Lead Security Engineer - Cybersecurity Endpoint Detection and Response
at JPMorganChase
BB7, , United Kingdom -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 19 Jan, 2025 | Not Specified | 19 Oct, 2024 | N/A | Powershell,Computer Science,Automation,Python,Bash,Software Lifecycle,Google Cloud Platform,Linux,Aws,Puppet,Programming Languages,Design,Macos,Windows,Amazon Web Services,Kubernetes,Ansible,Storage | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
JOB DESCRIPTION
Take on a crucial role where you’ll be a key part of a high-performing team delivering secure software solutions. Make a real impact as you help shape the future of software security at one of the world’s largest and most influential companies.
As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity & Tech Controls, you are an integral part of team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions.
REQUIRED QUALIFICATIONS, CAPABILITIES, AND SKILLS
- Bachelor’s Degree in Computer Science or equivalent
- Formal training or certification on Security Engineering concepts and applied experience
- Provide technical expertise throughout the software lifecycle, including design, implementation, and delivery.
- Strong understanding and experience in orchestration and deployment automation platforms such as SCCM, Ansible, Chef, Puppet, or similar.
- Strong understanding and experience in cybersecurity endpoint security and vulnerability management domains.
- Strong understanding and experience in one or more of the following - public cloud platforms such as Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure compute, network, storage, monitoring, automation, orchestration services, virtualization technologies, containerization technologies such as Kubernetes and VMware Tanzu, or serverless technologies such as AWS Step Functions and Lambda.
- Software development experience in general-purpose programming languages such as Python, PowerShell, bash, or Go, APIs.
- Understanding and experience in Agile and Lean methodologies.
- Strong critical-thinking and problem-solving skills with clear and inclusive communication style.Ability to collaborate with different roles and personas across lines of businesses to achieve common goals.
PREFERRED QUALIFICATIONS, CAPABILITIES, AND SKILLS
- Experience effectively communicating with senior business leaders
- Experience in enterprise deployment platforms and deploying at scale to Windows, Linux, or macOS environments is an advantage.
- Experience with products such as CrowdStrike Falcon Platform and Palo Alto Cortex XDR is a strong advantage.
ABOUT US
J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world’s most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
Responsibilities:
- Bring your cutting-edge ideas to life as part of a success-driven team that values your deep technical expertise and innovative thinking.
- Work closely with diverse Engineering, Operations, and Support teams within Enterprise Technology and other Lines of Business (LoBs) to understand target platforms and their engineering and deployment processes.
- Enable the Cyber Security Operations Center (SOC) and Attack Analysis teams to detect and prevent sophisticated malicious and suspicious activities on the firm’s digital assets.
- Assist Cyber Security Vulnerability Management Ops teams in assessing the impact of new and zero-day vulnerabilities on the firm’s assets.
- Collaborate with Cyber Security Threat Intel teams to correlate advanced threat intel with security controls on endpoints, facilitating threat-based prioritization of remediating vulnerabilities and weaknesses.
- Enable Digital Forensics Incident Response teams in performing forensics on digital assets in response to cyber incidents by providing crucial logs/telemetry data, asset containment as well as automated and orchestrated response actions at scale through the EDR platforms.
- Work closely with Windows, Linux, Mac, and Public and Private Cloud platform engineering teams to integrate EDR solutions into base images.
- Providing SME consultancy and RFI support in regional audit and regulatory RFI responses.
- Conduct thorough investigations requiring deep technical understanding of the product and the environment it is deployed to, working with Platform Operate and Support teams, as well as vendor tech support teams, to identify and resolve complex issues on target endpoints.
- Engage in Proof of Concepts (PoCs) to evaluate additional capabilities, complementing the continuous expansion and evolution of the Endpoint Detection & Response strategy.
- Contribute to a team culture of diversity, equity, inclusion, and respect. Mentor and guide junior team members, helping them develop their technical skills and grow in their careers.
REQUIREMENT SUMMARY
Min:N/AMax:5.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Software Engineering
Graduate
Computer science or equivalent
Proficient
1
Bournemouth BH7 7DA, United Kingdom