Cyber Threat Hunter

Bank of America
Published
September 9, 2021
Location
Denver, CO
Category
Job Type

Description

Job Description:

Bank of America's Global Information Security team is looking for a Cyber Threat Hunter.

This position is responsible for helping to design, build, and deliver major components of Bank of America's threat hunting strategy. You will work on a cross-functional team with deep knowledge of security processes and procedures, best practices, and red teaming to perform in-depth advanced log, system, and process analytics in order to pursue and prove or disprove hypotheses relating to malicious activity. Deep knowledge and experience with information security controls, infrastructure, and implementation techniques as well as familiarity with adversarial techniques, red teaming, and application and infrastructure assessment are key components for this role. You will demonstrate extraordinary organizational and cross-functional communication skills to drive analytics and investigations in to threats throughout the Enterprise. 

In this role, you will work with all operational and technical teams within Global Information Security (GIS) in order to gain insight into critical controls and architectural specifics in order to develop analytics that identify malicious behavior accurately while maintaining a low false positive rate. This role advises on and reviews product assessments, policy adjustments, and architectural transformations that impact the global Corporation, and will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls. Direct coordination with Data Scientists to build, improve, and evolve analytical models as part of the evolution of protective strategies is a core component. The use of industry-accepted and reviewed frameworks to enable BAC to stay abreast of and participate in evolving security frameworks and concepts is a must. 

Required Skills: 

  • Deep experience with analytics as a focus area within Information Security 
  • Extensive knowledge of all domains within Information Security 
  • Familiarity with offensive strategies and assessment methodology 
  • Experience explaining analytics in plain English and ability with communicating associated risk 
  • Ability to see the larger picture when dealing with competing requirements and needs from across the teams in the organization in order to build consensus and drive results 
  • Ability to navigate and work effectively across a complex, geographically dispersed organization 
  • Experience with more than one EDR, SIEM, and manual log analysis techniques Mission-oriented with an emphasis on making the team successful 
  • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals 
  • Understanding of basic Data Science concepts and processes 
  • Deep experience working with industry-wide frameworks and standards like MITRE ATT&CK, STIX, TAXII, and SCAP

Enterprise Role Overview:

Analyzes, improves, implements, and executes security controls proactively to prevent external threat actors from infiltrating company information or systems. Researches more advanced and complex attempts/efforts to compromise security protocols. Maintains or reviews security systems, assesses security policies that control access to systems, and provides regular status updates to the management team. Typically has 5-10 years of relevant experience and will act as an individual contributor.

Job Band:

H5

Shift: 

1st shift (United States of America)

Hours Per Week:

40

Weekly Schedule:

Referral Bonus Amount:

0 -->

Job Description:

Bank of America's Global Information Security team is looking for a Cyber Threat Hunter.

This position is responsible for helping to design, build, and deliver major components of Bank of America's threat hunting strategy. You will work on a cross-functional team with deep knowledge of security processes and procedures, best practices, and red teaming to perform in-depth advanced log, system, and process analytics in order to pursue and prove or disprove hypotheses relating to malicious activity. Deep knowledge and experience with information security controls, infrastructure, and implementation techniques as well as familiarity with adversarial techniques, red teaming, and application and infrastructure assessment are key components for this role. You will demonstrate extraordinary organizational and cross-functional communication skills to drive analytics and investigations in to threats throughout the Enterprise. 

In this role, you will work with all operational and technical teams within Global Information Security (GIS) in order to gain insight into critical controls and architectural specifics in order to develop analytics that identify malicious behavior accurately while maintaining a low false positive rate. This role advises on and reviews product assessments, policy adjustments, and architectural transformations that impact the global Corporation, and will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls. Direct coordination with Data Scientists to build, improve, and evolve analytical models as part of the evolution of protective strategies is a core component. The use of industry-accepted and reviewed frameworks to enable BAC to stay abreast of and participate in evolving security frameworks and concepts is a must. 

