Application Lead Security Engineer - Greenfield Project

JPMorganChase
London
9 months ago
Applications closed

Related Jobs

View all jobs

Technical Programme Manager

Senior DevSecOps Engineer - Outside IR35

Senior AI Automation Engineer

BIM Manager

Cybersecurity Specialist

Senior Customer Deployment Specialist

Application Lead Security Engineer - Greenfield Project

Join to apply for theApplication Lead Security Engineer - Greenfield Projectrole atJPMorgan Chase

Job Description

Be an integral part of a team that's constantly pushing the envelope to enhance, build, and deliver top-notch technology products.

As an Application Security Engineer at JPMorgan Chase within the Global Banking Platform, you will be a key member of our team. Your role will involve delivering software solutions that meet pre-defined functional and user requirements, with an added focus on preventing misuse, circumvention, and malicious behaviour. You will be responsible for implementing critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions, all in support of the firm's business objectives.

We are building the next generation core banking platform that will operate at a global scale and will support hundreds of millions of accounts. We use cloud native technologies, and the work involves the development of micro-services, integrations, dashboards, production support tools and CI/CD pipelines.

Initially, successful candidates for the role will be seconded to a FinTech software partner. This is an exciting opportunity to experience the day to day of a fintech while being fully backed by JPMorgan Chase. After the conclusion of the secondment, all secondees will return to JPMorgan Chase and apply the knowledge, technologies and practices acquired to develop critical services supporting GBP’s worldwide journey to the cloud.

Job Responsibilities

  • Drive improvements to product security posture through strategic planning and collaboration with development and infrastructure teams, with trust, autonomy, and influence.
  • Produce production web-scale application security design.
  • Review and produce data privacy and financial regulatory functional and non-functional designs.
  • Perform design reviews and Threat Modelling of services and products.
  • Perform vulnerability assessments and security testing.
  • Provide subject matter expertise on security and privacy throughout the Software Development lifecycle.
  • Liaise with development teams for design, code reviews & education.
  • Contribute to security strategy, tooling selection, and creation.
  • Conduct regular security assessments and code reviews.

Required Qualifications, Capabilities, and Skills

  • Formal training or certification in security engineering concepts and applied experience.
  • Expertise with a programming language (e.g., Python, Go, or Java).
  • Experience with security in a DevOps environment.
  • Experience in web application penetration testing and security tooling (e.g., Burp Suite, Web/Network Scanners, Static code analyzers).
  • Coding experience for automating/integrating security tools and creating security tools.
  • Knowledge of security in distributed systems at scale.
  • Cloud and container technology knowledge (e.g., AWS, GCP, Kubernetes, Docker).
  • Experience performing security design reviews, threat modelling, and risk assessments.
  • Knowledge of application security issues.

Preferred Qualifications, Capabilities, and Skills

  • Professional security qualifications are desirable.
  • Contributions to the security community (public research, blogging, presentations, etc.).
  • Awareness and experience with the Data Protection Act, ISO 27001, and PCI-DSS.

About Us

J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world’s most prominent corporations, governments, wealthy individuals, and institutional investors. Our approach to serving clients drives everything we do. We aim to build trusted, long-term partnerships to help our clients achieve their objectives.

We value diversity and inclusion, and are an equal opportunity employer. We do not discriminate based on protected attributes and provide reasonable accommodations for religious practices, mental health, or physical disabilities. Visit our FAQs for more information about requesting accommodations.

About The Team

Our Consumer & Community Banking Group depends on innovators like you to serve consumers, small businesses, municipalities, and non-profits. You'll support the delivery of award-winning tools and services covering banking, lending, mortgages, credit cards, payments, auto finance, and investment advice. The group focuses on developing and delivering cutting-edge mobile applications, digital experiences, and next-generation banking technology solutions.

#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.