Business Process Red Team Operator

JPMorgan Chase JPMorgan Chase · Banking · Wilmington, DE +1 · Corporate Sector

JPMorgan Chase is seeking a Business Process Red Team Operator specialized in social engineering and assessments of critical business processes. The role involves performing offensive security activities, conducting business process assessments, designing and executing testing and simulations, evaluating controls, and collaborating with cross-functional teams. The candidate should have experience in cybersecurity or resiliency, knowledge of the US financial services sector, and proficiency in security assessment methodologies and tools. Familiarity with AI/ML technologies for Red Teaming is a plus.

What you'd actually do

  1. Perform and manage hands-on offensive security activities leveraging social engineering skillsets as part of Red Team engagements against critical JPMC assets
  2. Conduct business process assessments to include tabletop or workshop sessions, live testing of business process controls by technical and social engineering attacks, and preparation of deliverables for senior stakeholders
  3. Design and execute testing and simulations – such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm’s strategy and compliance with regulatory requirements
  4. Evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation
  5. Collaborate closely with cross-functional teams to develop comprehensive assessment reports – including detailed findings, risk assessments, and remediation recommendations – making data-driven decisions that encourage continuous improvement

Skills

Required

  • 5+ years of experience in cybersecurity or resiliency
  • demonstrated exceptional organizational skills to plan, design, and coordinate the development of offensive security testing, assessments, or simulation exercises
  • Knowledge of US financial services sector cybersecurity or resiliency organization practices, operations risk management processes, principles, regulations, threats, risks, and incident response methodologies
  • Ability to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation
  • proficiency in multiple security assessment methodologies (e.g., Open Worldwide Application Security Project (OWASP) Top Ten, National Institute of Standards and Technology (NIST) Cybersecurity Framework), offensive testing tools, or resiliency testing equivalents
  • Excellent communication, collaboration, and report writing skills, with the ability to influence and engage stakeholders across various functions and levels
  • Candidate should have the ability to perform targeted, covert security tests with vulnerability identification, exploitation, and post-exploitation activities
  • Strong understanding of the following: Networking fundamentals (all OSI layers, protocols); Windows/ Linux/Unix/Mac operating systems as well as software vulnerability and exploitation techniques; commercial or open-source offensive security tools for reconnaissance, scanning, exploitation, and post-exploitation (e.g. Cobalt Strike, Metasploit, Nmap, Nessus, Burp Suite)
  • Ability to collaborate with high-performing teams and individuals throughout the firm to accomplish common goals
  • Broad experience in multiple businesses or verticals, with organizational and cultural understanding of call centers, payments processes, client service/sales organizations, and operational support staff
  • The ability to articulate and visually present complex technical and fraud subject matter to a w

Nice to have

  • Familiarity with AI/ML technologies and tools and operationalizing their use in Red Teaming (e.g., developing video and audio deepfakes, etc.)
  • with system administration skills such as configuration, maintenance, and interpretation of log output from networking devices, operating systems, and infrastructure services
  • and with cloud architecture, operations, and security vulnerabilities

What the JD emphasized

  • specialized in social engineering
  • assessments of critical business processes
  • hands-on offensive security activities leveraging social engineering skillsets
  • social engineering operations like phishing and vishing
  • US financial services sector cybersecurity or resiliency organization practices
  • systemic security or resiliency issues
  • AI/ML technologies and tools and operationalizing their use in Red Teaming