Senior Manual Ethical Hacker

Denver

Bank of America

What would you like the power to do? For you and your family, your business and your community. At Bank of America, our purpose is to help make financial lives better through the power of every connection.

View all jobs at Bank of America

Apply now Apply later

Job Description:

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.

One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.

Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.

Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!

Job Description:

Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America’s Cyber Security Assurance Offensive Security group. The program provides services to assess the security resilience of the bank’s applications to malicious hacking activity.

This senior technical role is responsible performing and leading ethical hacking assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include leading and performing research, understanding the bank's security policies, working with appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business. These individuals are expected to perform application security-oriented dynamic and static assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code.

Key Responsibilities in order of importance:

  • Perform assigned analysis of internal and external threats on information systems and predict future threat behavior.
  • Incorporate threat actors' tactics, techniques, and procedures into offensive security testing to identify high-value vulnerabilities/chained attacks.
  • Developing Proof-of-concepts for exploitation.
  • Perform assessments of the security, effectiveness, and practicality of multiple technology systems.
  • Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
  • Prepare and present detailed technical information for various media including documents, reports, and notifications.
  • Provide clear and practical advice regarding managing risks.
  • Learn and develop advanced technical and leadership skills, mentor Junior and Intermediate assessors in technical tradecraft and soft skills.
  • Respond to security incidents and provide technical assistance to leadership across the Information Security organization.

Required Skills:

  • Minimum of 5+ years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
  • Detailed technical knowledge in at least 5 of the following areas:
    • security engineering
    • application architecture
    • authentication and security protocols
    • application session management
    • applied cryptography
    • common communication protocols
    • mobile frameworks
    • single sign-on technologies
    • exploit automation platforms
    • Web APIs
    • Cloud environments
    • LLM security
  • Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
  • Experience performing manual web application assessments i.e., must be able to simulate a OWASP Top 10 vulnerabilities without the use of tools
  • Experience performing manual code reviews for security relevant issues
  • Experience working with DAST and SAST tools to identify vulnerabilities
  • Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
  • Experience with vulnerability assessment tools and penetration testing techniques.
  • Solid programming/debugging skills, development frameworks, CVE and CWE research/reproduction
  • Threat Analysis, threat modelling and SBOM analysis
  • Innovative thinking, threat actor simulation
  • Technology Systems Assessment
  • Technical Documentation
  • Advisory

Desired:

  • CEH, OSCP/OSCE/OSWE/GXPN/GPEN/GWAPT/GMOB/All Practitioner Certs [Port Swigger BSP Academy]/Cloud Cert(s)/ eWPT; eWPTX; eMAPT [INE Pentester Academy]  
  • Strong programming/scripting skills

This job will be open and accepting applications for a minimum of seven days from the date it was posted.

Shift:

1st shift (United States of America)

Hours Per Week: 

40
Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0

Tags: APIs Application security Automation CEH CERT Cloud Cryptography DAST Ethical hacking eWPT eWPTx Exploit GMOB GPEN GWAPT GXPN Linux LLMs Offensive security OSCE OSCP OSWE OWASP Pentesting POCs SAST SBOM Scripting TCP/IP UNIX Vulnerabilities

Perks/benefits: Career development Startup environment

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.