National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Product Security - Cyber Security Architect - Chase UK

eFinancialCareers
Greater London
3 weeks ago
Create job alert

Product Security - Cyber Security Architect - Chase UKJob Description

At JP Morgan Chase, we understand that customers seek exceptional value and a seamless experience from a trusted financial institution. That's why we launched Chase UK to transform digital banking with intuitive and enjoyable customer journeys. With a strong foundation of trust established by millions of customers in the US, we have been rapidly expanding our presence in the UK and soon across Europe. We have been building the bank of the future from the ground up, offering you the chance to join us and make a significant impact.

Job summary

As a Product Security Lead in the Cybersecurity & Technology Controls (CTC) team for the International Consumer Bank, you will work proactively with your technology and business colleagues to identify and quantify security issues within their business and empower them to take decisive risk decisions at speed and scale. You're a security expert with a strong mix of technical andmunication skills and are passionate about enabling safe and secure innovation. You will work with some of the best and brightest cybersecurity and technology engineers to solveplex problems which will both challenge you and help you develop your skills in one of the most innovative and respectedpanies in the world.

Job responsibilities

Cultivate security culture with your product technology and business colleagues. Products that have the right security culture will strive to prioritize sustainable controls and driving real risk reduction oues. Perform threat modelling with application teams so they adopt our control products and create products that are secure from the start. Know your product across its breadth and depth. Be fluent in your product's strategy and roadmap as well as its key investment programs. Identify unfamiliar technologyponents, capabilities, and business concepts and be self-motivated to learn all about them, applying critical thinking to identify hidden issues along the way. Learn from your product and cybersecurity teams and share best practice in both directions. Be recognized in your product as the clear point of escalation and subject matter expert for IT Risk and Cyber domains. Partner and influence across your product's supply chain. Work collaboratively with product, technology, and business colleagues on an on-going basis for business-as-usual audit and regulatory engagements, risk activities and project initiatives. Work closely with Third Party Oversight teams to ensure effective technology risk management of vendors engaged by technology partners, with a focus on Cloudputing / emerging technologies.


Required qualifications, capabilities, and skills:
Deep understanding of public cloudputing, with a focus on applying controls to secure data, ensure resiliency, and maintain availability. Proficient in well-architected frameworks for cloud security. Capable of assessing architecture and implementing cybersecurity controls. Experience with cybersecurity patterns and best practices. Hands-on experience and strong knowledge of one or more cloud platforms such as AWS, and/or Google Cloud Platform, and/ or Azure. Familiarity with Terraform or Cloud Formation is desirable. Solid understanding of cloud services, including PaaS, IaaS, and SaaS, as well as Kubernetes solutions (, Anthos, AKS, EKS). Experience with cloud security posture management, cloud security, cloud security systems, cybersecurity systems Good understanding of Security Operations Center (SOC) operations and cloud-native monitoring systems. Ability to read logs, understand detection rules, and propose effective threat mitigations. Knowledge of security best practices and DevSecOps methodologies. Familiarity with SAST (Static Application Security Testing), DAST (Dynamic Application Security Testing), and MAST (Mobile Application Security Testing) systems is desirable. Understanding of network security concepts, including cloud networking, network design, and firewalls etc. Strong understanding of threat modeling and the ability to identify vulnerabilities in architectural design. Strong written and verbalmunication skills
#ICBCareers #ICBEngineering

About Us

Morgan is a global leader in financial services, providing strategic advice and products to the world's most prominent corporations,ernments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.

We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at ourpany. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable amodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an amodation.

About the Team

Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of ourpany, ensuring that we're setting our businesses, clients, customers and employees up for success. Job ID 300

Related Jobs

View all jobs

Product Security Architect

Product Security - Cyber Security Architect - Chase UK

Staff Product Security Engineer

Senior Product Security Architect

Chief Product Security Engineer

Senior Product Security Architect

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.