Description:
Working in Cybersecurity takes pure passion for technology, speed, a constant desire to learn, and above all, vigilance in keeping every last asset safe and sound. You’ll be on the front lines of innovation, working with a highly-motivated team laser-focused on analyzing, designing, developing and delivering solutions built to stop adversaries and strengthen our operations. Your research and work will ensure stability, capacity and resiliency of our products and emerging industry trends. Working in tandem with your internal team, as well as technologists and innovators across our global network, your ability to identify threats, provide intelligent analysis and positive actions will stop adversaries and strengthen our data.
JPMC’s Attack Simulation organization is looking to expand its Red Team with an experienced Red Team Operator with a particular specialty in exploit development and vulnerability research spanning the Windows and Unix platforms. The primary focus of this role will be to perform hands on offensive activities as part of Red Team engagements against critical JPMC assets while liaising with the firm’s Vulnerability Management and Incident Response teams. The successful candidate will have a proven track record in conducting network exploitation operations, to include Red Team operations. Additionally, the candidate will be able to demonstrate in-depth knowledge and experience around computer networking fundamentals, modern threats and vulnerabilities, attack methodologies, and penetration testing tools.
This position is anticipated to require the use of one or more High Security Access (HSA) systems. Users of these systems are subject to enhanced screening which includes both criminal and credit background checks, and/or other enhanced screening at the time of accepting the position and on an annual basis thereafter. The enhanced screening will need to be successfully completed prior to commencing employment or assignment.
Qualifications:
This role requires a wide variety of strengths and capabilities, including:
- Knowledge of Cybersecurity organization practices, operations, risk management processes, principles, architectural requirements, engineering and threats and vulnerabilities, including incident response methodologies
- Ability to analyze vulnerabilities, threats, designs, procedures and architectural design, producing detailed reports or advisories and sharing intelligence
- Information Security experience in vulnerability research and exploit development as well as in one or more of the following verticals: network penetration testing, application penetration testing, Red Team operations, application security assessments, and network exploitation operations. Candidate should have the ability to perform targeted, covert penetration tests with vulnerability identification, exploitation, and post-exploitation activities with no or minimal use of automated tools
- Strong understanding of the following: knowledge of application reverse engineering techniques and procedures (Ghidra, IDA Pro, Radare, GDB, WinDBG); Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or open-source offensive security tools for reconnaissance, scanning, exploitation, and post exploitation (e.g. Cobalt Strike, Metasploit, Burp Suite); networking fundamentals (all OSI layers, protocols); Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) providers in both private and public (AWS, Azure) environments; DevOps; and familiarity with interpreting log output from networking devices, operating systems, and infrastructure services
- Preferred qualifications include: Intelligence Community/Security Services background, knowledge of malware packing, obfuscation, persistence, exfiltration techniques, understanding of financial sector or other large security and IT infrastructures, and relevant certifications such as SANS (GPEN, GXPN, GWAPT), Offensive Security (OSCP, OSEP, OSED, OSEE, OSCE), CREST/Tiger Scheme Certified Tester
- Technical knowledge or experience developing proof of concept exploits and in house scripting, using interpreted languages such as Ruby, Python, or Perl, compiled languages such as C, C++, C#, or Java, and security tools or technology such as Firewalls, IDS/IPS, Web Proxies, DLP and the ability to articulate and visually present complex penetration testing and Red Team results is highly desirable
The Cybersecurity & Technology Controls group at JPMorgan Chase aligns the firm’s cybersecurity, access management, controls and resiliency teams. The group proactively and strategically partners with all lines of business and functions to enable them to design, adopt and integrate appropriate controls; deliver processes and solutions efficiently and consistently; and drive automation of controls. The group’s number one priority is to enable the business by keeping the firm safe, stable and resilient.
