girl looking into her desktop
Back to search results

Assistant Vice President / Vice President, Cyber Threat Intelligence Analyst, Global Information Security

Singapore, , Singapore;

Job Description:

Your background

  • 3-5 years of InfoSec experience.  This is a hands-on role where the candidate will be involved in identifying and tracking cyber threats on a daily basis.
  • The candidate should exhibit a firm understanding of the cyber threat landscape, geopolitical issues that could have cyber impacts, security vulnerabilities, exploits, malware, digital forensics, network security vulnerabilities, exploits and attacks.
  • The candidate should be knowledgeable of emerging technologies and trends.
  • Technical or information security certifications are a strong plus.
  • Familiarity with JIRA, Python, JAVA and SQL are a strong plus.
  • Experience working in a Security Operations, Incident Management or Fusion Center operation.
  • Minimum 1 year working in a 24/5 or 24/7 operational environment.
  • This position requires strong verbal and written communication skills.
  • Bachelor’s degree or higher-level education is a strong plus.
  • Technical or information security certifications are also a strong plus.

What you can expect

Cyber Threat Intelligence (CTI) works with partners, both internal and external, to reduce risk to the firm and to the financial sector at large. Stakeholders include cyber-security response teams, internal lines of business, senior leadership and external organizations such as law enforcement, industry peers, key suppliers, customers and intelligence sharing partners.  The Cyber Threat Intelligence (CTI) Triage team is responsible for receiving, documenting, assessing risk, and if required, escalating all incoming cyber threat information.

The CTI Triage Analyst is responsible for responsible for providing timely situational awareness, monitor a wide variety of sources, looking for indications and warnings of threats and attacks.

The CTI Triage Analyst rapidly translates indicators of threat into actionable information to help reduce the potential impact to the operations of the business. This is an opportunity to work with a best in class global enterprise team. The candidate will have exposure to the latest developments in technology and latest threats.

What you will do

  • Work in a tactical/technical role reviewing and cultivating intelligence sources, analyzing information, creating intelligence, and hunting for exposures or related incidents.
  • Participate with other triage analysts in a follow-the-sun model to provide consistent support for Cyber Security Operations.
  • Contribute to daily internal GIS ops calls, contribute to intelligence briefings for CSD leadership.
  • Work within the CTOC communicating with internal teams and minimizing response times for critical events.
  • Identify, escalate and debate recommended actions that strengthen controls.
  • Operate within an established Escalation Matrix to determine report priority and messaging to operations and senior executives throughout GIS and the lines of business, escalate issues to control teams and management in a timely manner with appropriate information regarding risk and impact.
  • Continually and consistently review triage processes to identify reforms that could add to increased speed, efficiency and accuracy in reporting.
  • Ensure immediate notifications are followed by in-depth coordination and collaboration with control owners and appropriate business partners and lines of business.
  • Exercise independent judgment in methods, techniques and evaluation criteria for obtaining results.
  • Participate in technical bridge lines to facilitate the identification, mitigation and containment of cyber-security incidents.

About Bank of America

Our purpose as a firm is to make financial lives better, through the power of every connection. Across the world, we partner with leading corporate and institutional investors through our offices in more than 35 countries. In the U.S. alone, we serve almost all of the Fortune 500 companies and approximately 67 million consumer and small-business clients. We provide a full suite of financial products and services, from banking and investments to asset and risk management. We cover a broad range of asset classes, making us a global leader in corporate and investment banking, sales and trading.

Connecting Asia Pacific to the world

Our Asia Pacific team is spread across 19 cities in 12 markets. We are focused on connecting Asia to the world and the world to Asia, using our global expertise to ensure success is shared between us, our clients and our communities. Our regional footprint covers 12 currencies, more than a dozen languages and five time zones, placing us firmly among the region’s leading financial services companies.

Job Band:

H5

Shift: 

Hours Per Week:

40

Weekly Schedule:

Referral Bonus Amount:

0

Job Description:

Your background

  • 3-5 years of InfoSec experience.  This is a hands-on role where the candidate will be involved in identifying and tracking cyber threats on a daily basis.
  • The candidate should exhibit a firm understanding of the cyber threat landscape, geopolitical issues that could have cyber impacts, security vulnerabilities, exploits, malware, digital forensics, network security vulnerabilities, exploits and attacks.
  • The candidate should be knowledgeable of emerging technologies and trends.
  • Technical or information security certifications are a strong plus.
  • Familiarity with JIRA, Python, JAVA and SQL are a strong plus.
  • Experience working in a Security Operations, Incident Management or Fusion Center operation.
  • Minimum 1 year working in a 24/5 or 24/7 operational environment.
  • This position requires strong verbal and written communication skills.
  • Bachelor’s degree or higher-level education is a strong plus.
  • Technical or information security certifications are also a strong plus.

What you can expect

Cyber Threat Intelligence (CTI) works with partners, both internal and external, to reduce risk to the firm and to the financial sector at large. Stakeholders include cyber-security response teams, internal lines of business, senior leadership and external organizations such as law enforcement, industry peers, key suppliers, customers and intelligence sharing partners.  The Cyber Threat Intelligence (CTI) Triage team is responsible for receiving, documenting, assessing risk, and if required, escalating all incoming cyber threat information.

The CTI Triage Analyst is responsible for responsible for providing timely situational awareness, monitor a wide variety of sources, looking for indications and warnings of threats and attacks.

The CTI Triage Analyst rapidly translates indicators of threat into actionable information to help reduce the potential impact to the operations of the business. This is an opportunity to work with a best in class global enterprise team. The candidate will have exposure to the latest developments in technology and latest threats.

What you will do

  • Work in a tactical/technical role reviewing and cultivating intelligence sources, analyzing information, creating intelligence, and hunting for exposures or related incidents.
  • Participate with other triage analysts in a follow-the-sun model to provide consistent support for Cyber Security Operations.
  • Contribute to daily internal GIS ops calls, contribute to intelligence briefings for CSD leadership.
  • Work within the CTOC communicating with internal teams and minimizing response times for critical events.
  • Identify, escalate and debate recommended actions that strengthen controls.
  • Operate within an established Escalation Matrix to determine report priority and messaging to operations and senior executives throughout GIS and the lines of business, escalate issues to control teams and management in a timely manner with appropriate information regarding risk and impact.
  • Continually and consistently review triage processes to identify reforms that could add to increased speed, efficiency and accuracy in reporting.
  • Ensure immediate notifications are followed by in-depth coordination and collaboration with control owners and appropriate business partners and lines of business.
  • Exercise independent judgment in methods, techniques and evaluation criteria for obtaining results.
  • Participate in technical bridge lines to facilitate the identification, mitigation and containment of cyber-security incidents.

About Bank of America

Our purpose as a firm is to make financial lives better, through the power of every connection. Across the world, we partner with leading corporate and institutional investors through our offices in more than 35 countries. In the U.S. alone, we serve almost all of the Fortune 500 companies and approximately 67 million consumer and small-business clients. We provide a full suite of financial products and services, from banking and investments to asset and risk management. We cover a broad range of asset classes, making us a global leader in corporate and investment banking, sales and trading.

Connecting Asia Pacific to the world

Our Asia Pacific team is spread across 19 cities in 12 markets. We are focused on connecting Asia to the world and the world to Asia, using our global expertise to ensure success is shared between us, our clients and our communities. Our regional footprint covers 12 currencies, more than a dozen languages and five time zones, placing us firmly among the region’s leading financial services companies.

Learn more about this role

Full time

JR-22071487

Band: H5

Manages People:

Manager:

Talent Acquisition Contact:

Wayne Tan

Referral Bonus:

0