Apply Now    

Content Engineer - SIEM

Req #: 170097270
Location: Jersey City, NJ, US
Job Category: Technology
Potential Referral Amount: 5000 US Dollar (USD)

JPMorgan Chase & Co. (NYSE: JPM) is a leading global financial services firm with assets of $2.6 trillion and operations worldwide. The firm is a leader in investment banking, financial services for consumers and small business, commercial banking, financial transaction processing, and asset management. A component of the Dow Jones Industrial Average, JPMorgan Chase & Co. serves millions of consumers in the United States and many of the world's most prominent corporate, institutional and government clients under its J.P. Morgan and Chase brands. Information about JPMorgan Chase & Co. is available at



Cybersecurity Officers protect the firm's people, clients and information assets - ensuring the safety and soundness of the firm's business operations.  Cybersecurity personnel provide subject matter expertise, thought leadership, guidance, best practice and support across all business and technology groups firm-wide as it relates to the security of JMPC, its products, processes and technology.  The Cybersecurity team drives value creation by accelerating business and technology opportunities and leads proactive, intelligence-driven operations that quickly meet and stop adversaries and build a foundational fortress for business operations in any environment.  Advanced level Cybersecurity professionals are able to participate in senior level discussions on concepts, principles and issues as well as the application and implication of changes to processes, policies and procedures with perspective as they relate to Cybersecurity.  Additionally, professional is able to lead intelligent analysis and actions that stop adversaries and ensure the firm's safety


As a member of the Cybersecurity Operations team, the SIEM Content Engineer will provide operational oversight for security technologies in the event monitoring environment including log management and Security Information and Event Management.  The SIEM Content Engineer is responsible for evaluating logs for new technologies, defining how the logs should be parsed to make it usable for detection rules on the SIEM platform and writing new detection rules. The SIEM Content Engineer is also a key consultant on the security controls in the environment, and works closely with other IT and business areas to ensure sound and consistent implementation of security within IT infrastructure and general business process.  The candidate must have experience with SIEM and log management technologies.


Primary Responsibilities

  • Ensures stability and resiliency of Cybersecurity products and services

  • Designs, analyzes, develops and/or delivers Cybersecurity products and services

  • Host use case workshops with application and system owners to identify attack vectors and write monitoring rules to detect attacks in the environment.

  • Employs approved defense-in-depth principles along the kill chain to eliminate risk and vulnerabilities and improves security controls

  • Partners with the business to prioritize and deliver capabilities as defined by the strategic roadmap

  • Proactively manages relationships with stakeholders through effective communications  Takes lead on the identification of threats and risks to drive the selection of cost effective security controls

  • Capable of performing technical and non-technical (people and operations) risk and vulnerability assessments and supports incident response

  • Leads incident response, risk reviews and vulnerability assessments

  • Executes research and development of proof of concept in line with emerging industry trends

  • May include direct accountability for people management and financial budgeting

  • Embrace cultural embodiment of group and Firm

  • Coordinating and conducting event collection, log management, event management, compliance automation, and identity monitoring activities.

  • Integration and normalization of disparate asset information into a centralized asset model
  • Use of ArcSight ESM and Splunk in the daily operational work and workflow and being the subject matter expert for the end customer
  • Advising SOC Manager on best practices and use cases on how to use SIEM to achieve end state requirements
  • Meet with business users to gather requirements and make recommendations for meeting customer requirements within the SIEM and Log Management solution
  • Integration with 3rd party systems including configuration management, network management, vulnerability scanners and trouble ticketing applications.



Required Qualifications



  • Expert in their field; keeps technical skills current, participates in multiple forums
  • Subject matter expert on SIEM and writing detection rules on the platform
  • Scripting or programming experience in at least 1 object oriented language
  • In depth hands-on experience with security features and audit policies on Linux, Unix, and Windows operations systems
  • Working knowledge of different CLIs (Windows & *nix) for administration of Linux, Unix and Windows operating systems.
  • Understanding of security vulnerabilities in common operating systems, web and applications, including knowledge of remediation procedures
  • Able to work independently or in a team to create and optimize fraud detection rules
  • Strong working knowledge of operations practices, risk management processes, principles, architectural requirements and threats and vulnerabilities in the context of Cybersecurity as well as incident response handling methodologies as they apply

  • Strong knowledge of national and international laws, regulations, policies and ethics as they relate to Cybersecurity and specifically in the financial industry

  • Strong understanding of Agile, with the ability to work under at least one of the common frameworks

  • May be multi-skilled across the full range of team functions

  • Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities along with the ability to identify systemic security issues

  • Provides in-depth analysis of vulnerabilities, threats, designs, procedures and architectural design with focus on recommendations for enhancements or remediation with skill in using network analysis tools.

  • Compliance required for local, country, and/or region specific standards for credentials, certifications and/or training.

  • Experience of mainframe and mid-range platforms an advantage

Business Knowledge

  • Proficientƒß in the mindset for risk and control compliance to departmental and companywide standards

  • Has broad understanding of at least one business area and product that they support and knowledge about the business' strategic direction

  • Project Management, Customer Service and Technical Writing duties


  • 5+ years security engineering experience in mid-sized to large organizations, with emphasis on security operations, incident management, intrusion detection, firewall deployment and security event analysis.

  • 3+ years with SIEM and Log Management technologies specific to Splunk and/or ArcSight.

  • Proficient and proven track record of delivering Cybersecurity products and services within a business domain

  • Solid experience in supporting and improving Cybersecurity and/or technology controls to support the business

  • BSc of Computer Science, Engineering, or Mathematics preferred.

  • Experience with 3-5 of the following security technologies including:
    • Security Incident and Event Monitoring (SIEM – Splunk ES, ArcSight, QRadar, etc)
    • Host and perimeter firewalls
    • Host and network intrusion detection systems
    • Logging and monitoring tools
    • Antivirus or end-point security
    • Data loss prevention, privileged access management
    • Identity and access management
    • Database access monitoring
    • Netflow/sflow
    • Vulnerability scanning
    • Network full packet capture
  • Preferred Product/Vendor Certifications in Splunk & ArcSight

  • Preferred Industry Certifications:  CISSP, CISM, CISA, GIAC


High Security Access (HSA)

This position is anticipated to require the use of one or more High Security Access (HSA) systems. Users of these systems are subject to enhanced screening which includes both criminal and credit background checks, and/or other enhanced screening at the time of accepting the position and on an annual basis thereafter. The enhanced screening will need to be successfully completed prior to commencing employment or assignment.

Apply Now    

Join our Talent Community

Not ready to apply? Leave your information with us and we will keep you up to date with new career opportunities.

Things to note

Sign in to our application system to continue your job search or update your profile.

Current employees sign in here. Contractors sign in here.

Any information you provide is confidential and will only be viewed by our recruiters in an effort to fill open positions. In addition, the information you provide is subject to our privacy policy practices.

Please note that J.P. Morgan will not accept unsolicited approaches or speculative CVs, nor will J.P. Morgan be responsible for any related fees, from Third Party Firms who are not preferred suppliers.

The firm invites all interested and qualified candidates to apply for employment opportunities.

Need disability related assistance?

If you are a US or Canadian applicant with a disability who is unable to use our online tools to search and apply for jobs, please click here.

Important links

Click here to view the "EEO is the Law" poster.

Click here to view the "EEO is the Law" supplemental poster.

Click here to view our U.S. Pay Transparency Policy.

JPMorgan Chase is an equal opportunity and affirmative action employer Disability/Veteran.