Bank of America is looking for a Cloud Security Analyst in Washington – Apply Here!

Deal Score0
Deal Score0

Job Description:

Bank of America is looking for a Senior Cloud Security Analyst to join our Global Information Security (GIS) team.

The Cyber Security Operations team in GIS is a true global operations shop with leading edge tools, processes, and people. Bank of America Global Information Security encourages career mobility, and this role will provide the opportunity to be part of a team where development and advancement is actively supported.

The ideal candidate must have deep knowledge of security controls, features, and operations for top Cloud Service Providers with the focus on Microsoft Azure. Candidate should have relevant experience to be able to design, build, operate, and mature a cloud-focused Blue Team. The candidate should be intellectually curious about technology and have a strong desire to find and mitigate risks.

This role will partner with GIS leaders to assist with defining the strategy and roadmaps for technology products, service standards, and governance routines that impact the global organization. You will be partnering with leadership across the Bank to design controls, governance routines, and service alternatives that improve the firm’s defenses. You may direct multiple major technology teams within Global Technology that research, engineer, test, implement, communicate, monitor, and maintain solutions supporting the Bank’s information security policies and/or procedures. You will utilize your in-depth knowledge and business requirements to design and engineer secure solutions to meet partner teams’ needs, or to address critical audit findings while protecting the Bank’s data assets.

• Five (5) or more years relevant Cyber Security experience.
• Experience as security analyst for a Blue/Red/Purple Team or Cyber Security Operations Center
• Experience operating as part of an Incident Response Team
• Experience performing root cause analysis.
• Experience conducting risk and threat assessments.
• Experience using a Security Event and Incident Monitoring (SEIM) solution, such as Splunk.
• Experience reviewing applications, infrastructure, and architectural designs to identify threats and vulnerabilities.
• Experience developing operational work instructions
• Deep understanding of Cyber Security control environments and their relationship to zero-trust networks.
• Deep understanding of Cyber Security Operations.
• Understanding of Identity and Access Management concepts.
• Understanding of SQL, NQL, and KQL
• Understanding of threat frameworks, such as ATT&CK.
• Understanding of Risk Management principles.
• Understanding of data mining and data analysis techniques.
• Experience operating in various Infrastructure-as-a-Service platforms, such as Azure or AWS.
• Ability to independently assess risks and identify vulnerabilities in infrastructure with an eagerness to suggest new processes, policies, and overall improvements to internal security controls.
• Experience working with incident response teams, vulnerability managers, threat intelligence researchers, Red/Purple teams, and/or HUNT researchers.
• A broad knowledge of information security principles and security capabilities
• Some experience with large on-prem or hybrid-cloud environments deployments.
• Highly organized and motivated self-starter who can deliver results with minimal direction
• Ability to navigate and collaborate effectively within a geographically complex and dispersed global corporation.
• Excellent verbal and written communication skills with ability to distill key data points and effectively present information.

• CISSP / CISM / Security +
• Network +
• Azure or AWS certified security associate

Bachelor’s Degree in Computer Science, Information Systems, Cyber Security, or related experience preferred

Enterprise Role Overview – Leads the analysis, implementation, execution and improvement of proactive security controls to prevent external threat actors from infiltrating company information or systems. Conducts research and provides leadership updates regarding advanced attempts/efforts to compromise security protocols. Maintains or reviews security systems and assesses security policies that control access to systems. Provides status updates and recommendations to the leadership team regarding the impact of theft, destruction, alteration or denial of access to information. Follows standard practices and procedures in analyzing situations or data. Typically has 5-10 years of relevant experience and will act as an individual contributor.

Apply Here

The Tech Career Guru
We will be happy to hear your thoughts

Leave a reply

Tech Jobs Here