US Jobs US Jobs     UK Jobs UK Jobs     EU Jobs EU Jobs

   

Vulnerability Researcher - Assessments & Exercises

As an Vulnerability Researcher - Assessments & Exercises at JPMorgan Chase in the Cybersecurity Technology & Controls line of business, you will contribute significantly to enhancing the firm's cybersecurity or resiliency posture by using industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology.

Design and deploy risk-driven tests and simulations (or manage a highly-skilled team that does) and inform analysis to clearly outline root-causes.

In this role, you will evaluate preventative controls, incident response processes, and detection capabilities, and advise cross-functional teams on security strategy and risk management.

We are seeking a dedicated vulnerability researcher to engage in advanced vulnerability analysis and research, addressing the complex demands of our mission.

In this role, you will work closely with fellow researchers and defense teams to identify vulnerabilities and develop cutting-edge solutions.

The ideal candidate will be self-motivated, possess extensive technical curiosity, and have a strong background in reverse engineering.

You will thrive in a collaborative environment, working on challenging targets to enhance our security posture.

Job responsibilities


* Design and execute testing and simulations - such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm's strategy and compliance with regulatory requirements


* Evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation


* Collaborate closely with cross-functional teams to develop comprehensive assessment reports - including detailed findings, risk assessments, and remediation recommendations - making data-driven decisions that encourage continuous improvement


* Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations.

Apply this knowledge to enhance the firm's assessment strategy and risk management.

Engage with peers and industry groups that share threat intelligence analytics


* Conduct in-depth vulnerability research and exploit development across a broad range of software on modern operating systems, edge devices, on premise, and open-source software.


* Reverse engineer binaries using tools such as IDA Pro, Ghidra, or Binary Ninja to identify novel attack surfaces and develop proof-of-concept exploits.


* Use common VR toolsets such as Fuzzers, disassemblers, debuggers, and code browsers for static and dynamic analysis.


* N-Day vulnerability analysis, patch diffing, and zero-day vulnerability research.


* Collaborate with other teams to share findings, support vulnerability triage, patch prioritizatio...




Share Job