Enable job alerts via email!

Senior Cybersecurity Incident Response Analyst

JP Morgan

City Of London

On-site

GBP 80,000 - 100,000

Full time

Today
Be an early applicant

Job summary

A leading investment bank in London is seeking a SOC analyst to join its team. The role involves 24/7 monitoring and incident response to protect crucial assets. Candidates should have knowledge in network fundamentals, attack strategies, and log analysis. Strong analytical skills and a willingness to work weekends are essential. You will also have opportunities for professional development and training.

Qualifications

  • Good level of knowledge in network fundamentals, e.g., OSI Stack, TCP/IP.
  • Good understanding of attack methods like phishing and DDoS.
  • Experience in log analysis and PCAP analysis.
  • Knowledge in Windows and/or Linux OS investigation.
  • Foundational understanding of file analysis and mitigations.
  • Basic cloud architecture understanding.
  • Desirable foundational scripting skills.

Responsibilities

  • Monitor alerts and conduct case investigations.
  • Threat hunting and file analysis.
  • Engage in projects to improve team capabilities.
  • Conduct independent investigations on alerts.

Skills

Network fundamentals knowledge
Understanding of attack methods
Experience with log analysis
Knowledge of Windows/Linux OS
File analysis knowledge
Basic cloud architecture understanding
Foundational scripting knowledge
Alert investigation skills
Collaboration appreciation
Willingness to work weekends
Job description
As a member of the SOC team within the JPMorgan Chase & Co. SOC, you will fit into a global team providing 24/7 monitoring and Incident Response, acting as the frontline for attacks against the firms' infrastructure. As a SOC analyst, your role will include monitoring alerts triggered from in-house bespoke signatures in a SIEM, start to finish case investigation, threat hunting, file analysis, as well as getting involved in projects that aim to improve the capability of the team. You'll have opportunities to attend training and conferences that benefit the skillset of the team and your own. You'll be encouraged to conduct your own hunting investigations and create rule logic to fill the gaps in monitoring that you identify or alert on upcoming threats you think may be targeted at the firm. The work you'll do is vital, as it will protect over $18 trillion of assets under custody and $393 billion in deposits every day.

This role requires a wide variety of strengths and capabilities, including:
  • Good level of knowledge in network fundamentals, for example; OSI Stack, TCP/IP, DNS, HTTP(S), SMTP
  • Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement
  • Experience or demonstrable knowledge in log analysis and PCAP analysis
  • Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise
  • Foundational understanding of file analysis; extracting indicators, providing a report, implementing mitigations
  • Basic understanding for Cloud architecture and how an attacker can utilize these platforms
  • Foundational level of scripting knowledge is desirable
  • Ability to demonstrate the right approach to investigating alerts and/or indicators and document your findings in a manner that both peer and executive level colleagues can understand
  • Appreciation of the wider roles of interconnecting Cyber Security teams and collaboration with each of those (i.e. Forensics / Threat Intelligence / Penetration Testing / Vulnerability Management / Purple Teaming etc)
  • Willing to work a shift pattern that includes weekend work every four weeks
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.