4 days ago

Red Team Operator

JPMorganChase

On Site
Full Time
$180,000
Greater London, England, United Kingdom

Job Overview

Job TitleRed Team Operator
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary$180,000
LocationGreater London, England, United Kingdom

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

About the Red Team Operator Role at JPMorganChase

JPMorganChase's Assurance Operations organization is actively seeking an experienced Red Team Operator to join its Cybersecurity Red Team. The ideal candidate will possess a strong background in red team or network exploitation operations, demonstrating in-depth knowledge of computer networking fundamentals, modern threats and vulnerabilities, attack methodologies, and red teaming tools.

As an Assessments & Exercises Senior Associate within the Cybersecurity and Technology Controls line of business, you will play a crucial role in strengthening the firm's cybersecurity posture. This involves utilizing industry-standard assessment methodologies to proactively identify risks and vulnerabilities across people, processes, and technology. Your responsibilities will include designing and executing covert Red Team assessments to evaluate preventative controls, incident response processes, and detection capabilities, while also advising cross-functional teams on security strategy and risk management.

This position requires successful completion of enhanced screening, including criminal and credit background checks, due to anticipated use of High Risk Role (HRR) systems.

Job Responsibilities

  • Conduct multi-month, covert red team assessments against JPMC and its subsidiaries to evaluate existing controls for effectiveness and impact on operational risk.
  • Contribute to the development and enhancement of assessment methodologies, tools, and frameworks to strengthen the firm’s security posture.
  • Collaborate closely with cross-functional teams to develop comprehensive assessment reports, including detailed findings, risk assessments, and remediation recommendations, making data-driven decisions that encourage continuous improvement.
  • Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy and risk management.
  • Engage with peers and industry groups that share threat intelligence analytics.

Required Qualifications, Capabilities, And Skills

  • 3+ years of experience in delivering covert red teaming, purple teaming, or network exploitation operations using industry-standard tools (e.g., Cobalt Strike or other C2 frameworks), with awareness of op-sec considerations and detection evasion.
  • Demonstrable expertise in one or more security domains (e.g., exploitation of networks, operating systems, applications, cloud and DevOps security, Active Directory, physical security, or social engineering).
  • Ability to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation.
  • Experience with developing custom implants, loaders, or post-exploitation tools for covert red team engagements.
  • Demonstrate an active interest in the offensive security community (e.g., via a blog, attending or speaking at conferences, or contributing to open-source tools).
  • Excellent communication, collaboration, and report writing skills, with the ability to influence and engage stakeholders across various functions and levels including senior leadership.
  • Ability to collaborate with high-performing global teams and individuals throughout the firm to accomplish common goals.

Preferred Qualifications, Capabilities, And Skills

  • Intelligence Community background.
  • Relevant hands-on certifications such as those offered by Offensive Security, CREST, and SANS.
  • Experience with coding and developing new offensive security tools or proof-of-concept exploits, or modifying existing internal or open-source tooling.
  • Experience operating within financial services environments and knowledge of sector-related cybersecurity or resiliency organization practices, operations risk management processes, principles, regulations, threats, risks, and incident response methodologies.
  • Experience delivering regulatory-driven red team testing such as CBEST, TIBER, and iCAST.
  • Experience of targeting cloud-based environments such as Azure and AWS, and technologies such as Kubernetes.
  • Experience applying AI/ML techniques such as deepfakes and prompt injection.

JPMorganChase's Cybersecurity & Technology Controls group aligns the firm’s cybersecurity, access management, controls and resiliency teams, partnering with all lines of business to integrate appropriate controls and drive automation. The firm invests over $15B annually in technology, fostering innovation across 14 global technology hubs.

Key skills/competency

  • Red Teaming
  • Network Exploitation
  • Cybersecurity Assessments
  • Threat Intelligence
  • Incident Response
  • Cobalt Strike
  • Active Directory Security
  • Cloud Security (Azure/AWS)
  • Social Engineering
  • Offensive Security Research

Tags:

Red Team Operator
Red Teaming
Network Exploitation
Cybersecurity Assessments
Incident Response
Threat Intelligence
Security Strategy
Risk Management
Penetration Testing
Offensive Security
Vulnerability Management
Cobalt Strike
C2 Frameworks
Active Directory
Cloud Security
Azure
AWS
Kubernetes
Custom Implants
Post-Exploitation Tools
AI/ML
DevOps Security

Share Job:

How to Get Hired at JPMorganChase

  • Research JPMorganChase's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor. Understand their significant investment in technology and cybersecurity.
  • Tailor your Red Team Operator resume: Highlight specific experience in covert red teaming, network exploitation, and using industry-standard C2 frameworks like Cobalt Strike. Quantify your impact on improving security posture.
  • Showcase offensive security expertise: Demonstrate an active interest through personal projects, a security blog, contributions to open-source tools, or relevant certifications (Offensive Security, CREST, SANS).
  • Prepare for technical deep dives: Be ready to discuss your in-depth knowledge of exploitation techniques across various domains (networks, OS, cloud, Active Directory) and experience developing custom offensive tools.
  • Practice behavioral questions: Focus on examples demonstrating collaboration with cross-functional teams, communication of complex technical findings to diverse stakeholders, and your approach to continuous learning and risk management.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background