Chicago, Illinois
15 days ago
Senior Insider Threat Hunt Investigator

Job Description:

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.

Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being a diverse and inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.

Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.

At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!

Job Description:

The position of the Senior Insider Threat Hunt Investigator is responsible for analyzing and correlating large data sets to uncover insider threats and attack techniques that may be present within the bank’s environments. A Senior Insider Threat Hunter will be tasked with and collaborate with data science, threat research, Cyber Threat Hunt Intelligence and Defense teams to identify opportunities to build and respond to Insider tactics and techniques. In support of these processes, the role will also include developing and documenting new and innovative Insider hunt hypotheses to increase the team’s ability to find existing insider threats.

Required Skills:

10+ years’ work experience with an insider threat focus or technical background that could be applied to understand key insider risk componentsHigh proficiency with forensic tools (ENCASE), CrowdStrike and other similar investigative and/or monitoring toolsDirect experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, SQLRoutine review of application/software user activityCorrelation analysis of existing case types and escalations to ensure issue is relevant to dig deeper/ escalateStrong analytical and problem solving skillsExpertise in running endpoint analysisExperience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain.Excellent collaboration skills to effectively work with other technical teamsAbility to work both independently and as part of a team to achieve goalsDiversity of thought, critical thinking, willingness to learn, and persistence to identify riskMethodical and systematical approach to utilizing technical tools, applications, etc.Exceptional written and verbal communication skillsMindset of curiosity: not afraid to learn new thingsExcellent organizational skills to manage caseload, projects and ad hoc requestsFamiliarity with participating/driving incident response events

Desired Skills:

An understanding of human behavior / human psychology or investigative backgroundTechnical experience with information security / data loss prevention tools or controls such as Intrusion Detection & Prevention technologies (IDS/IPS) and/or SIEM systems and other data correlation engines.Certifications - Security+, Network+, CEH, CISSP, CCNA, CCNP, EnCE other cyber security related certificationsHigh proficiency with sleuthing in OSINTFamiliarity with working in cloudNetworking/System administration experienceBachelor’s in computer science or related fields

This job will be open and accepting applications for a minimum of seven days from the date it was posted.

Shift:

1st shift (United States of America)

Hours Per Week: 

40

Confirm your E-mail: Send Email