Bank of America is looking for a Cyber Threat Hunter to join our Global Information Security team. This position is responsible for helping to design, build, and deliver major components of Bank of America's threat hunting strategy. You will work on a cross-functional team with deep knowledge of security processes and procedures, best practices, and red teaming to perform in-depth advanced log, system, and process analytics in order to pursue and prove or disprove hypotheses relating to malicious activity. Deep knowledge and experience with information security controls, infrastructure, and implementation techniques as well as familiarity with adversarial techniques, red teaming, and application and infrastructure assessment are key components for this role. You will demonstrate extraordinary organizational and cross-functional communication skills to drive analytics and investigations in to threats throughout the Enterprise.
In this role, you will work with all operational and technical teams within Global Information Security (GIS) in order to gain insight into critical controls and architectural specifics in order to develop analytics that identify malicious behavior accurately while maintaining a low false positive rate. This role advises on and reviews product assessments, policy adjustments, and architectural transformations that impact the global Corporation, and will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls. Direct coordination with Data Scientists to build, improve, and evolve analytical models as part of the evolution of protective strategies is a core component. The use of industry-accepted and reviewed frameworks to enable BAC to stay abreast of and participate in evolving security frameworks and concepts is a must.
Enterprise Role Overview:
Analyzes, improves, implements, and executes security controls proactively to prevent external threat actors from infiltrating company information or systems. Researches more advanced and complex attempts/efforts to compromise security protocols. Maintains or reviews security systems, assesses security policies that control access to systems, and provides regular status updates to the management team. Typically has 5-10 years of relevant experience and will act as an individual contributor.
Shift:1st shift (United States of America)
Hours Per Week:40
Learn more about this role