Logo
Bank of America

Senior Threat Hunter

Bank of America, Chicago, Illinois, United States, 60290

Save Job

Base pay range

$145,000.00/yr - $192,900.00/yr Overview

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day. Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve. Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us! Role

Our Cyber Threat Hunting, Intelligence & Defense team within Bank of America’s Cyber Security Defense function works to continuously strengthen the bank’s cyber security posture through research, threat simulations, threat hunting, and offensive security engagements. This team works with partners throughout the bank to both discover and develop mitigations from threats to help secure a critical infrastructure around the world that interacts with millions of customers. Responsibilities

The Senior Threat Hunter analyzes and correlates large data sets to uncover novel threats and attack techniques present within the bank’s environments. You will collaborate with data science, threat research, and cyber defense control teams to identify opportunities to develop analytical methods to detect advanced threat actors leveraging emerging tactics and techniques. You will develop and document new threat hunt hypotheses to increase the team’s ability to find threats that may otherwise go unidentified. You will also actively share knowledge and mentor junior members of the threat hunt team. You will work with all Cyber Defense operational and technical teams within Global Information Security (GIS) to gain insight into critical security controls and architectural specifics to develop valuable hunt strategies and analytics that identify malicious behavior accurately while maintaining a low false positive rate. You will advise on and review product assessments, policy adjustments, and architectural transformations that impact the global Corporation, and will be a thought leader in the design of detective, preventative, and proactive controls. Required Skills

Direct experience performing threat hunting in an active corporate environment. 8+ years of experience in a technical role in the areas of Security Operations, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence. Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain. Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue. Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways. Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution. Familiarity with offensive security strategies and assessment methodology. Experience explaining threat hunt objectives in plain English and able to communicate associated risk. Ability to see the larger picture when dealing with competing requirements and needs from across the organization to build consensus and drive results. Ability to navigate and work effectively across a complex, geographically dispersed organization. Experience with more than one enterprise-scale EDR and SIEM tools. Previous experience performing digital forensics or incident response on major security incidents. Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals. Beneficial but not required

Knowledge of basic Data Science concepts and processes. Experience with offensive security tools such as Cobalt Strike/Metasploit, OSINT techniques, and methods used to compromise large enterprise networks. Experience performing security analysis and threat hunting in Cloud environments such as Azure, M365, AWS. Job details

This job will be open and accepting applications for a minimum of seven days from the date it was posted. Shift:

1st shift (United States of America) Hours Per Week:

40 Additional information

Seniority level : Mid-Senior level Employment type : Full-time Job function : General Business, Management, and Business Development Industries : Banking

#J-18808-Ljbffr