DescriptionHarness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats.
As a Cybersecurity Intelligence Vice President inCybersecurity and Technology Controls you will play a critical role in safeguarding the firms digital assets and infrastructure from cyber threats. Responsible for identifying assessing and mitigating risks you will inform and influence control measures across the organization. Your expertise in analyzing complex issues and developing innovative solutions along with your ability to collaborate with diverse teams will be crucial in enhancing the firms security posture. As a subject matter expert you will contribute to strategic cybersecurity initiatives and continuously improve our threat detection and response capabilities. Your work significantly impacts the firms operations fiscal management public image employee morale and client relationships.
Cybersecurity Operations Supplier Threat Intelligence and Incident Response (STIIR) team is responsible for identifying and assessing cyber threats to JPMCs third-party partners and supply chain and leads the firms incident response function when a JPMC third party experiences a cyber incident. As a Third Party Cyber Operations Specialist on the STIIR team you will be at the forefront of identifying and mitigating cyber threats to and from our third-party partners. Your work will directly contribute to the security and resilience of JPMCs extended enterprise.
Job responsibilities
- Enhance threat detection and response capabilities staying current with cybersecurity trends sharing insights and implementing best practices.
- Build and maintain strong relationships with stakeholders sharing threat intelligence and best practices to achieve operational goals and improve cybersecurity operations.
- Lead the engagement with engineering teams to transition and implement new systems and processes.
- Develop and deliver comprehensive reporting including regular and ad hoc reports based on the teams data.
- Establish and maintain metrics to support program objectives and performance evaluation.
- Document and standardize processes within organizational frameworks.
- Improve process management ensuring quality assurance and adherence to standard operating procedures.
- Build and enhance analytical capabilities to support data-driven decision-making.
- Analyze diverse data sets to uncover trends and opportunities.
- Manage the inventory of entities to monitor developing the tools policies and procedures required to do so.
- Consolidate complex information executive level briefings for leadership and other stakeholders.
Required qualifications capabilities and skills
- Obtain 5 years of experience in cybersecurity focusing on threat intelligence analysis and mitigation
- Expertise in advanced threat hunting security research and Open-Source Intelligence (OSINT) for risk identification and assessment
- Excellent leadership and project management skills with the ability to drive cross-functional initiatives.
- Excellent communication skills both written and verbal with the ability to engage with diverse stakeholders.
- Ability to work independently and collaboratively in a fast-paced environment.
- Strong Excel and PowerPoint skills.
- Strong problem-solving and analytical skills and attention to detail.
Preferred qualifications capabilities and skills
- Proficiency in scripting languages (Python Bash JavaScript PowerShell) and experience with Security Information and Event Management (SIEM) tools (Splunk Elasticsearch) for automating threat detection and response
- Hold relevant certifications (e.g. CISSP CISM PMP) are a plus.
- Experience in Vulnerability Management Incident Response and/or Governance Risk and Compliance (GRC).
- Knowledge of MITRE ATT&CK framework and/or threat modeling
- Experience working on third party related issues.
- Experience coding or advanced data manipulation experience is a benefit.
- Experience in statistical analysis and business intelligence
#CTC
Required Experience:
Exec
DescriptionHarness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats.As a Cybersecurity Intelligence Vice President inCybersecurity and Technology Controls you will ...
DescriptionHarness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats.
As a Cybersecurity Intelligence Vice President inCybersecurity and Technology Controls you will play a critical role in safeguarding the firms digital assets and infrastructure from cyber threats. Responsible for identifying assessing and mitigating risks you will inform and influence control measures across the organization. Your expertise in analyzing complex issues and developing innovative solutions along with your ability to collaborate with diverse teams will be crucial in enhancing the firms security posture. As a subject matter expert you will contribute to strategic cybersecurity initiatives and continuously improve our threat detection and response capabilities. Your work significantly impacts the firms operations fiscal management public image employee morale and client relationships.
Cybersecurity Operations Supplier Threat Intelligence and Incident Response (STIIR) team is responsible for identifying and assessing cyber threats to JPMCs third-party partners and supply chain and leads the firms incident response function when a JPMC third party experiences a cyber incident. As a Third Party Cyber Operations Specialist on the STIIR team you will be at the forefront of identifying and mitigating cyber threats to and from our third-party partners. Your work will directly contribute to the security and resilience of JPMCs extended enterprise.
Job responsibilities
- Enhance threat detection and response capabilities staying current with cybersecurity trends sharing insights and implementing best practices.
- Build and maintain strong relationships with stakeholders sharing threat intelligence and best practices to achieve operational goals and improve cybersecurity operations.
- Lead the engagement with engineering teams to transition and implement new systems and processes.
- Develop and deliver comprehensive reporting including regular and ad hoc reports based on the teams data.
- Establish and maintain metrics to support program objectives and performance evaluation.
- Document and standardize processes within organizational frameworks.
- Improve process management ensuring quality assurance and adherence to standard operating procedures.
- Build and enhance analytical capabilities to support data-driven decision-making.
- Analyze diverse data sets to uncover trends and opportunities.
- Manage the inventory of entities to monitor developing the tools policies and procedures required to do so.
- Consolidate complex information executive level briefings for leadership and other stakeholders.
Required qualifications capabilities and skills
- Obtain 5 years of experience in cybersecurity focusing on threat intelligence analysis and mitigation
- Expertise in advanced threat hunting security research and Open-Source Intelligence (OSINT) for risk identification and assessment
- Excellent leadership and project management skills with the ability to drive cross-functional initiatives.
- Excellent communication skills both written and verbal with the ability to engage with diverse stakeholders.
- Ability to work independently and collaboratively in a fast-paced environment.
- Strong Excel and PowerPoint skills.
- Strong problem-solving and analytical skills and attention to detail.
Preferred qualifications capabilities and skills
- Proficiency in scripting languages (Python Bash JavaScript PowerShell) and experience with Security Information and Event Management (SIEM) tools (Splunk Elasticsearch) for automating threat detection and response
- Hold relevant certifications (e.g. CISSP CISM PMP) are a plus.
- Experience in Vulnerability Management Incident Response and/or Governance Risk and Compliance (GRC).
- Knowledge of MITRE ATT&CK framework and/or threat modeling
- Experience working on third party related issues.
- Experience coding or advanced data manipulation experience is a benefit.
- Experience in statistical analysis and business intelligence
#CTC
Required Experience:
Exec
View more
View less