Required Skills: 

  • Deep experience with analytics as a focus area within Information Security 
  • Extensive knowledge of all domains within Information Security 
  • Familiarity with offensive strategies and assessment methodology 
  • Experience explaining analytics in plain English and ability with communicating associated risk 
  • Ability to see the larger picture when dealing with competing requirements and needs from across the teams in the organization in order to build consensus and drive results 
  • Ability to navigate and work effectively across a complex, geographically dispersed organization 
  • Experience with more than one EDR, SIEM, and manual log analysis techniques Mission-oriented with an emphasis on making the team successful 
  • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals 
  • Understanding of basic Data Science concepts and processes 
  • Deep experience working with industry-wide frameworks and standards like MITRE ATT&CK, STIX, TAXII, and SCAP

Enterprise Role Overview:

Analyzes, improves, implements, and executes security controls proactively to prevent external threat actors from infiltrating company information or systems. Researches more advanced and complex attempts/efforts to compromise security protocols. Maintains or reviews security systems, assesses security policies that control access to systems, and provides regular status updates to the management team. Typically has 5-10 years of relevant experience and will act as an individual contributor.

Job Band:

H5

Shift: 

1st shift (United States of America)

Hours Per Week:

40

Weekly Schedule:

Referral Bonus Amount:

0

Job Description:
Bank of America's Global Information Security team is looking for a Cyber Threat Hunter.

This position is responsible for helping to design, build, and deliver major components of Bank of America's threat hunting strategy. You will work on a cross-functional team with deep knowledge of security processes and procedures, best practices, and red teaming to perform in-depth advanced log, system, and process analytics in order to pursue and prove or disprove hypotheses relating to malicious activity. Deep knowledge and experience with information security controls, infrastructure, and implementation techniques as well as familiarity with adversarial techniques, red teaming, and application and infrastructure assessment are key components for this role. You will demonstrate extraordinary organizational and cross-functional communication skills to drive analytics and investigations in to threats throughout the Enterprise. 

In this role, you will work with all operational and technical teams within Global Information Security (GIS) in order to gain insight into critical controls and architectural specifics in order to develop analytics that identify malicious behavior accurately while maintaining a low false positive rate. This role advises on and reviews product assessments, policy adjustments, and architectural transformations that impact the global Corporation, and will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls. Direct coordination with Data Scientists to build, improve, and evolve analytical models as part of the evolution of protective strategies is a core component. The use of industry-accepted and reviewed frameworks to enable BAC to stay abreast of and participate in evolving security frameworks and concepts is a must. 

Required Skills: 

  • Deep experience with analytics as a focus area within Information Security 
  • Extensive knowledge of all domains within Information Security 
  • Familiarity with offensive strategies and assessment methodology 
  • Experience explaining analytics in plain English and ability with communicating associated risk 
  • Ability to see the larger picture when dealing with competing requirements and needs from across the teams in the organization in order to build consensus and drive results 
  • Ability to navigate and work effectively across a complex, geographically dispersed organization 
  • Experience with more than one EDR, SIEM, and manual log analysis techniques Mission-oriented with an emphasis on making the team successful 
  • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals 
  • Understanding of basic Data Science concepts and processes 
  • Deep experience working with industry-wide frameworks and standards like MITRE ATT&CK, STIX, TAXII, and SCAP

Enterprise Role Overview:

Analyzes, improves, implements, and executes security controls proactively to prevent external threat actors from infiltrating company information or systems. Researches more advanced and complex attempts/efforts to compromise security protocols. Maintains or reviews security systems, assesses security policies that control access to systems, and provides regular status updates to the management team. Typically has 5-10 years of relevant experience and will act as an individual contributor.
Shift:

1st shift (United States of America)

Hours Per Week: 

40

Apply
Drop files here browse files ...

Related Jobs

Retail Parts Pro   Denver, CO new
September 22, 2021
Senior Technology Sourcing Manager   Littleton, CO new
September 22, 2021
Head of Technology   Denver, CO new
September 22, 2021
September 22, 2021
September 22, 2021

Author: