Security Engineer II, End Point Detection & Response

JPMorgan Chase & Co.Columbus, OH
5h

About The Position

As a Security Engineer II - Cloud and Infrastructure Engineer at JPMorgan Chase within the Cybersecurity & Technology Controls organization, you are an integral part of team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions.

Requirements

  • Experience with cloud engineering, deployment engineering, DevOps engineering, or equivalent
  • Demonstrate strong working knowledge of Windows and Linux systems internals
  • Familiarity with infrastructure as Code (IaC), working with CI/CD pipelines, and associated automation tooling
  • Knowledge of a programming/scripting language for automation and integration tasks
  • Understanding of the Software Development Life Cycle
  • Proficiency in cloud technologies (e.g., AWS security)
  • Strong analytical experience with problem solving mindset and the ability to solve complex challenges

Nice To Haves

  • Cloud computing related certifications with an AWS focus are preferred (i.e., Certified Solutions Architect, DevOps Engineer, etc.)

Responsibilities

  • Design, implement, and maintain security solutions for an enterprise-scale environment
  • Understand the functions of systems engineering, systems integrations, and systems administration roles
  • Execute on key deliverables in the security engineering space
  • Design and develop production deployments with the ability to think beyond routine or conventional approaches in order to deliver technology solutions for key stakeholders
  • Develop secure and high-quality production code and review and debug code written by others
  • Implement complex business logic in Python, Bash, PowerShell, and other scripting languages
  • Engage effectively with third-party vendors in communicating and collaborating with a broad range of internal teams
  • Minimize security vulnerabilities by following industry insights and government regulations to continuously evolve security protocols, including creating processes to determine the effectiveness of current controls
  • Work with stakeholders and business leaders to understand security needs and recommend business modifications during periods of vulnerability
  • Add to team culture of diversity, equity, inclusion, and respect
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service