

Share
This job is responsible for developing and supporting enterprise-wide information security policies, procedures, and standards. Key responsibilities include applying knowledge of laws, rules, regulations, and information security concepts (e.g., NIST, COBIT, ISO) to establish and maintain policies, validate alignment of processes and controls to requirements, and report on adherence to policy requirements. Job expectations include using data analytics and partnering with internal teams to verify policy compliance, identify gaps in coverage, and support remediation activities.
LOB Overview:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities and operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
Responsibilities:
Support the implementation and ongoing management of access provisioning solutions across enterprise platforms, ensuring alignment with security policies and regulatory requirements.
Apply working knowledge of Active Directory , Microsoft Azure, Amazon Web Services (AWS), and Mainframe , Oracle and SQL databases , file systems , and enterprise storage , with a focus on enforcing least privileged access .
Assist in maintaining access control policies , group structures , and role-based access models to support scalable and secure provisioning.
Collaborate with application owners and infrastructure teams to implement access requirements for new and existing systems.
Participate in automation initiatives to streamline provisioning and de-provisioning workflows , integrating with identity governance platforms and HR systems and IAM controls.
Conduct periodic access reviews , entitlement audits , and certification campaigns to ensure compliance and identify access anomalies.
Investigate and remediate access-related incidents, working closely with cybersecurity and risk teams to address vulnerabilities and improve controls.
Stay current with emerging IAM technologies, regulatory changes, and industry best practices to continuously enhance the access provisioning program.
Prepare metrics, reports, and recommendations to senior leadership and audit teams regarding access provisioning effectiveness and risk posture.
Required Qualifications:
3-5+ years experience in Identity and Access Management, with a focus on access provisioning across enterprise environments.
Working knowledge of Active Directory , Microsoft Azure AWS, Mainframe , Oracle Database , SQL Server , Windows and Unix file systems , and enterprise storage platforms .
Understanding of IAM governance frameworks , platforms ( e.g., SailPoint, Saviynt ) role-based access control (RBAC) , group policy management , and privileged access management (PAM) tools, CyberArk, Hashi Corp and Beyond Trust.
Experience with automated provisioning/de-provisioning workflows , including integration with HR systems to demonstrate proficiency in scripting and automation (e.g., PowerShell, Python) to support scalable access provisioning and audit processes.
Familiarity with cloud infrastructure security and access controls in hybrid environments, particularly within Microsoft Azure AWS and Oracle Cloud .
Ability to conduct access reviews , entitlement audits , and risk assessments to identify and remediate access-related vulnerabilities.
Excellent analytical, problem-solving, and communication skills, with the ability to collaborate across technical and business teams.
These jobs might be a good fit

Share
Job Description:
We are seeking a skilled and motivated Network Security Engineer to join our GIS Core Engineering team. The Network Security Engineer is a key individual contributor that has accountability for researching, designing, engineering, implementing, and supporting network security solutions. You will utilize in-depth technical knowledge and business requirements to help design and implement a secure solution to meet customer / client needs while protecting the Bank's assets. Develops and implements security standards, procedures, and guidelines for multiple platforms and diverse environment. Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results.
It is imperative that you have a solid knowledge of network security domains such as DDoS, Segmentation, Network Access, Web Content Inspection, Perimeter Defense, and Network monitoring. You will regularly collaborate with experts both in country and in other regions, so excellent communication skills are very important. If you are seeking a demanding role within Global Information Security (GIS) and have the required skills, this will be a great opportunity for you. Typically, applicants should have 5 to 7 years of cybersecurity or engineering experience.
Key Responsibilities:
Serves as a subject matter expert for one or more engineering initiatives and is the point of contact for clients
Contributes to defining and ensuring security requirements are met based on BofA standards and Policies.
Incorporates basic architecture components including threat-models, diagrams, and technological requirements for in solution development.
Understands and utilizes basic network, virtualization, and datacenter technologies for deployment strategies.
Leads the delivery of the major engineering milestones and acts as the critical decision maker with regards to technical design and implementation
Documents and communicates required information for deployment, maintenance, support, and business functionality.
Adheres to team delivery/release process and cadence pertaining to solution deployment and release.
Identifies and raises risks or potential vulnerabilities at all stages of the security-engineering process
Works closely with a diverse set of stakeholders with varying priorities to debate and negotiate paths forward
Navigates and works effectively across a complex, geographically dispersed organization
Required Qualifications:
· Strong fundamental understanding of information security principles, risks, and controls and of cyber security operations functions.
· Knowledge of how Web Based internet facing applications are deployed and set up and experience architecting complex enterprise cybersecurity solutions for data in transit across web, email and b2b environments. Including technology that provides proxy control, malware inspection, SSL termination, and Data Loss Prevention (DLP).
· Understanding of how Content Delivery Networks (CDNs) work, how they are designed to provide application services, and how they are used to mitigate network security threats.
· Detailed knowledge of Network Security solutions such as DDOS mitigations techniques, WAF, etc.
· Knowledge Solid experience with designing, evaluating, and deploying network security solutions for outbound, inbound, and lateral network traffic. Experience engineering web content inspection solutions using tools such as Skyhigh Web gateway, Trellix (Fireeye), and F5 LTM/APM/SSLO.
· Experience deploying proxies in the cloud (AWS) and experience with SASE platforms
· Experience coordinating delivery of project/changes milestones, ensures projects stay on target, escalating and identifying roadblocks.
· Ability to quickly diagnose the problem areas and come up with solutions and/or workarounds
· Ability to translate business needs into requirements and experience understand analyzing the technical feasibility and design against the requirements.
Effective communication skills and must be comfortable in delivering messages across a wide spectrum of individuals having varying degrees of technical understanding.
· Ability to work independently on various initiatives with little oversight.
· Strong analytical skills/problem solving/conceptual thinking.
· Motivated and willing to learn.
Desired Qualifications
· Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
· Experience deploying security solutions in virtual environments such as VMWare, AWS, Azure
· Experience integrating network security solutions with IAAS, PAAS and SAAS components such as Zscaler, O365, etc.
· Experience deploying security solutions in email environments.
· Experience with Data Governance, Model Risk Management and Application Management.
· Ability to work with Technical and Non-Technical business owners.
· Experience in large enterprise environments.
· Assist with internal efficiencies projects and development.
· Familiarity with industry standard endpoint tools.
· Relevant certifications: CCNA, CCNP, CISSP, or CEH.
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
These jobs might be a good fit

