hero






Information Security Threat Management Specialist

Bank of America

Bank of America

IT
Denver, CO, USA · Chicago, IL, USA · United States · Remote
Posted on Jul 10, 2024

Job Description:

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.

One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.

Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.

Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!


This job is responsible for supporting evaluations of cyber security threats and updating defensive capabilities to reduce the bank's risk of exposure. Key responsibilities include conducting analyses of the threat environment and threats to the bank, including post incident analysis, applying a multi-faceted situational awareness of cyber security processes to protect against threats, and implementing proactive defensive actions for the security, continuity, and confidentiality of information.

Are you passionate about working with the best information security team in the world? Bank of America is hiring top talent to join our team.

The Identity Defense team aims to mitigate incidents through monitoring of network account usage, authentication activities and authentication behaviors. The team is responsible to reduce the risk associated with misuse or illicit use of accounts which grant access to Bank of America's internal workforce network. An Identity Defense analyst is accountable for researching, designing, engineering, implementing, and supporting solutions to prevent and detect anomalous use of accounts.

The Identity Defense Specialist will support design efforts to build out new processes, controls, and supporting governance related to implementation of human and non-human account monitoring to protect the Bank. You will utilize in-depth technical knowledge and business requirements to help implement scalable solutions, inclusive of monitoring, alerting, and escalation frameworks focused on core account protections. Leveraging your knowledge of both common and emerging threats related to account take-over, you will have an opportunity to proactively develop, implement, and influence controls and policy within the digital identity domain. You will partner with leaders from line of business organizations to triage security events and report on impacting security incidents.

The Analyst will regularly collaborate with experts in and out of our team, both in country and in other regions, so excellent communication skills are very important. The role will also involve discussion with employees as part of alert analysis and disposition. If you are seeking a demanding role within Global Information Security (GIS) and have the required skills, this will be a great opportunity for you. Typically, applicants should have 3 to 5 years of cybersecurity or engineering experience.

Responsibilities include, but are not limited to:

  • Actively investigate alerts related to potentially anomalous behavior/activity.

  • Confidently and professionally interview/question users to determine or confirm root cause.

  • Communicate effectively with response and business partners.

  • Build and monitor Splunk alerting and dashboards.

  • Identify areas for further process automation, simplification, and improvement.

  • Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.

  • Risk management.

  • Comprehensively document analysis, investigative activities, actions, etc.

  • Ability to work non-standard hours, to include occasional on-call time during nights, weekends, and holidays.

Required Qualifications:

  • 3 + years of experience with Information Security related activities.

  • 2 + years of experience in an operations focused information security role.

  • Experience conducting analysis/investigation and containment of potential data breaches or cyber security incidents.

  • Ability to analyze data and evaluate relevance to a specific incident under investigation.

  • Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.

  • Ability to exercise independent judgment when responding to alerts.

  • Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.

  • Familiarity with security vulnerabilities exploits and hacker techniques.

Desired Qualifications:

  • Familiarity identity management standards, social engineering TTPs, and the incident response lifecycle.

  • Familiarity with Splunk, and the ability to build queries, alerts, dashboards, etc.

  • Knowledgeable of current authentication-based exploits.

  • Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.

  • Supportive and can work well as part of a team as well as independently.

  • Can remain calm under pressure.

  • Ability to work in a strong team-orientated environment with a sense of urgency and resilience.

  • Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.

The candidate selected for this role will be required to secure a Security+, GSEC, GCIH or equivalent certification within 6 months of hire

This job will be open and accepting applications for a minimum of seven days from the date it was posted.

Shift:

1st shift (United States of America)

Hours Per Week:

40