Enable job alerts via email!

Cyber Security Operations Senior Associate

JPMorganChase

Singapore

On-site

SGD 80,000 - 100,000

Full time

Today
Be an early applicant

Job summary

A leading financial services firm in Singapore seeks a Security Operations Senior Associate to enhance cybersecurity by analyzing threats and responding to incidents. Candidates should have a Bachelor's degree in a related field and 3+ years of experience in cybersecurity operations. Responsibilities include monitoring security infrastructures, conducting investigations, and developing security strategies. The role requires collaboration with cross-functional teams and a commitment to maintaining data integrity and security.

Qualifications

  • 3+ years of experience in cybersecurity operations, including threat detection and incident response.
  • Advanced knowledge of security protocols and architecture design principles.
  • Proficient in scripting to automate tasks and implement controls.

Responsibilities

  • Monitor security infrastructures to respond to threats and incidents.
  • Conduct in-depth security investigations and analyze data for root causes.
  • Develop threat detection playbooks and implement security strategies.
  • Educate employees on best practices and policies.

Skills

Threat detection
Incident response
Network traffic analysis
Scripting
Security protocols

Education

Bachelor's Degree in Computer Science or related field
Job description
Overview

Seize the opportunity to enhance cybersecurity, utilizing your skills in threat analysis and incident response to protect vital data and systems. As a Security Operations Senior Associate in Cybersecurity & Tech Controls, Cybersecurity Operations, you will play an important role in safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. You will collaborate with cross-functional teams to educate employees on best practices, policies, and procedures, and contribute to the continuous improvement of our cybersecurity posture to maintain the integrity, confidentiality, and availability of sensitive data and systems.

Job Responsibilities
  • Monitor and analyze security infrastructures, contributing to detection and response to threats, vulnerabilities, and incidents to ensure the integrity, confidentiality, and availability of sensitive data and systems.
  • Conduct in-depth security investigations, analyzing logs, network traffic, and other data sources to identify root causes, assess impact, and gather evidence for response and mitigation actions.
  • Develop and maintain threat detection and response playbooks, incorporating industry best practices, regulatory requirements, and lessons learned from previous incidents.
  • Collaborate with cross-functional teams to develop and implement coordinated security strategies, policies, and procedures, while educating employees on best practices.
Required Qualifications, Capabilities, And Skills
  • Bachelor's Degree in Computer Science, Cybersecurity or related field
  • 3+ years of experience in cybersecurity operations, including threat detection, incident response, vulnerability management
  • Demonstrated experience in network traffic analysis, log analysis, vulnerability analysis, exploitation, and security investigation techniques to identify and respond to security incidents
  • Proficient in scripting to automate tasks, implement controls, and manipulate data
  • Advanced knowledge of security protocols, cryptography, authentication, authorization, and security architecture design principles
  • Willing to work a scheduled shift pattern that includes one day of the weekend every two weeks or as required. The shift pattern will also require analysts to work up to ten hours a day for four days a week or eight hours a day for five days a week
Preferred Qualifications, Capabilities, And Skills
  • Good knowledge and/or experience with analyzing various logs, e.g. endpoint logs, network logs
  • Good knowledge and/or experience with Cloud architecture and platforms
  • Good understanding of how cyber attacks work
About Us

J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world’s most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.

We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.

About The Team

The Cybersecurity & Technology Controls group at JPMorganChase aligns the firm’s cybersecurity, access management, controls and resiliency teams. The group proactively and strategically partners with all lines of business and functions to enable them to design, adopt and integrate appropriate controls; deliver processes and solutions efficiently and consistently; and drive automation of controls. The group’s number one priority is to enable the business by keeping the firm safe, stable and resilient.

High Risk Roles (HRR) are sensitive roles within the technology organization that require high assurance of the integrity of staff by virtue of 1) sensitive cybersecurity and technology functions they perform within systems or 2) information they receive regarding sensitive cybersecurity or technology matters. Users in these roles are subject to enhanced pre-hire screening which includes both criminal and credit background checks (as allowed by law). The enhanced screening will need to be successfully completed prior to commencing employment or assignment.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.