DescriptionContribute to leading-edge security and resilience efforts, advancing protective strategies and propelling continuous improvement.
As an Assessments & Exercises Vice President in Cyber and Tech Controls line of business, you will contribute significantly to enhancing the firm's cybersecurity or resiliency posture by using industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology. Design and deploy risk-driven tests and simulations (or manage a highly-skilled team that does) and inform analysis to clearly outline root-causes. In this role, evaluate preventative controls, incident response processes, and detection capabilities, and advise cross-functional teams on security strategy and risk management.
The Assurance Operations organization is looking to expand its Cybersecurity Red Team with a Business Process Red Team Operator specializing in social engineering and business process assessments relating to payment operations, supplier management, and fraud. The successful candidate will have a proven track record in cybersecurity assessments, to include social engineering operations like phishing and vishing. Additionally, the candidate will be able to demonstrate a general knowledge of computer networking fundamentals, modern threats and vulnerabilities, attack methodologies, and penetration testing tools. The Cybersecurity Red Team consists of highly skilled and qualified members who conduct advanced adversary emulation operations to replicate cybersecurity threats targeting the firm. The team’s remit includes testing deployed security controls—technical, physical, and process.
Job responsibilities
- Perform and manage hands-on offensive security activities leveraging social engineering skillsets as part of Red Team engagements against critical JPMC assets
- Conduct business process assessments to include tabletop or workshop sessions, live testing of business process controls by technical and social engineering attacks, and preparation of deliverables for senior stakeholders
- Produce reports about cybersecurity and fraud vulnerabilities, threats, designs, and procedures and articulate and visually present complex technical and fraud subject matter to a wide and senior audience
- Design and execute testing and simulations – such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm’s strategy and compliance with regulatory requirements
- Evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation
- Collaborate closely with cross-functional teams to develop comprehensive assessment reports – including detailed findings, risk assessments, and remediation recommendations – making data-driven decisions that utilize continuous improvement
- Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy and risk management. Engage with peers and industry groups that share threat intelligence analytics
Required qualifications, capabilities, and skills
- 5+ years of experience in cybersecurity or resiliency, with demonstrated exceptional organizational skills to plan, design, and coordinate the development of offensive security testing, assessments, or simulation exercises
- High level of proficiency in performing targeted, covert security tests with vulnerability identification, exploitation, and post-exploitation activities
- Strong understanding of the following: networking fundamentals (all OSI layers, protocols); Windows/ Linux/Unix/Mac operating systems as well as software vulnerability and exploitation techniques; commercial or open-source offensive security tools for reconnaissance, scanning, exploitation and post-exploitation (e.g. Cobalt Strike, Metasploit, Nmap, Nessus, Burp Suite)
- Familiarity with system administration skills such as configuration, maintenance, and interpretation of log output from networking devices, operating systems, and infrastructure services, as well as with cloud architecture, operations, and security vulnerabilities
- Experience in multiple businesses or verticals, with organizational and cultural understanding of call centers, payments processes, and client service/sales organizations
- Expertise in collaborating with high-performing teams and individuals throughout the firm to accomplish common goals
- Knowledge of US financial services sector cybersecurity or resiliency organization practices, operations risk management processes, principles, regulations, threats, risks, and incident response methodologies
- Ability to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation, and proficiency in multiple security assessment methodologies (e.g., Open Worldwide Application Security Project (OWASP) Top Ten, National Institute of Standards and Technology (NIST) Cybersecurity Framework), offensive testing tools, or resiliency testing equivalents
- Excellent communication, collaboration, and report writing skills, with the ability to influence and engage stakeholders across various functions and levels
Preferred qualifications, capabilities, and skills
- Social engineering background (or intelligence, vice, or similar experience)
- Experience in operationalizing AI/ML/LLMs to develop synthetic voice or face models for security testing
- Knowledge of fraud controls
- Skills that include obfuscating email and telephone systems
- Technical knowledge such as: developing in-house scripting; using interpreted languages (such as Ruby, Python, or Perl) and compiled languages (such as C, C++, C#, or Java); understanding security tools or technology such as firewalls, IDS/IPS, web proxies, and DLP
- Information Security experience in two or more of the following verticals: fraud operations, threat modeling, network/application security testing, social engineering, Red Team operations, and network exploitation operations
- Ability to support and grow skillsets for Cybersecurity Red Team operations