JPMorgan Chase Threat Intelligence Engineer - Cyber Security Engineer in Jersey City, New Jersey

The Threat Intelligence section of the Cybersecurity Operations Team is responsible for intelligence collection, analysis, and dissemination of finished products to JPMorgan Chase's population of security operations teams, information technology teams, information technology risk teams, and overall executive decision makers. The Intelligence team is also required to identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities and engage with peer groups and information security circles to review cyber threats and the development of global cyber policy. This role also participates in the development of processes, tools, & strategy to facilitate these activities.

Team Focus:

  • Develop and deploy tools to support Threat Intelligence collection and tracking

  • Develop tools to support malware analysis

  • Integration with network defense systems and external data feeds

  • Integration of data analysis tools

  • Automation of team processes

  • Secure and fault tolerant implementations

Responsibilities:

  • As a Threat Intelligence Engineer – Senior Cyber Security Engineer you will be responsible for:

  • System lifecycle planning for new and existing systems

  • Fault tolerant system design

  • Understanding of common network infrastructure and the ability to communicate the impact resulting from system dependencies

  • Planning for vulnerabilities in systems by providing risk assessments and mitigating controls

  • Performing unit testing and system integration testing of newly-developed functionality

  • Design, develop, test and implementation of workflow applications. Work within Cyber Security Engineering, in partnership with the firm’s Architecture, Security Operations and Lines of businesses, in a hands-on environment

  • Development and deployment of automated intelligence ingestion with scripting and API integration

  • Support the on-boarding and maintenance of external intelligence feeds

  • Correlate internal data sets with external sources to enrich intelligence

  • Identify opportunities for automation and implement solutions to increase efficiency

  • Interact daily with key staff members to generate technology requirements, use cases, and understand business imperatives

  • Manage Threat Intelligence’s product implementation pipeline

  • Drive completion against the Threat Intelligence technology roadmap

  • Escalate and brief senior management on issues affecting technology delivery

  • Communicate effectively with representatives of the Lines of Business, technology specialists, and vendors

Qualifications:

  • 7+ years of technology experience

  • 5+ years working in an Information Security, Cyber, or Intelligence job function

  • 5+ years of experience in a large, mission-critical environment

  • Experience in designing, testing, and maintaining database repositories or similar solutions fed by multiple work streams and scrubbing processes

  • Prior experience with NoSQL data stores and big data technologies, e.g. MapReduce, Hadoop

  • Working knowledge of MITRE's Structured Threat Information eXpression (STIX) cyber threat information language and Trusted Automated eXchange of Indicator Information (TAXII) transport mechanism

  • Proficient in programming in Python and the creation of shell scripts (BASH)

  • Skilled with both Microsoft Windows & UNIX/Linux

  • Capable of communicating technical issues to technical and non-technical business representatives

  • Ability to balance multiple demands in a fast-paced growing environment

  • A dedicated and self-driven desire to think creatively and produce results

  • Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third party vendors

  • Bachelor's Degree in Computer Science or related field, or equivalent experience

  • Cloud utilization, management, and security hardening experience

  • Proven history of delivering successful technology capabilities

  • Experience of the financial industry

  • Knowledge of Threat Intelligence Platforms, Link Analysis Tools

  • CISSP certification a plus

High Security Access (HSA):

This position is anticipated to require the use of one or more High Security Access (HSA) systems. Users of these systems are subject to enhanced screening which includes both criminal and credit background checks, and/or other enhanced screening at the time of accepting the position and on an annual basis thereafter. The enhanced screening will need to be successfully completed prior to commencing employment or assignment.

Cyber @ JPMC:

Cyber Security is chartered with managing and directing the security programs focused on the discipline of cyber security design, implementation, analytics, threats, monitoring, response, and investigation across the organization. Our core services are focused on assuring the security of the computing environment, protect customer and employee confidential information, and comply with regulatory requirements globally. This is accomplished through strong information risk governance, active collaboration with business risk managers, and providing high quality security solutions and services which enable improving the organization's overall risk posture.

JPMC:

JPMorgan Chase & Co. (NYSE: JPM) is a leading global financial services firm with assets of $2 trillion and operations in more than 60 countries. The firm is a leader in investment banking, financial services for consumers, small business and commercial banking, financial transaction processing, asset management, and private equity.

JPMorgan Chase is an equal opportunity and affirmative action employer M/F/Disability/Veteran.

JPMorgan Chase is an equal opportunity and affirmative action employer Disability/Veteran.