Cyber Crime Senior Analyst – Protective Intelligence

Charlotte, United States

Bank of America

What would you like the power to do? At Bank of America, our purpose is to help make financial lives better through the power of every connection.

View all jobs at Bank of America

Apply now Apply later

Job Description:

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.

Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being a diverse and inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.

At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!

Job Description:

The Global Information Security (GIS) Cyber Crime Defense team investigates and engages external digital threats that impact the bank’s interests. This includes identifying, investigating, and remediating cybersecurity threats. This role would help lead the Protective Intelligence (PI) team in intelligence gathering, manual scanning for cyber threats, managing vendor relationships, performing takedowns, and creating detailed, executive-level reporting. Additionally, the role will provide strategic white glove response functionality to executives, reacting in real-time to threats as they arise utilizing a follow-the-sun methodology.

Protective Intelligence Analysts are expected to operate independently and leverage best-in-class investigation skills across multiple concurrent investigations to reduce risk to bank executives. PI Specialists are expected to apply existing risk frameworks with minimal supervision, leveraging multiple toolsets and vendors to achieve desired end state are required. PI Specialists are also expected to identify and implement opportunities to improve existing toolsets or expand vendor capabilities to meet changing threat landscape. Succinct communications, timely investigations and outcomes, and responsible stewardship is expected.

Required skills:

  • Demonstrated leadership skills and ability to pivot program based on strategic threat landscape analysis
  • Should be comfortable working with incomplete facts, be able to quickly rationalize and drive clarity, translate to actionable tasks, and demonstrate tenacity by working assigned tasks through to completion.
  • Understanding of the process to contact hosting providers to remove domains that being used to commit fraud or conducts social engineering attacks including legal parameters and investigative mindset
  • Proficiency with executive-level tracking and reporting, including expertise in Jira and Excel
  • Must be comfortable in delivering messages to a wide spectrum of individuals having varying degrees of technical understanding
  • Confident and capable written and oral presentation skills, including proficiency in PowerPoint
  • Strong project management skills
  • Completing written reports in compliance with current reporting procedures and policies.
  • Document each stage of the investigation and maintain a focus on case logs and details.
  • Ability to work independently with little oversight managing multiple investigations simultaneously
  • Ability to analyze investigations and data to find patterns and make risk based decisions to improve the processes and program
  • Must have strong leadership skills and qualities which enable you to work with peers and various levels of management
  • Demonstrated vendor management skills
  • A broad knowledge of computer networking, log analysis, information security principles, and adversarial tools and techniques
  • Strong analytical skills/problem solving/conceptual thinking
  • Able to identify, analyze and address cyber security issues or threats, including emerging tactics or techniques
  • Capability to convey a cybersecurity issue or threat to an external firm in a way that demonstrates how it violates the Terms of Service or Community Standards
  • Ability to resolve issues with minimal negative impact and risk to the organization

Desired skills:

  • Bachelor's degree in Information Technology or related field
  • Open source Intelligence skills (OSINT)
  • Experience in the remediation of information security risks/vulnerabilities
  • Experience with network monitoring and intrusion detection systems
  • Ability to work with technical and non-technical individuals

Shift:

1st shift (United States of America)

Hours Per Week: 

40
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Analyst Jobs

Tags: Compliance Cyber crime Intrusion detection Jira Log analysis Monitoring Open Source OSINT Vendor management Vulnerabilities

Perks/benefits: Career development

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.