You can encrypt data that you store in the database, but the encryption key has to come from somewhere. This is either hard coded in your code (which can be retreived by reverse engineering) or stored in the Jira database or the file system, which will probably also be available to the attacker if they have access to the database.