Senior Vice President, Protective Intelligence Lead, Global Information Security

Sydney, Australia

Bank of America

What would you like the power to do? At Bank of America, our purpose is to help make financial lives better through the power of every connection.

View all jobs at Bank of America

Apply now Apply later

Job Description:

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.

Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being a diverse and inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.

At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!

Job Description:

The Global Information Security (GIS) Cyber Crime Defense team investigates and engages external digital threats that impact the bank’s interests. This includes identifying, investigating, and remediating cybersecurity threats. This role would help lead the Protective Intelligence (PI) team in intelligence gathering, manual scanning for cyber threats, managing vendor relationships, performing takedowns, and creating detailed, executive-level reporting. Additionally, the role will provide strategic white glove response functionality to executives, reacting in real-time to threats as they arise utilizing a follow-the-sun methodology.

Protective Intelligence Lead role with responsibility for helping drive collaboration, coordination, and response activities across the executive landscape. The role will support the development and implementation of cohesive security strategies that protect our executive leadership, assets, and sensitive information.

Key Responsibilities:

  • Support the Threat Assessment team and partner in the planning and coordination of information across Cyber Security, Corporate Security, Executive Protection functions to ensure unified intelligence-driven protection strategies.
  • Collaborate closely with senior leadership to understand security risks and align protection strategies with organizational priorities.
  • Support a holistic approach to threat management, balancing physical and digital security considerations.
  • Protective Intelligence Coordination:
    • Support the planning, coordination, and execution of protective measures for executives and key personnel.
    • Ensure that executive protection strategies are informed by real-time intelligence, risk assessments, and situational awareness.
    • Work closely with the Executive Protection team to ensure the safety of executives during travel, public appearances, and in-office environments.
    • Understanding of how to apply open source intelligence (OSINT) skills to gather information and conduct analysis to create intelligence reports.  Must be able to convey findings to senior executives orally or in written reports.

a) Cybersecurity Collaboration:

  • Collaborate with Information Security teams to ensure the security of critical organizational data, intellectual property, and digital communications.
  • Ensure cross-functional collaboration between physical and cyber security teams to mitigate emerging hybrid threats.
  • Facilitate the integration of cybersecurity and physical security data for a unified understanding of security risks.

b) Crisis Management and Incident Response:

  • Lead the development and implementation of crisis management plans related to cyber security incidents involving our executive team members, ensuring coordination between all involved teams.
  • Provide leadership during high-stakes cyber security incidents and crises, ensuring a swift and coordinated response across departments.
  • Develop and execute training programs to prepare teams for potential security events, including simulations and tabletop exercises.

c) External Relationship Management:

  • Build and maintain relationships with law enforcement, intelligence agencies, and other relevant external stakeholders.
  • Represent the company in industry forums, collaborating with peers to stay informed of evolving security trends and best practices.

Required skills:

  • Demonstrated leadership skills and ability to pivot program based on strategic threat landscape analysis.
  • Should be comfortable working with incomplete facts, be able to quickly rationalize and drive clarity, translate to actionable tasks, and demonstrate tenacity by working assigned tasks through to completion.
  • Understanding of the process to contact hosting providers to remove domains that being used to commit fraud or conducts social engineering attacks including legal parameters and investigative mindset.
  • Proficiency with executive-level tracking and reporting, including expertise in Jira and Excel
  • Must be comfortable in delivering messages to a wide spectrum of individuals having varying degrees of technical understanding.
  • Confident and capable written and oral presentation skills, including proficiency in PowerPoint.
  • Strong project management skills
  • Completing written reports in compliance with current reporting procedures and policies.
  • Document each stage of the investigation and maintain a focus on case logs and details.
  • Ability to work independently with little oversight managing multiple investigations simultaneously.
  • Ability to analyze investigations and data to find patterns and make risk based decisions to improve the processes and program
  • Must have strong leadership skills and qualities which enable you to work with peers and various levels of management.
  • Demonstrated vendor management skills.
  • A broad knowledge of computer networking, log analysis, information security principles, and adversarial tools and techniques
  • Strong analytical skills/problem solving/conceptual thinking.
  • Able to identify, analyze and address cyber security issues or threats, including emerging tactics or techniques.
  • Capability to convey a cybersecurity issue or threat to an external firm in a way that demonstrates how it violates the Terms of Service or Community Standards
  • Ability to resolve issues with minimal negative impact and risk to the organization.

Desired skills:

  • Bachelor's degree in Information Technology or related field
  • Open source Intelligence skills (OSINT)
  • Experience in the remediation of information security risks/vulnerabilities
  • Experience with network monitoring and intrusion detection systems
  • Ability to work with technical and non-technical individuals.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Leadership Jobs

Tags: C Compliance Cyber crime Incident response Intrusion detection Jira Log analysis Monitoring Open Source OSINT Risk assessment Vendor management Vulnerabilities

Perks/benefits: Career development Startup environment Team events

Region: Asia/Pacific
Country: Australia

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.