
Global financial services firm
Security Operations Vice President - Senior Threat Detection Engineer
必須スキル
AWS
GCP
Azure
Embrace the challenge of maintaining robust digital security, driving operational excellence, and implementing cutting-edge solutions in cybersecurity.
As a Security Operations Vice President in Cybersecurity & Tech Controls, you will be a technical leader in our Cyber Defense function, enhancing our capabilities to detect, prevent, and disrupt sophisticated cyber threats across a complex hybrid enterprise. You will design scalable detection solutions and play a key role in our detection-as-code framework, ensuring comprehensive coverage across endpoints, networks, cloud infrastructure, and critical business systems. Collaborating closely with Security Operations Center (SOC) analysts, threat hunters, red team members, and internal security engineering teams, you will develop scalable, high-fidelity detections using logs, telemetry, and behavioral analytics from diverse data sources. The ideal candidate will have SOC experience, a passion for researching TTPs and the threat landscape, and the ability to translate this research into high-quality detections.
As a technical lead, your responsibilities will include advanced analysis, threat hunting, evaluating new security technologies, and ensuring the integration of larger technology projects into the Cyber Defense team and monitoring function. You will apply advanced analytical, technical, and problem-solving skills to achieve operational excellence and implement innovative solutions to tackle complex security challenges.
Job responsibilities
- Design, implement, and continuously refine advanced threat detection rules, logic, and models in SIEM, EDR, and cloud-native platforms (e.g., Splunk, Sentinel, Crowd Strike, AWS/Azure/GCP).
- Continuously refine detection strategies based on evolving TTPs (MITRE ATT&CK), threat intelligence, and red/purple team feedback.
- Utilize detection-as-code pipelines and SRE principles to build and maintain detections with appropriate versioning, QA, and testing workflows.
- Perform threat model reviews, architecture reviews and detection gap assessments.
- Operationalize MITRE ATT&CK mappings, threat intel insights, and adversary simulation results to develop precise detection logic.
- Map detection coverage against evolving threat landscapes aligning with industry frameworks and internal threat profiles.
- Partner with Threat Intelligence, Red Team, and Incident Response teams to close the feedback loop between detection hypotheses and real-world adversary behavior.
- Evaluate new telemetry sources and support the onboarding, normalization, and enrichment of log sources to ensure high-fidelity data for detection and analytics.
- Mentor junior analysts and engineers in detection logic design, telemetry analysis, and security operations best practices.
- Evaluate and enhance the organization's security posture by staying current with industry trends, emerging threats, and regulatory requirements, driving innovation and process improvements.
Required qualifications, capabilities, and skills
- Bachelor’s Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
- 5+ years of experience in cybersecurity with a core focus on threat detection, security engineering, or SOC operations.
- Expertise in SIEM platforms (e.g., Splunk SPL, KQL, Elastic) with a strong command of query optimization, dashboarding, and alert logic development.
- Advanced understanding of attacker TTPs, malware behaviors, lateral movement techniques, and financial-sector-specific threat actors.
- Experience with threat hunting on a large, enterprise network both as an individual and leading hunting exercises with other team members.
- Deep familiarity with telemetry from EDRs, Cloud logging (e.g., AWS, Azure, GCP), Windows/Linux event logs, identity platforms (e.g., Azure AD), and public cloud services.
- Ability to research TTPs, analyze raw log and develop high fidelity detections in various tools/languages.
- Proven experience collaborating with SOC, IR, threat intel, or red teams in a fast-paced environment.
- Strong grasp of security frameworks and taxonomies including MITRE ATT&CK, Cyber Kill Chain, NIST, and SIGMA/YARA formats.
- Proficiency in scripting languages such as Python or PowerShell to support automation and enrichment tasks.
- Experience creating and working with Jupyter Notebooks to automate workflows and processes.
Preferred qualifications, capabilities, and skills
- Experience with detection-as-code methodologies and tools (e.g., Git-based pipelines, CI/CD for security content).
- Background in cloud security (AWS/GCP/Azure), particularly around detection and log correlation in IaaS and SaaS environments.
- Familiarity with SOAR platforms, and anomaly-based detection techniques.
- Experience leveraging Large Language Models (LLMs) for security use cases such as log parsing, alert triage, threat narrative generation, or threat intelligence summarization.
- Experience in integrating LLMs into detection workflows to enhance context enrichment, rule generation, or automated investigation support.
閲覧数
0
応募クリック
0
Mock Apply
0
スクラップ
0
類似の求人

Cloud Engineering Manager
Microsoft · Singapore, Singapore, Singapore

Director, Technology APJC , AGS Technology
Amazon · Singapore, SGP

Senior C# Developer - Assistant Vice President
Citigroup · SINGAPORE, Singapore

Core Engineering, Developer Agent Software Engineer Lead, Vice President, Singapore
Goldman Sachs · Singapore, Singapore, Singapore

Critical Environment Technician Manager
Microsoft · Singapore, Singapore, Singapore
JPMorgan Chaseにつ いて

JPMorgan Chase
PublicJPMorgan Chase & Co. is an American multinational banking institution headquartered in New York City and incorporated in Delaware. It is the largest bank in the United States, and the world's largest bank by market capitalization as of 2025.
300,000+
従業員数
New York City
本社所在地
$500B
企業価値
レビュー
10件のレビュー
3.8
10件のレビュー
ワークライフバランス
3.5
報酬
4.0
企業文化
3.8
キャリア
3.2
経営陣
2.8
68%
知人への推奨率
良い点
Good benefits and compensation
Supportive colleagues and environment
Flexible work arrangements
改善点
Long hours and heavy workload
Management issues and lack of direction
High stress and expectations
給与レンジ
44件のデータ
Junior/L3
Mid/L4
Senior/L5
Junior/L3 · Analytics Solutions Associate
1件のレポート
$139,000
年収総額
基本給
$107,000
ストック
-
ボーナス
-
$139,000
$139,000
面接レビュー
レビュー4件
難易度
3.0
/ 5
期間
14-28週間
内定率
50%
体験
ポジティブ 25%
普通 75%
ネガティブ 0%
面接プロセス
1
Application Review
2
HR Screen
3
Hiring Manager Interview
4
In-person/Final Interview
5
Offer
よくある質問
Behavioral/STAR
Past Experience
Culture Fit
Financial Knowledge
Case Study
最新情報
JPMorgan’s Jamie Dimon says a credit-led recession would be ‘worse than people think’ - MarketWatch
MarketWatch
News
·
1w ago
JPMorgan's Jamie Dimon warns of looming bond market crisis (JPM:NYSE) - Seeking Alpha
Seeking Alpha
News
·
1w ago
JPMorganChase becomes Official Bank of Team USA and LA28 Olympic and Paralympic Games - LA 2028
LA 2028
News
·
1w ago
JPMorgan Chase becomes global Olympic partner, includes LA28, Team USA - Yahoo Sports
Yahoo Sports
News
·
1w ago