girl looking into her desktop
Back to search results

Cyber Crime Malware Reverse Engineer

Denver, Colorado;

Job Description:

Are you passionate about working with the best information security team in the world?  Bank of America is hiring top talent to join our team. 

The Cyber Crime Prevention function within Global Information Security is responsible for working across the enterprise to reduce exposure to cyber crime thereby instilling continued confidence of our clients, customers, and shareholders. 

The Cyber Crime Malware Reverse Engineer is responsible to assist in executing the overall Cyber Crime Response strategy with a focus on malware.  The candidate will perform static and dynamic malware analysis to identify indicators of compromise (IOCs), anomalous behaviors, and other signals to detect consumer-centric malware

Key Responsibilities 
• Perform static and dynamic malware analysis to identify indicators of compromise (IOCs), anomalous behaviors, and other signals to detect consumer-centric malware 
• Monitor alerts, events, and incidents from multiple technologies to detect and report anomalies to response and fraud operation teams 
• Serve as the subject matter expert (SME) on cross-functional initiatives to improve malware analysis, mitigation, and detection capabilities 
• Lead, design, and execute on research projects and implement new malware analysis tools, and stay on top of the latest technology and security landscape trends 
• Author reports and brief stakeholders on threat actor activity, trends, tools, tactics, techniques, and procedures (TTPs) 
• Help drive cybercrime dismantling strategies through malware analysis, including understanding how consumer-centric malware behaves across multiple platforms (mobile and other computing devices) and how it plays into the broader cybercrime ecosystem 

Minimum Qualifications 
• Bachelor’s Degree in Computer Science, Computer Engineering, or equivalent experience 
• 5+ years of experience as a malware reverse engineer or researcher, and have the ability to triage and analyze emerging threats and malware 
• 3+ years of experience in analyzing network traffic, synthesizing threat intelligence, and building detection rules 
• Effective written and verbal communication including the ability to describe malware analysis findings, risk, and other threat factors to non-technical and executive audiences 
• Ability to effectively collaborate with internal stakeholders and partners and external partners 

Preferred Qualifications 
• Strong background in threat intelligence and malware analysis 
• Track financially-motivated threat actors that might target the financial industry and its clients 
• Possess excellent knowledge in common malware defensive capabilities, such as anti-VM and anti-debugger techniques, common packers, compression algorithms, etc. 
• Experience presenting to different stakeholders of varying technical depth
• Proficiency with static and dynamic analysis tools, such as IDA Pro, x32/64dbg, packet analyzers, sandboxes, etc.
• Ability to instantiate and manage a malware analysis lab (bare-metal, VMs) 
• Certified with GREM/GCFE/GCFA (or equivalent) 
 

Job Band:

H5

Shift: 

1st shift (United States of America)

Hours Per Week:

40

Weekly Schedule:

Referral Bonus Amount:

0

Job Description:

Are you passionate about working with the best information security team in the world?  Bank of America is hiring top talent to join our team. 

The Cyber Crime Prevention function within Global Information Security is responsible for working across the enterprise to reduce exposure to cyber crime thereby instilling continued confidence of our clients, customers, and shareholders. 

The Cyber Crime Malware Reverse Engineer is responsible to assist in executing the overall Cyber Crime Response strategy with a focus on malware.  The candidate will perform static and dynamic malware analysis to identify indicators of compromise (IOCs), anomalous behaviors, and other signals to detect consumer-centric malware

Key Responsibilities 
• Perform static and dynamic malware analysis to identify indicators of compromise (IOCs), anomalous behaviors, and other signals to detect consumer-centric malware 
• Monitor alerts, events, and incidents from multiple technologies to detect and report anomalies to response and fraud operation teams 
• Serve as the subject matter expert (SME) on cross-functional initiatives to improve malware analysis, mitigation, and detection capabilities 
• Lead, design, and execute on research projects and implement new malware analysis tools, and stay on top of the latest technology and security landscape trends 
• Author reports and brief stakeholders on threat actor activity, trends, tools, tactics, techniques, and procedures (TTPs) 
• Help drive cybercrime dismantling strategies through malware analysis, including understanding how consumer-centric malware behaves across multiple platforms (mobile and other computing devices) and how it plays into the broader cybercrime ecosystem 

Minimum Qualifications 
• Bachelor’s Degree in Computer Science, Computer Engineering, or equivalent experience 
• 5+ years of experience as a malware reverse engineer or researcher, and have the ability to triage and analyze emerging threats and malware 
• 3+ years of experience in analyzing network traffic, synthesizing threat intelligence, and building detection rules 
• Effective written and verbal communication including the ability to describe malware analysis findings, risk, and other threat factors to non-technical and executive audiences 
• Ability to effectively collaborate with internal stakeholders and partners and external partners 

Preferred Qualifications 
• Strong background in threat intelligence and malware analysis 
• Track financially-motivated threat actors that might target the financial industry and its clients 
• Possess excellent knowledge in common malware defensive capabilities, such as anti-VM and anti-debugger techniques, common packers, compression algorithms, etc. 
• Experience presenting to different stakeholders of varying technical depth
• Proficiency with static and dynamic analysis tools, such as IDA Pro, x32/64dbg, packet analyzers, sandboxes, etc.
• Ability to instantiate and manage a malware analysis lab (bare-metal, VMs) 
• Certified with GREM/GCFE/GCFA (or equivalent) 
 

Shift:

1st shift (United States of America)

Hours Per Week: 

40

Learn more about this role

Full time

JR-21069802

Band: H5

Manages People: No

Travel: Yes, 5% of the time

Manager:

Talent Acquisition Contact:

Adam Waller

Referral Bonus:

0

Colorado job seekers

Colorado pay range:

$86,000 - $126,400 annualized salary, offers to be negotiated based on experience, education and skill set.

Discretionary incentive eligible

This role is eligible to participate in the annual discretionary plan. Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors, the performance and contributions of their line of business and/or group; and the overall success of the Company.

Benefits

This role is currently benefits eligible. We provide industry-leading benefits, resources and support to our employees so they can make a genuine impact and contribute to the sustainable growth of our business and the communities we serve.