Assessments and Exercises Vice President-Purple Team
Company: JPMorganChase
Location: Plano
Posted on: April 1, 2026
|
|
|
Job Description:
Description Description: Working in Cybersecurity takes pure
passion for technology, speed, a constant desire to learn, and
above all, vigilance in keeping every last asset safe and sound.
You’ll be on the front lines of innovation, working with a
highly-motivated team laser-focused on analyzing, designing,
developing and delivering solutions built to stop adversaries and
strengthen our operations. Your research and work will ensure
stability, capacity and resiliency of our products and emerging
industry trends. Working in tandem with your internal team, as well
as technologists and innovators across our global network, your
ability to identify threats, provide intelligent analysis and
positive actions will stop adversaries and strengthen our data. Job
responsibilities Design and execute testing and simulations – such
as penetration tests, technical controls assessments, and
contribute to the development and refinement of assessment
methodologies, tools, and frameworks to ensure alignment with the
firm’s strategy and compliance with regulatory requirements
Evaluate controls for effectiveness and impact on operational risk,
as well as opportunities to automate control evaluation Collaborate
closely with cross-functional teams to develop comprehensive
assessment reports – including detailed findings, risk assessments,
and remediation recommendations – making data-driven decisions that
encourage continuous improvement Utilize threat intelligence and
security research to stay informed about emerging threats,
vulnerabilities, industry best practices, and regulations. Apply
this knowledge to enhance the firm's assessment strategy and risk
management. Engage with peers and industry groups that share threat
intelligence analytics. Required qualifications, capabilities, and
skills Formal training or certification and 5 years of relevant
experience. Excellent command of Cybersecurity organization
practices, operations risk management processes, principles,
architectural requirements, engineering and threats and
vulnerabilities, including incident response methodologies Ability
to analyze vulnerabilities, threats, designs, procedures and
architectural design, producing reports and sharing intelligence 5
years of Information Security experience in cloud-based
environments (Infrastructure as a Service (IaaS) and Platform as a
Service (PaaS) in both private and public (AWS, Azure)
environments) and in one or more of the following verticals:
network penetration testing, application (web, mobile) penetration
testing, Red Team/Purple Team operations, application security
assessments, and network exploitation operations. Candidate should
have the ability to perform targeted, covert penetration tests with
vulnerability identification, exploitation, and post-exploitation
activities with no or minimal use of automated tools Strong
understanding of the following: Windows/Linux/Unix/Mac operating
systems; OS and software vulnerability and exploitation techniques;
commercial or open-source offensive security tools for
reconnaissance, scanning, exploitation, and post exploitation (e.g.
Cobalt Strike, Metasploit, Burp Suite); networking fundamentals
(all OSI layers, protocols); Infrastructure as a Service (IaaS) and
Platform as a Service (PaaS) providers in both private and public
(AWS, Azure) environments; DevOps; incident response; threat
hunting; and familiarity with interpreting log output from
networking devices, operating systems, and infrastructure services.
Preferred qualifications, capabilities, and skills Intelligence
Community/Security Services background, relevant certifications
such as those offered by Offensive Security (OSCP, OSEP, OSED,
OSEE, OSCE), CREST (Certified Simulated Attack Specialist,
Registered Penetration Tester, Certified Infrastructure Tester),
SANS (GPEN, GXPN, GWAPT), knowledge of malware packing,
obfuscation, persistence, exfiltration techniques, and
understanding of financial sector or other large security and IT
infrastructures Technical knowledge or experience developing proof
of concept exploits and in house scripting, using interpreted
languages such as Python, Ruby, or Perl, compiled languages such as
C, C++, C#, or Java, and security tools or technology such as
Firewalls, IDS/IPS, Web Proxies, DLP and the ability to articulate
and visually present complex penetration testing and Red
Team/Purple Team results is highly desirable Ability to collaborate
with high-performing teams and individuals throughout the firm to
accomplish common goals Experience with Agile and can work with at
least one of the common frameworks is highly desired CTC
Keywords: JPMorganChase, Haltom City , Assessments and Exercises Vice President-Purple Team, IT / Software / Systems , Plano, Texas