A career with us is a journey, not a destination.
This could be the next best step in your technical career.
Join us.
As a Lead Architect at JPMorgan Chase within Consumer & Community Banking, you design and deliver robust, cloud-based architecture solutions across diverse technical domains—including Cyber, Security, Fraud, Risk, and Customer Identity & Access Management (CIAM).
Your role involves aligning technology strategies with business objectives, collaborating with stakeholders, fostering innovation, and driving technology roadmaps to improve user experience and support long-term strategic planning.
Job responsibilities
Develop, communicate, and manage the Technology RoadmapStay informed on security standards, authentication protocols, and productsLead Special Initiatives as directed by Senior ManagementEngages technical teams and business stakeholders to discuss and propose technical approaches to meet current and future needsDefines the technical target state of their product and drives achievement of the strategyParticipates in architecture governance bodiesEvaluates recommendations and provides feedback on new technologiesExecutes creative software solutions, design, development, and technical troubleshooting with the ability to think beyond routine or conventional approaches to build solutions or break down technical problemsDevelops secure and high-quality production code, and reviews and debugs code written by othersIdentifies opportunities to eliminate or automate remediation of recurring issues to improve overall operational stability of software applications and systemsLeads evaluation sessions with external vendors, startups, and internal teams to drive outcomes-oriented probing of architectural designs, technical credentials, and applicability for use within existing systems and information Required qualifications, capabilities, and skills
Formal training or certification on software engineering concepts and 5+ years applied experience Minimum of multiple past experiences in leading a team to architecture implementation of program, platform, and/or domain changes into productionAbility to personally architect and drive adoption of solutions and platforms into productionAbility to work independently across multiple initiatives simultaneously and with multiple design and delivery partners including vendors Strong written and verbal communication skills especially in communicating and influencing senior Business and Technology management Strong understanding of project management methodologies and tools including experience with agile delivery Strong skills in internet technology, information architecture, system design and practical cloud native experienceAbility to evaluate current and emerging technologies to recommend the best solutions for the future state architecture and experience in risk based authentication and step up protective measuresExperience in application security, .
OAuth, OIDC, FIDO, multi-factor authentication, TLS, securing hybrid native and web apps in mobile platformsEvaluate and recommend AI-driven identity management technologies and tools to improve system performance and security.Provide technical guidance and mentorship to development teams on identity management and AI best practices.Preferred qualifications, capabilities, and skills
Fundamental experience in defensive security constructs, including digital signatures, digital certificates, PKI, firewalls, and secure coding practices.Strong knowledge of open standards, web technologies, and web application servers.Familiarity with AI technologies, frameworks, and mobile application vulnerability discovery, including rooting or jail-breaking iOS and Android devices.Solid understanding of Data Security and Network Security, focusing on OSI reference model Layer 2 through Layer 7.Deep understanding of information security and risk management challenges, including mitigation and remediation strategies.Expertise in OWASP top 10 security issues for web and mobile, with knowledge of remediation patterns, threat modeling, and vulnerability assessment.Experience with Zero Trust Model, privileged session management, cloud security, and relevant certifications such as CISSP, CISA, and CISM.