Search by job, company or skills

J

Cyber Intelligence Vice President, Malware Reverse Engineer

5-7 Years
SGD 11,000 - 22,000 per month
Save
new job description bg glownew job description bg glownew job description bg svg
  • Posted 15 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Harness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats.

As a Cybersecurity Intelligence Vice President in Cybersecurity & Tech Controls, you'll perform complex static and dynamic analysis of malicious code identified through internal investigations and from external sources ranging from commodity malware to Advanced Persistent Threat (APT) nation-state malware. You will play a critical role in safeguarding the firm's digital assets and infrastructure from cyber threats. Responsible for identifying, assessing, and mitigating risks, you will inform and influence control measures across the organization. Your expertise in analyzing complex issues and developing innovative solutions, along with your ability to collaborate with diverse teams, will be crucial in enhancing the firm's security posture. As a subject matter expert, you will contribute to strategic cybersecurity initiatives and continuously improve our threat detection and response capabilities. Your work significantly impacts the firm's operations, fiscal management, public image, employee morale, and client relationships.

Job responsibilities

. Conducting malware analysis and reverse engineering of suspicious code

. Performing deep dive technical analysis of cyberattack tactics, techniques, and procedures (TTPs)

. Developing signatures to identify malware families, actor techniques, and other noteworthy code sequences

. Automating malware analysis and intelligence gathering processes

. Hunting for novel samples, indicators of compromise (IOCs), and actor TTPs in internal and external datasets

. Researching threats, vulnerabilities, and exploits to enhance monitoring and detection capabilities

. Partnering with the Incident Response (IR) teams to understand incidents and support technical analysis of malicious cyber events

. Documenting and presenting findings in comprehensive technical analysis reports

. Communicating effectively with business representatives, technology specialists, and vendors

. Assisting peer analysts in the production and dissemination of intelligence reports

. Contributing technical expertise and Cybersecurity perspectives to discussions regarding JPMC global technology infrastructure

Required qualifications, capabilities, and skills

. Bachelor's Degree in Computer Science or related field or equivalent experience

. 5+ years of experience in cybersecurity, focusing on threat intelligence, malware analysis, and reverse engineering

. Lead, mentor, and develop a team of direct reports.

. Demonstrate a proven track record in reverse engineering malware.

. Experience with debuggers, disassemblers, and other malware analysis tools (i.e. IDA Pro, Ghidra)

. Coding (scripting) experience (i.e. Python, C, JavaScript, VBScript, etc.)

. Prior background in Forensics, Log Analysis, Incident Response and / or Threat Intelligence

. Knowledge in Operating Systems (i.e. Windows, Linux, Mac, Mobile), processor architectures (i.e. x86, x64), and computer networking

. Experience in developing both tactical and strategic tools and capabilities

. Strong written and verbal communication skills ability to understand complex problems while formally presenting them simplistically

. Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third-party vendors.

To apply for this position, please use the following URL:

https://ars2.equest.com/response_id=1e63cbe93b40e939fcd2799465c06570

More Info

Job Type:
Industry:
Function:
Employment Type:

Job ID: 146612811

Similar Jobs