Contribute to leading-edge security and resilience efforts, advancing protective strategies and propelling continuous improvement.
As an Assessments & Exercises Vice President in the Cybersecurity and Tech Controls line of business, you will contribute significantly to enhancing the firm's cybersecurity or resiliency posture by using industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology. Design and deploy risk-driven tests and simulations (or manage a highly-skilled team that does) and inform analysis to clearly outline root-causes. In this role, you will evaluate preventative controls, incident response processes, and detection capabilities, and advise cross-functional teams on security strategy and risk management.
JPMC’s Assurance Operations organization is looking to expand its Cybersecurity Red Team with a North America Lead position. The North America Lead is tasked with managing and providing critical support to the firm’s internal team of highly skilled and qualified Red Team members who conduct advanced adversary emulation operations to replicate relevant cyber security threats targeting the firm. Your track record in leading advanced network exploitation operations, to include Red Team operations will lead you to excel. You will utilize your experience in Information Security, people management, written and oral communication, and project management. This position is anticipated to require the use of one or more High Risk Role (HRR) systems, which mandates successful completion of enhanced screening, including criminal and credit background checks, before starting employment and annually thereafter.
Job responsibilities
Manage and develop an effective team of technical Red Team operators, providing leadership, coaching, guidance, and performance evaluations. Ensure team members are effectively trained and equipped to operate safely in highly-sensitive environments. Develop and implement comprehensive strategies to enhance the effectiveness of the Red Team program in alignment with team or organizational goals. Oversee a diverse portfolio of adversary simulation engagements, ensuring each project is meticulously planned and executed. Coordinate with stakeholders to define objectives, scope, and deliverables for each engagement. Manage engagements to test and improve the organization's security defenses, and provide detailed reports and recommendations based on findings to enhance overall cybersecurity resilience Design and execute testing and simulations – such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm’s strategy and compliance with regulatory requirements Evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation Collaborate closely with cross-functional teams to develop comprehensive assessment reports – including detailed findings, risk assessments, and remediation recommendations – making data-driven decisions that encourage continuous improvement Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy and risk management. Engage with peers and industry groups that share threat intelligence analyticsRequired qualifications, capabilities, and skills
5+ years of experience in cybersecurity or resiliency, with demonstrated exceptional organizational skills to plan, design, and coordinate the development of offensive security testing, assessments, or simulation exercises Proven ability with at least 2+ years of experience managing teams of technical staff, or ability to create long term strategic plans, and experience conducting process improvement based on operational lessons learned and threat intelligence inputs. Should have a strong understanding of networking fundamentals (all OSI layers, protocols), Windows/Linux/Unix/Mac operating systems, system and software vulnerabilities and exploitation techniques, and web application vulnerabilities and exploitation techniques Technical knowledge or experience developing in house scripting, using interpreted languages such as Ruby, Python, or Perl, compiled languages such as C, C++, C#, or Java, and security tools or technology such as Firewalls, IDS/IPS, EDR, Web Proxies, DLP and the ability to articulate and visually present complex penetration testing and Red Team results Excellent command of Cybersecurity organization practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies Noted cybersecurity expert, keeping technical skills current and participating in multiple forums Expertise in Agile and can work with at least one of the common frameworks BS/BA degree or equivalent Knowledge of US financial services sector cybersecurity or resiliency organization practices, operations risk management processes, principles, regulations, threats, risks, and incident response methodologies Ability to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation, and proficiency in multiple security assessment methodologies (e.g., Open Worldwide Application Security Project (OWASP) Top Ten, National Institute of Standards and Technology (NIST) Cybersecurity Framework), offensive testing tools, or resiliency testing equivalents Excellent communication, collaboration, and report writing skills, with the ability to influence and engage stakeholders across various functions and levelsPreferred qualifications, capabilities, and skills
Preferred qualifications include: Intelligence Community background, understanding of financial sector or other large security and IT infrastructures, and hold relevant industry certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Offensive Security (OSCP, OSEP, OSED, OSEE, OSCE), SANS (GPEN, GXPN, GWAPT), CREST/Tiger Scheme Certified Tester, and detailed knowledge of current international best practices in privacy and information security Technical knowledge or experience developing in house scripting, using interpreted languages such as Ruby, Python, or Perl, compiled languages such as C, C++, C#, or Java, and security tools or technology such as Firewalls, IDS/IPS, EDR, Web Proxies, DLP and the ability to articulate and visually present complex penetration testing and Red Team results is highly desirablee want to meet you.