preferred qualifications, capabilities, and skills

  • Knowledge of a range of cybersecurity tools.
  • Experience with Extended Detection & Response (XDR) tools.
  • Experience with crafting regular expressions (regex).
  • Experience reviewing vulnerabilities and the effectiveness of the mitigatory measures.
  • A basic understanding of cloud architecture and an understanding of how attackers leverage these platforms.
  • Knowledge of scripting languages like Python, PowerShell, and JavaScript and understanding how scripting languages are used in a cybersecurity context.
  • The ability to manage fluctuating workloads and conflicting priorities.

J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world’s most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.
   We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Cloud Computer Science Cryptography DDoS Incident response JavaScript Linux Log analysis PowerShell Python Scripting Threat detection Vulnerabilities Vulnerability management Windows XDR

Region: Asia/Pacific
Country: Singapore
Job stats:  7  2  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.