JPMorganChase logo

Cyber Intelligence Associate - Malware Reverse Engineer

JPMorganChase
15 hours ago
Full-time
On-site
London, United Kingdom
Data Science
Description

JPMC's Malware Analysis and Applied Discovery (MAAD) team is a highly technical team specializing in analyzing malware targeting the firm and organizations around the world, while expanding the firm's cyber monitoring capabilities into new and exciting areas. We're looking for a self-motivated junior analyst with an insatiable curiosity toward all things cyber to join our team. You'll spend a majority of your time designing, developing, and building innovative capabilities, while also hunting threats, investigating anomalies, and analyzing malware, with mentoring provided by senior members of our team.

Key Responsibilities:

  • Conducting malware analysis and reverse engineering of suspicious code
  • Performing deep dive technical analysis of cyberattack tactics, techniques, and procedures (TTPs)
  • Developing signatures to identify malware families, actor techniques, and other noteworthy code sequences
  • Automating malware analysis and intelligence gathering processes
  • Hunting for novel samples, indicators of compromise (IOCs), and actor TTPs in internal and external datasets
  • Researching threats, vulnerabilities, and exploits to enhance monitoring and detection capabilities
  • Partnering with the Incident Response (IR) teams to understand incidents and support technical analysis of malicious cyber events
  • Documenting and presenting findings in comprehensive technical analysis reports
  • Communicating effectively with business representatives, technology specialists, and vendors
  • Assisting peer analysts in the production and dissemination of intelligence reports
  • Contributing technical expertise and Cybersecurity perspectives to discussions regarding JPMC global technology infrastructure

     

     

Desired Qualifications:

  • Basic coding (scripting) experience (i.e. Python, C, JavaScript, VBScript, etc.)
  • Familiarity with Cloud platforms (i.e. AWS, Azure, etc.) and Virtualization technologies (i.e VMWare)
  • Experience with some of the following: SIEM, SOAR, OSINT, IDA Pro, Ghidra, BinaryNinja, Wireshark, Jupyter, SQL, YARA, AWS Lambda
  • A firm belief in doing what's right and following ethical practices
  • Foundational understanding of Forensics, Log Analysis, Incident Response and / or Threat and Fraud Intelligence
  • Knowledge in Operating Systems (i.e. Windows, Linux, Mac, Mobile), processor architectures (i.e. x86, x64), and computer networking
  • Strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically