A career with us is a journey, not a destination. This could be the next best step in your technical career. Join us.
As a Lead Architect at JPMorgan Chase within Consumer & Community Banking, you'design and deliver robust, cloud-based architecture solutions across diverse technical domains including Cyber, Security, Fraud, Risk, and Customer Identity & Access Management (CIAM). Your role involves aligning technology strategies with business objectives, collaborating with stakeholders, fostering innovation, and driving technology roadmaps to improve user experience and support long-term strategic planning.
Job responsibilities
- Develop, communicate, and manage the Technology Roadmap
- Stay informed on security standards, authentication protocols, and products
- Lead Special Initiatives as directed by Senior Management
- Engages technical teams and business stakeholders to discuss and propose technical approaches to meet current and future needs
- Defines the technical target state of their product and drives achievement of the strategy
- Participates in architecture governance bodies
- Evaluates recommendations and provides feedback on new technologies
- Executes creative software solutions, design, development, and technical troubleshooting with the ability to think beyond routine or conventional approaches to build solutions or break down technical problems
- Develops secure and high-quality production code, and reviews and debugs code written by others
- Identifies opportunities to eliminate or automate remediation of recurring issues to improve overall operational stability of software applications and systems
- Leads evaluation sessions with external vendors, startups, and internal teams to drive outcomes-oriented probing of architectural designs, technical credentials, and applicability for use within existing systems and information
Required qualifications, capabilities, and skills
- Formal training or certification on software engineering concepts and 5+ years applied experience
- Minimum of multiple past experiences in leading a team to architecture implementation of program, platform, and/or domain changes into production
- Ability to personally architect and drive adoption of solutions and platforms into production
- Ability to work independently across multiple initiatives simultaneously and with multiple design and delivery partners including vendors
- Strong written and verbal communication skills especially in communicating and influencing senior Business and Technology management
- Strong understanding of project management methodologies and tools including experience with agile delivery
- Strong skills in internet technology, information architecture, system design and practical cloud native experience
- Ability to evaluate current and emerging technologies to recommend the best solutions for the future state architecture and experience in risk based authentication and step up protective measures
- Experience in application security, e. g. OAuth, OIDC, FIDO, multi-factor authentication, TLS, securing hybrid native and web apps in mobile platforms
- Evaluate and recommend AI-driven identity management technologies and tools to improve system performance and security.
- Provide technical guidance and mentorship to development teams on identity management and AI best practices.
Preferred qualifications, capabilities, and skills
- Fundamental experience in defensive security constructs, including digital signatures, digital certificates, PKI, firewalls, and secure coding practices.
- Strong knowledge of open standards, web technologies, and web application servers.
- Familiarity with AI technologies, frameworks, and mobile application vulnerability discovery, including rooting or jail-breaking iOS and Android devices.
- Solid understanding of Data Security and Network Security, focusing on OSI reference model Layer 2 through Layer 7.
- Deep understanding of information security and risk management challenges, including mitigation and remediation strategies.
- Expertise in OWASP top 10 security issues for web and mobile, with knowledge of remediation patterns, threat modeling, and vulnerability assessment.
- Experience with Zero Trust Model, privileged session management, cloud security, and relevant certifications such as CISSP, CISA, and CISM.