Share
Job Description:
This job is responsible for supporting multiple network security engineering efforts to deliver enterprise security capabilities globally. Key responsibilities: include serving as a subject matter expert of security technology, overseeing major engineering milestones including the design, development, and implementation of systems, and reporting on key metrics. Job expectations include executing on engineering initiatives, partnering with cross-functional teams, solving complex issues within BofAs global network footprint, and mentoring/managing team members.
This role is for a Senior Network Engineer. This role participates and leads design discussions, engineering and implementation of network activities. This includes vendor selection, testing, technical support, systems/network design, and risk reduction activities. This person is responsible for components of complex engineering and/or analytical tasks and activities, they assist in establishment of input/output processes and working parameters for hardware compatibility and coordination of subsystems design and integration of total system. They will serve as a fully seasoned/proficient technical resource and technical subject matter expert. This role will have direct reports and will also influence and direct activities of a team related to special initiatives or operations. Provides input on staffing, budget, and personnel. Typically 5 or more years of systems engineering experience.
Key Responsibilities:
• Contribute to defining and ensuring security requirements are met based on BofA standards and Policies.
• Incorporates basic architecture components including threat-models, diagrams, and technological requirements for in solution development.
• Understand and utilize basic network, virtualization, and datacenter technologies for deployment strategies.
• Work across technology teams to understand and aid in the delivery of system requirements.
• Build and improve processes supporting system transformation, structures, quality controls, dependency, and workload management.
• Perform/Implement existing test suites (integration, regression, and performance), analyze test reports, identify any test issues/errors, and triage the underlying cause.
• Document and communicate required information for deployment, maintenance, support, and business functionality.
• Adhere to team delivery/release process and cadence pertaining to solution deployment and release.
• Identify gaps in environment management standards adherence and work with appropriate partners to develop plans to close gaps.
Required Qualifications:
• 10+ years of experience in technology, preferably in network/infrastructure
• 5+ years of experience in Network Security
• 5+ years of experience in managing teams
• Expertise in Network design for hybrid cloud implementations and experience with various network security tools
• Experience in deploying large-scale, global projects and programs
• Familiarity with IT security and risk management practices
• Leadership skills and qualities which enable you to work with peers and various levels of management
• Effective communication skills and motivation/willingness to learn
Desired Skills:
Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
Experience deploying security solutions in virtual environments such as VMWare, AWS, Azure
Experience integrating network security solutions with IAAS, PAAS and SAAS components such as Zscaler, O365, etc.
Experience deploying security solutions in email environments.
Experience with Data Governance, Model Risk Management and Application Management.
Ability to work with Technical and Non-Technical business owners.
Familiarity with industry standard endpoint tools.
Relevant certifications: CCNA, CCNP, CISSP, or CEH
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)These jobs might be a good fit

