Posted today
Cyber Threat Intelligence Technical Analyst
Bank of America Corporation - Denver, CO
Job Description:

Our Cyber Threat Hunting, Intelligence & Defense team within Bank of America's Cyber Security Defense function works to continuously strengthen the bank's cyber security posture through research, intelligence, threat simulations, threat hunting, and offensive security engagements. This team works with partners throughout public and private sectors to both discover threats to help secure critical infrastructure around the world that interacts with millions of customers.

Role Responsibilities:

The position of Cyber Threat Intelligence Technical Analyst is responsible for collecting, analyzing, and actioning cyber threat intelligence to defend the Bank. The Cyber Threat Intelligence Technical Analyst also will be tasked with and collaborating with defensive control owners, threat research, and incident response to track and defend against emerging threat tactics, techniques, and procedures. The Cyber Threat Intelligence Technical Analyst requires strategic thinking with a strong background in cyber security, threat intelligence, and leadership.

The role will work with all Cyber Defense operational and technical teams within Global Information Security (GIS) to gain insight into critical security controls and architectural specifics to develop adequately track, analyze, and defend against cyber threat actors. This role will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls.

Required Skills:
  • 3-5+ years of experience in Cyber Threat Intelligence
  • Experience collecting, analyzing, and actioning Threat Intelligence
  • Must demonstrate extensive knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors
  • Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution
  • Ability to provide expert guidance on threat trends, analysis methods, and defensive strategies to senior management and key stakeholders
  • Strong experience with offensive security tactics, techniques, and procedures (DDoS, Malware, Phishing, Vulnerabilities, etc.)
  • Strong technical experience performing OSINT investigations
  • Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors
  • Technical experience with Threat Intelligence tools such as Passive DNS, Network Flow Analysis, Maltego, Virus Total, URLScan, etc.
  • Ability to analyze threats and distill common Indicators of Attack and Indicators of Compromise
  • Technical experience with defensive tools for actioning threat intelligence including tools like SIEM/Splunk, EDR, Big Data Platforms, etc.
  • Deep experience working with industry-wide frameworks and standards like MITRE ATT&CK
  • Ability to navigate and work effectively across a complex, geographically dispersed organization.
  • Experience with threat intelligence vendors and platforms
  • Previous experience performing threat intelligence and incident response on major security incidents.


Shift:
1st shift (United States of America)

Hours Per Week:
40