hero






Cyber Threat Intelligence Senior Technical Analyst

Bank of America

Bank of America

IT
Denver, CO, USA · Chicago, IL, USA · Washington, DC, USA · United States · Remote
Posted on Jul 25, 2024

Job Description:

Our Cyber Threat Hunting, Intelligence & Defense team within Bank of America’s Cyber Security Defense function works to continuously strengthen the bank’s cyber security posture through research, intelligence, threat simulations, threat hunting, and offensive security engagements. This team works with partners throughout public and private sectors to both discover threats to help secure critical infrastructure around the world that interacts with millions of customers.

Role Responsibilities

The position of Cyber Threat Intelligence Senior Technical Analyst is responsible for collecting, analyzing, and actioning cyber threat intelligence to defend the Bank. The Cyber Threat Intelligence Senior Analyst also will be tasked with and collaborating with defensive control owners, threat research, and incident response to track and defend against emerging threat tactics, techniques, and procedures. The Cyber Threat Intelligence Senior Technical Analyst requires strategic thinking with a strong background in cyber security, threat intelligence, and leadership.

The role will work with all Cyber Defense operational and technical teams within Global Information Security (GIS) to gain insight into critical security controls and architectural specifics to develop adequately track, analyze, and defend against cyber threat actors. This role will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls.

Required Skills:

  • 7+ years of experience in Cyber Threat Intelligence

  • Experience collecting, analyzing, and actioning Threat Intelligence

  • Must demonstrate extensive knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors.

  • Strong experience communicating and summarizing cyber threat intelligence to senior Bank executives.

  • Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution.

  • Ability to provide expert guidance on threat trends, analysis methods, and defensive strategies to senior management and key stakeholders.

  • Strong experience with offensive security tactics, techniques, and procedures (DDoS, Malware, Phishing, Vulnerabilities, etc.)

  • Strong technical experience performing OSINT investigations.

  • Experience with operational security, sandbox and virtual environments, and profiling threat actors

  • Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors.

  • Technical experience with Threat Intelligence tools such as Passive DNS, Network Flow Analysis, Maltego, Virus Total, URLScan, etc.

  • Ability to analyze threats and distill common Indicators of Attack and Indicators of Compromise

  • Technical experience with defensive tools for actioning threat intelligence including tools like SIEM/Splunk, EDR, Big Data Platforms, etc.

  • Deep experience working with industry-wide frameworks and standards like MITRE ATT&CK

  • Ability to navigate and work effectively across a complex, geographically dispersed organization.

  • Experience with threat intelligence vendors and platforms

  • Previous experience performing threat intelligence and incident response on major security incidents.

  • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.

Enterprise Role Overview - Leads the analysis, implementation, execution, and improvement of proactive security controls to prevent external threat actors from infiltrating company information or systems. Conducts research and provides leadership updates regarding advanced attempts/efforts to compromise security protocols. Maintains or reviews security systems and assesses security policies that control access to systems. Provides status updates and recommendations to the leadership team regarding the impact of theft, destruction, alteration, or denial of access to information.

This job will be open and accepting applications for a minimum of seven days from the date it was posted.

Shift:

1st shift (United States of America)

Hours Per Week:

40