Job Specifications
Description
JOB DESCRIPTION
JPMC’s Assurance Operations organization is looking to expand its Cybersecurity Red Team with an experienced Red Team Operator with a particular specialty in Cloud-based environments. The successful candidate will have a proven track record in conducting red team or network exploitation operations, and be able to demonstrate in-depth knowledge and experience around computer networking fundamentals, modern threats and vulnerabilities, attack methodologies, and red teaming tools.
As an Assessments & Exercises Vice President in the Cybersecurity and Technology Controls line of business, you will make significant contributions to enhancing the firm's cybersecurity posture by using industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology. In this role, you will design and execute Red Team assessments to evaluate preventative controls, incident response processes, and detection capabilities, and advise cross-functional teams on security strategy and risk management.
This position is anticipated to require the use of one or more High Risk Role (HRR) systems, which mandates successful completion of enhanced screening, including criminal and credit background checks, before starting employment and annually thereafter.
Job Responsibilities
Lead and execute multi-month, covert red team assessments against JPMC and its subsidiaries to evaluate existing controls for effectiveness and impact on operational risk
Contribute to the development and enhancement of assessment methodologies, tools, and frameworks to strengthen the firm’s security posture
Collaborate closely with cross-functional teams to develop comprehensive assessment reports – including detailed findings, risk assessments, and remediation recommendations – making data-driven decisions that encourage continuous improvement
Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy and risk management. Engage with peers and industry groups that share threat intelligence analytics
Required Qualifications, Capabilities, And Skills
5+ years of experience in delivering covert red teaming, purple teaming, or network exploitation operations using industry-standard tools (e.g., Cobalt Strike or other C2 frameworks), with awareness of op-sec considerations and detection evasion
Demonstrable expertise in one or more security domains (e.g., exploitation of networks, operating systems, applications, cloud and DevOps security, Active Directory, physical security, or social engineering)
Ability to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation
Experience with developing custom implants, loaders, or post-exploitation tools for covert red team engagements
Demonstrate an active interest in the offensive security community (e.g., via a blog, attending or speaking at conferences, or contributing to open-source tools)
Excellent communication, collaboration, and report writing skills, with the ability to influence and engage stakeholders across various functions and levels including senior leadership
Ability to collaborate with high-performing global teams and individuals throughout the firm to accomplish common goals
Preferred Qualifications, Capabilities, And Skills
Preferred qualifications include: Intelligence Community background, relevant hands-on certifications such as those offered by Offensive Security, CREST, and SANS
Experience with coding and developing new offensive security tools or proof-of-concept exploits, or modifying existing internal or open-source tooling
Experience operating within financial services environments and knowledge of sector-related cybersecurity or resiliency organization practices, operations risk management processes, principles, regulations, threats, risks, and incident response methodologies
Experience delivering regulatory-driven red team testing such as CBEST, TIBER, and iCAST
Experience of targeting cloud-based environments such as Azure and AWS, and technologies such as Kubernetes
Experience applying AI/ML techniques such as deepfakes and prompt injection
The Cybersecurity & Technology Controls group at JPMorganChase aligns the firm’s cybersecurity, access management, controls and resiliency teams. The group proactively and strategically partners with all lines of business and functions to enable them to design, adopt and integrate appropriate controls; deliver processes and solutions efficiently and consistently; and drive automation of controls. The group’s number one priority is to enable the business by keeping the firm safe, stable and resilient.
We are looking for multi-disciplined forward-looking technologists like you with diverse backg
About the Company
With a history tracing its roots to 1799 in New York City, JPMorganChase is one of the world's oldest, largest, and best-known financial institutions--carrying forth the innovative spirit of our heritage firms in global operations across 100 markets.
We serve millions of customers and many of the world's most prominent corporate, institutional, and government clients daily, managing assets and investments, offering business advice and strategies, and providing innovative banking solutions and services.
Social Media Terms ...
Know more