Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

Digital Forensics and Incident Response (DFIR) Vice President

JP Morgan
London
11 months ago
Applications closed

Related Jobs

View all jobs

OT Cyber Security Engineer

Security Operations Centre Analyst

IT Security Analyst

Assessor/Trainer in Cyber and IT

Cyber Security and Operational Technology Support Engineer

Cyber Security Engineer

Shape the future of cybersecurity through advanced digital forensics, contributing to firm-wide innovation and security.

Find out if this opportunity is a good fit by reading all of the information that follows below.

As a Digital Forensics Vice President inthe Cyber and Tech Controls line of business, you will enhance the firm's cybersecurity posture through the collection, preservation, and examination of digital evidence. Your expertise in digital forensics principles and practices supports incident response efforts, litigation, and regulatory proceedings. Your expertise will enable you to make strategic decisions to reduce firm-wide risks. Fostering collaboration and leveraging advanced technical knowledge, you contribute to innovative solutions and continuous improvement in the digital landscape.

Job responsibilities:Use digital forensic tools and techniques to support internal fraud and employee investigations and use host-based and network forensic capabilities to develop information regarding IOCs and TTPs for threat actors and malware, which can be shared amongst other internal teamsLeverage practical experience to develop methodologies for proactive hunting of threat actors in the absence of alerting or rules-based appliancesConduct detailed analysis of systems where breaches of critical IT infrastructure may have occurred and provide root cause analysis, impact assessments and rapid response to aid detection of those responsible and make recommendations to assist prevention of similar incidentsPrepare in-depth investigation reports into forensic investigations, breach reports, privacy incidents and data exposure type casesAssist with the development of in-house training programs to ensure world class high-tech investigation standardsDemonstrate strong written and verbal communication skills necessary to effectively interpret investigative requirements, provide technical guidance, and provide detailed documentation of analysis findingDevelop and implement innovative forensic research and development projects to stay ahead of emerging technologies and enhance cybersecurity postureDefine and execute procedures for identifying, managing, collecting, preserving, analyzing, and documenting findingsDevelop and implement digital-forensics and data-protection security solutions and standards, adhering to industry best practicesDesign and customize audit procedures for JPMorgan Chase's digital forensics environment, evaluate incident response and evidence handling procedures, and provide improvement recommendationsCollaborate with Legal, Technology, and HR to support incident response, litigation, and regulatory proceedingsRequired qualifications, capabilities, and skills:

5+ years of experience in digital forensics, incident response, e-discovery, and malware analysisExpert knowledge of computer forensic best practices and industry standard methodologies for investigating host-based and network analysis.A proven track record in live digital forensics, log-file analysis and network forensics.Experience with investigating data compromise events, networking protocols and packet analysis, and working with industry standard tools (X-Ways, EnCase, Volatility, Rekall, Wireshark, SIFT, Cellebrite, etc.)Able to work independently and/or with a team to conduct forensic examinationsAble to articulate and visually present complex forensic investigation and analysis resultsThe ability to coordinate, work with and gain the trust of business stakeholders to achieve a desired objectiveStrong attention to detail in conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigationExpertise in multiple scripting languages (e.g., Python, Bash, JavaScript, PowerShell, etc.) and ability to create, debug, and modify scripts to automate tasks and manipulate dataAdvanced knowledge of digital forensics tools and techniques, including memory forensics, network traffic analysis, and reverse engineering of malwareProven ability to develop digital forensics solutions and standardsPreferred qualifications, capabilities, and skills:

Experience with malware reverse engineeringIndustry standard digital forensics certifications (GCFA, GNFA, GCFE, CFCE, etc.)Industry standard information security technology certifications (GCIH, GREM, etc.)Ability to automate tasks using a scripting language (Python, Perl, Ruby, Bash, etc.)

#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Recruitment Trends 2025 (UK): What Job Seekers Must Know About Today’s Hiring Process

Summary: UK cyber security hiring has shifted from title‑led CV screens to capability‑driven assessments that emphasise incident readiness, cloud & identity security, detection engineering, governance/risk/compliance (GRC), measurable MTTR/coverage gains & secure‑by‑default engineering. This guide explains what’s changed, what to expect in interviews, & how to prepare—especially for SOC analysts, detection engineers, blue/purple teamers, penetration testers, cloud security engineers, DFIR, AppSec, GRC & security architecture. Who this is for: SOC & detection engineers, security operations leads, DFIR analysts, penetration testers/red teamers, purple teamers, AppSec/DevSecOps engineers, security architects, cloud security engineers, identity/IAM engineers, vulnerability managers, GRC/compliance specialists, product security & security programme managers targeting roles in the UK.

Why Cyber Security Careers in the UK Are Becoming More Multidisciplinary

Cyber security used to be viewed primarily as a technical discipline: firewalls, encryption, intrusion detection, penetration testing. In the UK today, it’s far broader. Organisations now face complex legal frameworks, ethical dilemmas, human-behaviour risks, communication challenges & usability hurdles. This shift means cyber security careers are becoming more multidisciplinary. From protecting NHS patient records to defending financial services, securing supply chains & safeguarding national infrastructure, cyber security now touches every sector. Employers increasingly want professionals who understand law, ethics, psychology, linguistics & design alongside traditional technical skills. In this article, we’ll explore why UK cyber security careers are expanding in this way, how these five disciplines shape the profession, and what job-seekers & employers need to know to thrive in this new landscape.

Cyber Security Team Structures Explained: Who Does What in a Modern Cyber Security Department

Cyber security has become a top priority for UK organisations of all sizes. From small businesses to financial institutions, healthcare providers, and government bodies, the risk of cyber attack is now a constant concern. Threats are more sophisticated, regulations more demanding, and customers more aware of data privacy than ever before. But defending against cyber threats isn’t simply about having the right tools — it’s about having the right team. A modern cyber security department relies on clearly defined roles and responsibilities to ensure that defences are proactive, incidents are managed swiftly, and compliance is maintained. This article explains the structure of a modern cyber security team, the roles you’ll typically find within it, how they collaborate, and what skills, qualifications, and salaries are expected in the UK job market.