Share
LOB Overview:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities and operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
Role Description:
The Mainframe Security Administration Manager leads a team of analysts responsible for managing secure access to mainframe systems. This role requires a blend of technical acumen in mainframe security mechanisms (RACF, ACF2, Top Secret), strong governance expertise including knowledge of industry standards, and leadership of team members as a key stakeholder within Information Security and the broader IT organization.
Access Control Management
Implement and maintain security administration and access policies using RACF, ACF2, or Top Secret.
Enforce least privilege and role-based access control (RBAC).
Ensure multi-factor authentication for privileged users.
Ensure that privileged access and encryption policies are enforced.
Compliance & Auditing
Align security administration and access controls with regulatory frameworks (SOX, UCAL and PWC applications).
Maintain detailed logs and audit trails for all access request and administrators provisioning activities.
Utilize tools such as Vanguard Resource Administrator (VRA) for forensic analysis and Report Analyzer for reporting.
Security Governance
Monitor for unauthorized access and potential data leakage.
Conduct regular access reviews and security assessments.
Integrate with Identity and Access Management (IAM) systems for centralized governance.
Team Management
Lead and mentor a team of mainframe security analysts.
Ensure team proficiency in RACF, Top Secret, and z/OS environments, including by participating in learning opportunities and communicating with vendors
Promote automation of repetitive provisioning tasks to enhance efficiency.
Oversee ticketing systems integrated with IAM workflows for request tracking, Quality Assurance validation for efficiency and remediation.
Training & Development
Provide ongoing training on evolving security threats and compliance requirements, process changes.
Set Global Information Security goals and encourage professional certifications (e.g., CISSP, Certified RACF and Vanguard Specialist).
Operational Best Practices
Ensure 24/7 monitoring of access provisioning activities.
Establish and maintain incident response protocols for access-related events.
Design scalable provisioning processes to support organizational growth.
Required Qualifications:
10+ years of progressive experience in Identity and Access Management, with a strong focus on access provisioning across enterprise environments.
10+ Years of experience in RACF, ACF2 and zOS systems
Drives Mainframe Modernization and work in close partnership with the CTO Mainframe team to provide SME security leadership.
Deep technical expertise in Mainframe RACF, Vanguard and Microsoft Azure AWS, Databases DB2 and VMSecure and enterprise storage platforms.
Proven ability to design, implement, and manage access provisioning solutions that enforce least privileged access and align with regulatory and internal compliance requirements.
Strong understanding of IAM governance frameworks, platforms (e.g., ForgeRock Single Sign- On SSO, Adaptive Authentication) role-based access control (RBAC), group policy management, and privileged access management (PAM) tools, CyberArk, Hashi Corp and Beyond Trust.
Experience with automated provisioning/de-provisioning workflows, including integration with HR systems to demonstrated proficiency in scripting and automation (e.g., PowerShell, Python) to support scalable access provisioning and audit processes.
Familiarity with cloud infrastructure security and access controls in hybrid environments, particularly within Microsoft Azure AWS and Oracle Cloud.
Ability to conduct access reviews, entitlement audits, and risk assessments to identify and remediate access-related vulnerabilities.
Excellent analytical, problem-solving, and communication skills, with the ability to collaborate across technical and business teams.
Bachelor’s degree in computer science, Information Security, or a related field; advanced degree or certifications (e.g., CISSP, CISM, Microsoft Certified: Identity and Access Administrator Associate) preferred.
BS/BA Engineering degree or equivalent experience
Desired Skills:
Understanding or have experience with agile and lean philosophies.
Strong critical thinking and problem-solving skills with clear communication
Ability to collaborate with different roles to achieve common goals.
Ability to think critically and question the status quo.
Understand how to identify software security vulnerabilities and recognize and communicate their associated impact to the business.
Demonstrate awareness of secure software design principles such as least privilege, defense in depth, or designing secure user interfaces
These jobs might be a good fit

Share
What you'll do
As the ISSO, you will serve as the delegated security lead with responsibility for the security integrity of Armis's most highly sensitive systems:
What we expect
Preferred Skills
These jobs might be a good fit

Share
A day in the life
This role an engaging mix of responsibilities across the entire lifecycle of a security feature set. You'll have the autonomy to take a use case from proposal to success definition and measurement, on to prototype implementation, and on to active collaboration for production delivery. You will interface with product managers, UX designers, software development engineers of all levels, and fellow security engineers across the organization.
- Bachelor's degree in computer science or equivalent
- 3+ years of programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language experience
- Knowledge of networking protocols such as HTTP, DNS and TCP/IP
- Knowledge of up to date cloud risk scenarios and attack vectors
- Experience with AWS products and services
- Experience applying threat modeling or other risk identification techniques or equivalent
- Familiarity with AWS services and environments with knowledge of existing AWS logs sources
- Familiarity with cloud infrastructure and threats across other providers such as Microsoft Azure and Google Cloud Platform (GCP)
- Knowledge of the Open Cybersecurity Schema Framework (OCSF)
- Deep knowledge in security data use cases, SIEM, XDR, and SOAR solutions
- Excellent written and oral communication skills
These jobs might be a good fit

