The chosen candidate will implement, audit, and test security-relevant software components, including but not limited to: penetration testing, network and API security, and cryptographic key management.
Responsible for following established guidelines and identifying and resolving problems. Individual at this level is expected to use some independence of thought but to refer more complex problems to supervisors or other experts.
The candidate will be instrumental in completing efforts at all instances of the product development life cycle to include: concept, design, fabrication, test, installation, operation, maintenance and disposal.
Participates in Computer Security Incident Response Team (CSIRT) and with Disaster Recovery/Continuity of Operations Planning (DR/COOP). Provides support to planning, designing and implementing security controls which safeguard and monitor events for information systems, enterprise applications and data.
This position targets the development of game changing technologies in the field of cyber security. A successful candidate will have the opportunity to work on cutting edge cyber defense technologies in computer operating systems and data networking.
Acts as Subject Matter Expect for Static Code Analysis. Installs/ configures/ interprets industry standard static code analysis products, such as Synopsys Coverity, IBM AppScan Source, Veracode SAST and Checkmarx on-site for various Development teams.
Collaborate across all organizations in JPMC to identify, deliver, and document the required artifacts to enable movement of applications and data to the cloud, including strategy, technical roadmaps, position statements, concepts, and logical specifications.
In this role, the selected candidate must have an experience with using Web based and/or middleware technologies (Microsoft IIS, Webservices); experience integrating applications into operational support tools (e.g. monitoring/alerting tools).