Vulnerability Monitoring and Response Analyst
Job Description:
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
The IDS/IPS and network access monitoring team is dedicated to protecting Bank of America, its assets, customers, and staff. As a part of the Bank’s Cyber Threat Defense (CTD) organization, the Network Intrusion Defense (NID) teams follow the 5-pronged CTD threat response model: Prepare, Prevent, Detect, Response, and Recover, focusing on prevention, detection, and response functions. The team uses network access monitoring to detect suspicious activity, logging and monitoring tools, and intrusion detection system to detect and respond to cyber-attacks. Network Intrusion Defense teams actively monitor the Bank’s on-premise and cloud networks using automated and manual security control checks and activity monitoring. Additionally, they provide an immediate level of response focused on protecting, containing, and resolving cyber security events. The analytic methods that are used ensure that operational protocols are in place to reduce potential risk and vulnerability to the Bank’s computing environment.
Will function as a member of an Enterprise Network Intrusion Detection and Prevention Response team. The Security Analyst will use our security tools and events to find targeted attacks against the banks internal and external network. The analyst will also use new intelligence to update existing controls to detect new threats.
Additional Tasks include:
• Daily analysis of security events
• Building and enhancing automated controls to detect security events
• Work with vendor to maintain our security controls
• Develops and implements processes or controls in support of audit and risk requirements
• Will partner with senior leaders from lines of business organizations to triage security events and report on impacting security initiatives.
• Responsible for mentoring and developing the skill sets of less experienced team members.
• On call and after hour work can be expected.
Previous network security experience required. Strong attention to detail, analytical skills, ability to operate in a high stress environment, and ability to work both independently as well as part of a larger technology team are also required. Must be able to plan, execute and document initiatives following established processes and procedures. Five to seven years of experience in network security required.
Required Skills:
• Strong Intrusion Analysis background
• IDS (Intrusion Detection System) IPS (Intrusion Prevention System)
• Advanced knowledge of Network communications
• Experience with packet captures and interpreting network traffic
• Familiarity with web application attacks including SQL injection, cross-site scripting
• Strong Splunk skill set
• Strong analytical skills/problem solving/conceptual thinking.
• Ability to work independently on initiatives with little oversight.
• Ability to work with Technical and Non-Technical business owners
• Motivated and willing to learn.
• Must be comfortable in delivering messages across a wide spectrum of individuals having varying degrees of technical understanding.
Desired Skills:
• Strong IDS/IPS system administration
• Experience with netflow/ipfix based technologies
• Firewall administration experience
• Application development experience
• Network penetration testing experience
• Unix/Linux system administration experience
• Scripting and Automation
• Familiarity with MITRE ATT&CK framework
Skills:
Cyber Security
Data Privacy and Protection
Problem Solving
Process Management
Threat Analysis
Business Acumen
Data and Trend Analysis
Interpret Relevant Laws, Rules, and Regulations
Risk Analytics
Stakeholder Management
Access and Identity Management
Data Governance
Encryption
Information Systems Management
Technology System Assessment
Shift:
1st shift (United States of America)Hours Per Week:
40