Cyber Intelligence Vice President Senior Malware Analyst

JPMorganChase

Not Interested
Bookmark
Report This Job

profile Job Location:

Plano, TX - USA

profile Monthly Salary: $ 152000 - 260000
Posted on: Yesterday
Vacancies: 1 Vacancy

Job Summary

Description

Harness your expertise to shape robust cybersecurity strategies and safeguard critical assets.

Lead cybersecurity intelligence at a top firm safeguarding digital assets and enhancing threat detection and response capabilities. Harness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats.

As a Cybersecurity Intelligence Vice President at JPMorgan Chase within the Cybersecurity Technology and Controls you will play a critical role in safeguarding the firms digital assets and infrastructure from cyber threats. Responsible for identifying assessing and mitigating risks you will inform and influence control measures across the organization. Your expertise in analyzing complex issues and developing innovative solutions along with your ability to collaborate with diverse teams will be crucial in enhancing the firms security posture. As a subject matter expert you will contribute to strategic cybersecurity initiatives and continuously improve our threat detection and response capabilities. Your work significantly impacts the firms operations fiscal management public image employee morale and client relationships.

Job responsibilities

  • Implement proactive threat intelligence strategies using advanced analytics and emerging technologies to identify and mitigate risks.
  • Develop custom threat-hunting queries and rules for specific threat indicators in large data sets using data analysis tools or specialized languages.
  • Enhance threat detection and response capabilities staying current with cybersecurity trends sharing insights and implementing best practices.
  • Build and maintain strong relationships with stakeholders sharing threat intelligence and best practices to achieve operational goals and improve cybersecurity operations.
  • Conduct malware analysis and reverse engineeringof suspicious code.
  • Perform deep dive technical analysis of cyberattack tactics techniques and procedures (TTPs)
  • Develop signatures to identify malware families actor techniques and other noteworthy code sequences.
  • Automate malware analysis and intelligence gathering processes.
  • Hunt for novel samples indicators of compromise (IOCs) and actor TTPs in internal and external datasets.
  • Research threats vulnerabilities and exploits to enhance monitoring and detection capabilities.
  • Partner with the Incident Response (IR) teams to understand incidents and support technical analysis of malicious cyber events.

Required qualifications capabilities and skills

  • Formal training or certification on security concepts and 5 years of applied experience in cybersecurity focusing on threat intelligence analysis and mitigation.
  • Expertise in advanced threat hunting security research and Open-Source Intelligence (OSINT) for risk identification and assessment.
  • Proficiency in coding and scripting languages (C/C Python Bash JavaScript PowerShell) and experience with Security Information and Event Management (SIEM) tools (Splunk Elasticsearch) for automating threat detection and response.
  • Good hands on experience with Malware Analysis and Reverse Engineering.
  • Good experience with debuggers disassemblers and other malware analysis tools (i.e. IDA Pro Ghidra Sandboxes x64dbg WinDbg)
  • Knowledge in Operating Systems (i.e. Windows Linux Mac Mobile) processor architectures (i.e. x86 x64 ARM ARM64) and computer networking.
  • Good written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically.
  • Ability to coordinate work with and gain the trust of business stakeholders technical resources and third-party vendors.

Preferred qualifications capabilities and skills

  • Forensics Log Analysis Incident Response and / or Threat Intelligence.
  • Experience in developing both tactical and strategic tools and capabilities.
  • Threat hunting security research and Open-Source Intelligence (OSINT) for risk identification and assessment.



Required Experience:

Exec

DescriptionHarness your expertise to shape robust cybersecurity strategies and safeguard critical assets.Lead cybersecurity intelligence at a top firm safeguarding digital assets and enhancing threat detection and response capabilities. Harness your expertise to shape robust cybersecurity strategies...
View more view more

Key Skills

  • Business Development
  • Risk Management
  • Financial Services
  • Management Experience
  • Profit & Loss
  • Banking
  • Regulatory Reporting
  • Analysis Skills
  • Relationship Management
  • Financial Analysis
  • Leadership Experience
  • negotiation

About Company

Company Logo

JPMorganChase, one of the oldest financial institutions, offers innovative financial solutions to millions of consumers, small businesses and many of the world’s most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans ov ... View more

View Profile View Profile