DescriptionYou’re at the forefront of delivering secure software solutions. Join us a valued member of a top-performing team.
As a Security Engineer II at JPMorgan Chase within the Cybersecurity and Technology Controls organization for Internet of Things (IoT) Security and Endpoint Vulnerability Management team, you are part of an agile team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As an emerging member of the security engineering team, you execute basic software solutions through the design, development, and troubleshooting of multiple components within a technical area, while gaining skills and experience to grow within your role.
Job responsibilities
- Executes standard security solutions in accordance with existing playbooks to satisfy security requirements for internal clients (e.g., product, platform, and application owners)
- Writes secure and high-quality code using the syntax of at least one programming language with limited guidance
- Applies specialized tools (e.g., vulnerability scanner) to analyze and correlate incident data to identify, interpret, and summarize probability and impact of threats when determining specific vulnerabilities
- Supports delivery of continuity-related awareness, training, educational activities, and exercises
- Adds to team culture of diversity, equity, inclusion, and respect
Required qualifications, capabilities, and skills
- Formal training or certification on software engineering* concepts and 2+ years applied experience
- Basic experience developing security engineering solutions
- Demonstrable ability to code in one or more languages to include C/C++, Java and Python.
- Experience across the whole Software Development Life Cycle
- Understanding of operating systems – Window, MacOS and/or Unix
- Exposure to agile methodologies such as CI/CD, applicant resiliency, and security
- Working knowledge of information and network security, IT risk management, and architectural concepts and patterns
- Proficient in specialized tools (e.g., vulnerability scanner) used to analyze incident data
Preferred qualifications, capabilities, and skills
- Knowledge of the Internet of Things (IoT)
- Knowledge of virtualization, networking and network security practices (firewalls, encryption, and secure architecture)
- Certifications in one or more of the following
- Security: Certified Ethical Hacker (CEH)
- Cloud: AWS Practitioner or AWS Developer certification
- Networking: Cisco Certified Network Associate (CCNA)