Cyber Intelligence Vice President, Threat Intelligence

JPMorgan Chase JPMorgan Chase · Banking · Singapore · Corporate Sector

This role focuses on cybersecurity threat intelligence within the financial industry, involving advanced analytics, data analysis, and identifying/mitigating risks from sophisticated threat actors. It requires experience in cyber operations and data acumen, with a preference for those with offensive security or big data system experience.

What you'd actually do

  1. Implement proactive threat intelligence strategies using advanced analytics and emerging technologies to identify and mitigate risks
  2. Research and develop novel methodologies and capabilities to uncover unique threat intelligence, working with large data sets using data analysis tools and/or programming languages. Innovation is key
  3. Hunt and track groups of highly sophisticated threat actors, and their current and evolving tactics, techniques and procedures (TTPs), using open and closed source tools
  4. Maintain detailed threat actor profiles on adversaries of interest/relevance to the firm and wider financial industry, covering TTPs, intent, goals, and strategic objectives
  5. Build and maintain strong relationships with stakeholders, sharing threat intelligence and best practices to achieve operational goals and improve cybersecurity operations

Skills

Required

  • Cyber Threat Intelligence
  • Red Team
  • Penetration Testing
  • Cyber Operations
  • cybersecurity concepts
  • enterprise IT infrastructure
  • operating system internals
  • logging mechanisms
  • networking
  • Data acumen
  • interrogate large amount of data
  • extract intelligence from semi- or un-structured data
  • automating data collection and processing
  • analytical tools
  • scripting languages
  • Python
  • repeatable query syntax
  • automating repeatable security tasks
  • prominent cyber threat actor groups
  • campaigns and TTPs
  • objective analysis
  • communicating (written and verbal) findings
  • technical and non-technical audiences

Nice to have

  • technical curiosity
  • always experimenting
  • always innovating
  • software systems for big data collection, ingestion, and processing
  • intelligence community
  • international institution
  • hands-on offensive security disciplines
  • Red Team
  • Penetration Testing
  • Bug Bounty Research

What the JD emphasized

  • advanced analytics
  • emerging technologies
  • novel methodologies
  • large data sets
  • data analysis tools
  • programming languages
  • Innovation is key
  • sophisticated threat actors
  • tactics, techniques and procedures (TTPs)
  • open and closed source tools
  • wider global, technology, and geopolitical landscapes
  • cyber threats
  • financial industry
  • Data acumen
  • interrogate large amount of data
  • extract intelligence from semi- or un-structured data
  • automating data collection and processing
  • analytical tools
  • scripting languages
  • Python
  • always-improving and efficient mindset
  • repeatable query syntax
  • automating repeatable security tasks
  • prominent cyber threat actor groups
  • campaigns and TTPs
  • objective analysis
  • communicating (written and verbal) findings
  • technical and non-technical audiences
  • technical curiosity
  • always experimenting
  • always innovating
  • software systems for big data collection, ingestion, and processing
  • intelligence community
  • international institution
  • hands-on offensive security disciplines
  • Red Team
  • Penetration Testing
  • Bug Bounty Research