Job Search and Career Advice Platform

Enable job alerts via email!

Senior Cybersecurity Incident Response Analyst

JP Morgan

City Of London

On-site

GBP 50,000 - 70,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading financial services firm in London is seeking a SOC Analyst to join their team. This role is pivotal for providing 24/7 monitoring and incident response to protect over $18 trillion of assets. Key responsibilities include investigating alerts, collaborating across Cyber Security teams, and continuous improvement of processes. Applicants should possess strong knowledge of network fundamentals, threat actor methodologies, and log analysis skills, along with a willingness to work shifts including weekends.

Qualifications

  • Good level of knowledge in network fundamentals like OSI Stack.
  • Experience or demonstrable knowledge in log and PCAP analysis.
  • Basic understanding of Cloud architecture and attack vectors.

Responsibilities

  • Monitor alerts triggered from in-house bespoke signatures.
  • Conduct investigations into alerts and indicators.
  • Collaborate with interconnecting Cyber Security teams.

Skills

Network fundamentals knowledge
Understanding of threat actor approaches
Log analysis experience
Windows/Linux investigation knowledge
File analysis understanding
Basic Cloud architecture knowledge
Scripting knowledge
Documentation skills
Cyber Security collaboration appreciation
Willingness to work shifts
Job description

As a member of the SOC team within the JPMorgan Chase & Co. SOC, you will fit into a global team providing 24/7 monitoring and Incident Response, acting as the frontline for attacks against the firms' infrastructure. As a SOC analyst, your role will include monitoring alerts triggered from in-house bespoke signatures in a SIEM, start to finish case investigation, threat hunting, file analysis, as well as getting involved in projects that aim to improve the capability of the team. You'll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You'll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you'll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.

This role requires a wide variety of strengths and capabilities, including:

  • Good level of knowledge in network fundamentals, for example; OSI Stack, TCP/IP, DNS, HTTP(S), SMTP
  • Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement
  • Experience or demonstrable knowledge in log analysis and PCAP analysis
  • Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise
  • Foundational understanding of file analysis; extracting indicators, providing a report, implementing mitigations
  • Basic understanding for Cloud architecture and how an attacker can utilize these platforms
  • Foundational level of scripting knowledge is desirable
  • Ability to demonstrate the right approach to investigating alerts and/or indicators and document your findings in a manner that both peer and executive level colleagues can understand
  • Appreciation of the wider roles of interconnecting Cyber Security teams and collaboration with each of those (i.e. Forensics / Threat Intelligence / Penetration Testing / Vulnerability Management / Purple Teaming etc)
  • Willing to work a shift pattern that includes weekend work every four weeks
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.