J.P. Morgan

Cybersecurity Threat Intelligence Analyst


PayCompetitive
LocationNew York/New York
Employment typeFull-Time

This job is now closed

  • Job Description

      Req#: 210450287

      The Cybersecurity Intelligence Group (CIG) holds the global mandate for JPMC’s cyber intelligence collection, analysis, and dissemination of finished products to the firm’s Cybersecurity & Technology Controls teams, lines of business, and overall executive decision makers. This team is responsible for tracking threats and incidents targeting the firm and also involving the firm’s third party suppliers, subsidiaries, and key clients to address events such as intrusions, malware, DDoS, unauthorized access, insider attacks, and loss of proprietary information. This includes developing a deep understanding of global threat actors and their tactics, techniques, and procedures employed during cyber attacks. The work is varied, so the requirements of the role are multifaceted. Experience in cybersecurity, security controls, Internet technology, networking, and current affairs is a prerequisite, as is the ability to articulate complex information with clarity and brevity.

      The responsibilities for this position include, but are not limited to:

      • Maintaining a forward-looking view of the cyber threat landscape as it relates to JPMC and the wider financial sector, predicting shifts in adversarial intent, goals, and strategic objectives.
      • Contributing to and delivering regular written and verbal briefings for global cybersecurity and LOB partners.
      • Providing detailed analysis of cyber events and their relevance to JPMC or the wider financial sector.
      • Collaborating with teams across cybersecurity operations to augment investigations into complex cybersecurity events.
      • Maintaining detailed threat actor profiles on adversaries of interest to the firm, covering their tactics, techniques and procedures, motivations, goals and strategic objectives.
      • Lead deep-dive intelligence analysis of suspicious activity and attempted attacks.

      This role requires the following essential qualifications and capabilities:

      • Bachelor's Degree in Computer Science, Cybersecurity, or similar work experience in a related field.
      • Excellent communication skills, with the ability to articulate complex threat information to technical and non-technical audiences, both verbally and in writing
      • Demonstrated understanding of the vulnerability landscape and how it impacts the overall cyber threat landscape
      • An understanding in current affairs and international relations, evidenced by an understanding of geopolitical dynamics as they relate to state-sponsored intelligence operations.
      • An understanding of the intelligence cycle, analysis methodologies, and processes.
      • An understanding of computer networking concepts, the OSI model and underlying network protocols (e.g., TCP/IP), network traffic analysis, packet and protocol analysis (packet capture and netflow analytics).
      • An understanding of the MITRE ATT&CK Framework, stages of an attack and sub-techniques. Primarily sub-techniques associated with initial access, network communications, or deployment of malware.
        • Experience with threat intelligence techniques and processes in an enterprise level organization
        • General knowledge of global cyber threats, threat actors and the tactics, techniques, and procedures used by cyber adversaries
      • Working knowledge of basic programming languages or database management systems, examples being:
        • Python Scripting
        • RESTful API use
        • Publish Subscribe model messaging
        • JSON (use and manipulation)
        • HTML/CSS
        • Javascript
        • ElasticSearch
      • Understanding of Threat Intelligence platform, SOAR platform, and workflow orchestration tools
      • Specialist training or skills in one or more of the following:
        • Signals Intelligence (SIGINT) analysis
        • Open Source Intelligence (OSINT) gathering and/or analysis
        • Social Media Intelligence (SMI/SOCMINT) gathering and/or analysis
        • Human Intelligence (HUMINT) analysis

      Highly Desirable:

      • Intelligence community experience, or comparable private sector experience.
      • Financial sector experience.
      • Industry certifications related to Pen Testing, Forensics, Networking or Security
  • About the company

      J.P. Morgan is a leader in financial services, offering solutions to clients in more than 100 countries with one of the most comprehensive global product platforms available. We have been helping our clients to do business and manage their wealth for more than 200 years. Our business has been built upon our core principle of putting our clients'​ interests first.

Notice

Talentify is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status.

Talentify provides reasonable accommodations to qualified applicants with disabilities, including disabled veterans. Request assistance at accessibility@talentify.io or 407-000-0000.

Federal law requires every new hire to complete Form I-9 and present proof of identity and U.S. work eligibility.

An Automated Employment Decision Tool (AEDT) will score your job-related skills and responses. Bias-audit & data-use details: www.talentify.io/bias-audit-report. NYC applicants may request an alternative process or accommodation at aedt@talentify.io or 407-000-0000.