Share
Boston, MA, USAKey job responsibilitiesDemonstrate high capacity and tolerance for context switching and interruptions while remaining productive and effectiveExplore building and improving our tooling to make your own life easier and share that benefit with all our engineers globally.
Assistance with recruiting activities and administrative workCreating, updating, and maintaining threat models for a wide variety of software projectsManual and Automated Secure Code Review, primarily in Java, Python and JavascriptDevelopment of security automation toolsAdversarial security analysis using tools to augment manual effortIndependently solve systemic, complex security problems that require novel methods or approachesProvide technical and strategic guidance to senior leaders and stakeholders through effective oral and written communicationsA day in the life
- 3+ years of programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language experience
- 2+ years of scripting, programming, and security code review in a common programming language (non-internship) experience
- 2+ years of troubleshooting systems issues, analyzing logs, or automating basic tasks using command line tools (non-internship) experience
- Bachelor's degree in computer science or equivalent
- Bachelor's degree in a STEM field (Science, Technology, Engineering, Mathematics), or experience in IT Security
- Bachelor's degree in a STEM field (Science, Technology, Engineering, Mathematics), or 2+ years of IT Security experience
- Knowledge of networking protocols such as HTTP, DNS and TCP/IP
- Knowledge of industry-based security vulnerabilities and remediation techniques
- Experience in scripting, programming, and security code reviewing in a common programming language (non-internship)
- Experience in troubleshooting systems issues, analyzing logs, or automating basic tasks using command line tools (non-internship experience)
- 2+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience
- 2+ years of scripting, programming, or security code review in a common language, such as Python, Java or C++ experience
- Knowledge of command line tools to troubleshoot protocols, analyze log outputs, or automate basic tasks
- Knowledge of networking protocols such as HTTP(S), DNS, and TCP/IP
- Knowledge of networking protocols, to include HTTP(S), DNS, and TCP/IP
- Experience with AWS products and services
These jobs might be a good fit

Share
This job is responsible for developing and supporting enterprise-wide information security policies, procedures, and standards. Key responsibilities include applying knowledge of laws, rules, regulations, and information security concepts (e.g., NIST, COBIT, ISO) to establish and maintain policies, validate alignment of processes and controls to requirements, and report on adherence to policy requirements. Job expectations include using data analytics and partnering with internal teams to verify policy compliance, identify gaps in coverage, and support remediation activities.
LOB Overview:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities and operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
Responsibilities:
Support the implementation and ongoing management of access provisioning solutions across enterprise platforms, ensuring alignment with security policies and regulatory requirements.
Apply working knowledge of Active Directory , Microsoft Azure, Amazon Web Services (AWS), and Mainframe , Oracle and SQL databases , file systems , and enterprise storage , with a focus on enforcing least privileged access .
Assist in maintaining access control policies , group structures , and role-based access models to support scalable and secure provisioning.
Collaborate with application owners and infrastructure teams to implement access requirements for new and existing systems.
Participate in automation initiatives to streamline provisioning and de-provisioning workflows , integrating with identity governance platforms and HR systems and IAM controls.
Conduct periodic access reviews , entitlement audits , and certification campaigns to ensure compliance and identify access anomalies.
Investigate and remediate access-related incidents, working closely with cybersecurity and risk teams to address vulnerabilities and improve controls.
Stay current with emerging IAM technologies, regulatory changes, and industry best practices to continuously enhance the access provisioning program.
Prepare metrics, reports, and recommendations to senior leadership and audit teams regarding access provisioning effectiveness and risk posture.
Required Qualifications:
3-5+ years experience in Identity and Access Management, with a focus on access provisioning across enterprise environments.
Working knowledge of Active Directory , Microsoft Azure AWS, Mainframe , Oracle Database , SQL Server , Windows and Unix file systems , and enterprise storage platforms .
Understanding of IAM governance frameworks , platforms ( e.g., SailPoint, Saviynt ) role-based access control (RBAC) , group policy management , and privileged access management (PAM) tools, CyberArk, Hashi Corp and Beyond Trust.
Experience with automated provisioning/de-provisioning workflows , including integration with HR systems to demonstrate proficiency in scripting and automation (e.g., PowerShell, Python) to support scalable access provisioning and audit processes.
Familiarity with cloud infrastructure security and access controls in hybrid environments, particularly within Microsoft Azure AWS and Oracle Cloud .
Ability to conduct access reviews , entitlement audits , and risk assessments to identify and remediate access-related vulnerabilities.
Excellent analytical, problem-solving, and communication skills, with the ability to collaborate across technical and business teams.
These jobs might be a good fit