Jersey City, NJ, USA
3 days ago
Digital Forensics Senior Associate - Incident Response Investigator

Empower digital safety through forensic analysis in our cybersecurity team.

As a Digital Forensics Senior Associate in CTC Cybersecurity Operations, you play a key role in protecting the firm's digital assets using your advanced analytical, technical, and problem-solving skills to collect, preserve, and analyze digital evidence. Working across lines of business, you help manage complex cybersecurity incidents by identifying gaps and making strategic recommendations. Your expertise in digital forensics, cybersecurity operations, and threat intelligence is vital to the firm's risk reduction efforts. Staying ahead of emerging technologies and engaging in forensic research and development projects, you contribute to maintaining a secure digital environment at JPMorgan Chase.

Job responsibilities

Utilize digital forensic tools to support internal investigations and cybersecurity related matters. Conduct detailed analyses of potential breaches and provide root cause analysis and impact assessments. Prepare comprehensive investigation reports and assist in developing in-house training programs. Collaborate with cross-functional teams in Legal, Technology, and HR to support incident response and regulatory proceedings. Innovate and implement forensic research projects to stay ahead of emerging technologies for the firm. Conduct in-depth digital forensic investigations with advanced analysis to gather, preserve, and analyze evidence from various sources Partner with cybersecurity operations teams to pinpoint vulnerabilities, bolster security, and proactively mitigate potential risks Conduct detailed assessments of JPMorgan Chase’s digital forensics risk and control environment  to identify control gaps, deficiencies, and weaknesses and contribute to the development and implementation of remediation plans Engage in projects that improve forensic techniques and processes across teams

Required qualifications, capabilities, and skills

3+ years in digital forensics, cybersecurity operations, or similar role Demonstrated proficiency in scripting languages like Python, Bash, or PowerShell for automation and data analysis Experienced in detailed analysis of digital artifacts, network traffic, and logs to identify malicious activity or user behavior Developing knowledge of e-discovery processes, incident response, and utilizing threat intelligence

Preferred qualifications, capabilities, and skills

Proven track record in live digital forensics, log-file analysis, network forensics, and cloud incident response.

Experience with investigating data compromise events, networking protocols, packet analysis, and working with industry standard tools (e.g., X-Ways, Surge, EDR, AWS, Google Cloud, Microsoft Azure).

Strong attention to detail and the ability to coordinate, work with, and gain the trust of business stakeholders to achieve cybersecurity objectives.

Industry standard information security technology certifications (e.g., CCE, CFCE, GCIH, GCFE, GCFA, GCFR, GIME, GNFA, GCTD, GCSA, cloud vendor specific certifications, etc.) are a plus.

Confirm your E-mail: Send Email