LOG IN
SIGN UP
Canary Wharfian - Online Investment Banking & Finance Community.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Canary Wharfian
OR continue with e-mail and password
E-mail address
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

Job Details

J.P. Morgan logo
Bulge Bracket Investment Banks

Security Operations [Multiple Positions Available]

at J.P. Morgan

ExperiencedNo visa sponsorship

Posted 14 days ago

No clicks

As a member of the Attack Analysis team, provide 24/7 monitoring and incident response, acting as the frontline for attacks against the firm's infrastructure. Perform advanced analysis, threat hunting, log and packet-level analysis, creation and tuning of SIEM alerts, and develop high-fidelity detections across tools such as Splunk, CrowdStrike, and Azure Sentinel. Lead and coach other analysts, run training and hunting exercises, and evaluate/integrate security technologies into the monitoring function. Requires scripting skills (Python, PowerShell, Bash) and experience with at least one cloud platform (AWS, Azure, or GCP).

Compensation
$190,300 – $260,000 USD

Currency: $ (USD)

City
New York City
Country
United States

Full Job Description

Location: New York, NY, United States

DESCRIPTION:

Duties: As a member of the Attack Analysis team, provide 24/7 monitoring and Incident response, acting as the frontline for attacks against the firms' infrastructure. Advanced analysis, threat hunting, evaluation of new security technology as well as ensuring larger technology projects at the company are ready to be integrated into the Attack Analysis team and monitoring function. Coach, mentor and work to bring up the technical expertise of the entire team, which includes running training sessions for the team in range or virtual environments, leading hunting exercises, serving as a technical escalation point and coaching the team through adopting monitoring responsibility.

QUALIFICATIONS:

Minimum education and experience required: Bachelor's degree in Computer Engineering, Computer Science, Computer Information Systems or related field of study plus two (2) years of experience in the job offered or as Security Operations, Associate, or related occupation.

Skills Required: This position requires experience with the following: creation and tuning of alerting rules from a SIEM and other devices in response to changing threats; Adversary Tactics, Technique, and Procedures (TTPs) and develop high fidelity detections in various tools and languages including: Splunk, CrowdStrike, Azure Sentinel, Suricata, and Snort; log analysis and correlation of large datasets from multiple data sources to identify and investigate attack patterns; threat hunting on an enterprise network both as an individual and leading hunting exercises; Perform packet-level analysis, common network protocols and the OSI model; Using scripting languages, Including Python, Powershell, and Bash to parse machine-generated data, interact with REST APIs and automate repetitive tasks. This position requires experience with at least one of the following cloud platform applications: AWS; Azure; GCP; or Infrastructure, security, or cloud APIs.

Job Location: 277 Park Ave, New York, NY 10172.

Full-Time. Salary:  $190,300 - $260,000 per year.

As a member of the Attack Analysis team, provide 24/7 monitoring and Incident response, acting as the frontline for attacks against...

Job Details

J.P. Morgan logo
Bulge Bracket Investment Banks

14 days ago

clicks

Security Operations [Multiple Positions Available]

at J.P. Morgan

ExperiencedNo visa sponsorship

$190,300 – $260,000

USD

City: New York City

Country: United States

As a member of the Attack Analysis team, provide 24/7 monitoring and incident response, acting as the frontline for attacks against the firm's infrastructure. Perform advanced analysis, threat hunting, log and packet-level analysis, creation and tuning of SIEM alerts, and develop high-fidelity detections across tools such as Splunk, CrowdStrike, and Azure Sentinel. Lead and coach other analysts, run training and hunting exercises, and evaluate/integrate security technologies into the monitoring function. Requires scripting skills (Python, PowerShell, Bash) and experience with at least one cloud platform (AWS, Azure, or GCP).

Full Job Description

Location: New York, NY, United States

DESCRIPTION:

Duties: As a member of the Attack Analysis team, provide 24/7 monitoring and Incident response, acting as the frontline for attacks against the firms' infrastructure. Advanced analysis, threat hunting, evaluation of new security technology as well as ensuring larger technology projects at the company are ready to be integrated into the Attack Analysis team and monitoring function. Coach, mentor and work to bring up the technical expertise of the entire team, which includes running training sessions for the team in range or virtual environments, leading hunting exercises, serving as a technical escalation point and coaching the team through adopting monitoring responsibility.

QUALIFICATIONS:

Minimum education and experience required: Bachelor's degree in Computer Engineering, Computer Science, Computer Information Systems or related field of study plus two (2) years of experience in the job offered or as Security Operations, Associate, or related occupation.

Skills Required: This position requires experience with the following: creation and tuning of alerting rules from a SIEM and other devices in response to changing threats; Adversary Tactics, Technique, and Procedures (TTPs) and develop high fidelity detections in various tools and languages including: Splunk, CrowdStrike, Azure Sentinel, Suricata, and Snort; log analysis and correlation of large datasets from multiple data sources to identify and investigate attack patterns; threat hunting on an enterprise network both as an individual and leading hunting exercises; Perform packet-level analysis, common network protocols and the OSI model; Using scripting languages, Including Python, Powershell, and Bash to parse machine-generated data, interact with REST APIs and automate repetitive tasks. This position requires experience with at least one of the following cloud platform applications: AWS; Azure; GCP; or Infrastructure, security, or cloud APIs.

Job Location: 277 Park Ave, New York, NY 10172.

Full-Time. Salary:  $190,300 - $260,000 per year.

As a member of the Attack Analysis team, provide 24/7 monitoring and Incident response, acting as the frontline for attacks against...