Cyber Threat Intelligence Technical Analyst

Overview

On Site
Depends on Experience
Full Time

Skills

Threat analysis
Cyber security
Incident management
Strategic thinking
Information security
Security controls
Big data
Research
Leadership
Geographic information system
Design
Organized
Fraud
Management
DDOS
Malware analysis
OSINT
Dragon NaturallySpeaking
Network
SIEM
Splunk
Policies
IMPACT

Job Details

Our Cyber Threat Hunting, Intelligence & Defense teamwithin Bank of America's Cyber Security Defense function works to continuously strengthen the bank's cyber security posture through research, intelligence, threat simulations, threat hunting, and offensive security engagements.This team works with partners throughout public and private sectors to both discover threats to help secure critical infrastructure around the world that interacts with millions of customers.

Role Responsibilities:

The position of Cyber Threat Intelligence Technical Analyst is responsible for collecting, analyzing, and actioning cyber threat intelligence to defend the Bank. The Cyber Threat Intelligence Technical Analyst also will be tasked with and collaborating with defensive control owners, threat research, and incident response to track and defend against emerging threat tactics, techniques, and procedures. The Cyber Threat Intelligence Technical Analyst requires strategic thinking with a strong background in cyber security, threat intelligence, and leadership.

The role will work with all Cyber Defense operational and technical teams within Global Information Security (GIS) to gain insight into critical security controls and architectural specifics to develop adequately track, analyze, and defend against cyber threat actors. This role will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls.

Required Skills:
  • 3-5+ yearsof experience in Cyber Threat Intelligence
  • Experience collecting, analyzing, and actioning Threat Intelligence
  • Must demonstrate extensive knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors
  • Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution
  • Ability to provide expert guidance on threat trends, analysis methods, and defensive strategies to senior management and key stakeholders
  • Strong experience with offensive security tactics, techniques, and procedures (DDoS, Malware, Phishing, Vulnerabilities, etc.)
  • Strong technical experience performing OSINT investigations
  • Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors
  • Technical experience with Threat Intelligence tools such as Passive DNS, Network Flow Analysis, Maltego, Virus Total, URLScan, etc.
  • Ability to analyze threats and distill common Indicators of Attack and Indicators of Compromise
  • Technical experience with defensive tools for actioning threat intelligence including tools like SIEM/Splunk, EDR, Big Data Platforms, etc.
  • Deep experience working with industry-wide frameworks and standards like MITRE ATT&CK
  • Ability to navigate and work effectively across a complex, geographically dispersed organization.
  • Experience with threat intelligence vendors and platforms
  • Previous experience performing threat intelligence and incident response on major security incidents.


Enterprise Role Overview - Leads the analysis, implementation, execution, and improvement of proactive security controls to prevent external threat actors from infiltrating company information or systems. Conducts research and provides leadership updates regarding advanced attempts/efforts to compromise security protocols. Maintains or reviews security systems and assesses security policies that control access to systems. Provides status updates and recommendations to the leadership team regarding the impact of theft, destruction, alteration, or denial of access to information.

This job will be open and accepting applications for a minimum of seven days from the date it was posted.

Shift:
1st shift (United States of America)

Hours Per Week:
40

Learn more about this role

About Bank Of America