

This job is responsible for developing and supporting enterprise-wide information security policies, procedures, and standards. Key responsibilities include applying knowledge of laws, rules, regulations, and information security concepts (e.g., NIST, COBIT, ISO) to establish and maintain policies, validate alignment of processes and controls to requirements, and report on adherence to policy requirements. Job expectations include using data analytics and partnering with internal teams to verify policy compliance, identify gaps in coverage, and support remediation activities.
LOB Overview:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities and operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
Responsibilities:
Support the implementation and ongoing management of access provisioning solutions across enterprise platforms, ensuring alignment with security policies and regulatory requirements.
Apply working knowledge of Active Directory , Microsoft Azure, Amazon Web Services (AWS), and Mainframe , Oracle and SQL databases , file systems , and enterprise storage , with a focus on enforcing least privileged access .
Assist in maintaining access control policies , group structures , and role-based access models to support scalable and secure provisioning.
Collaborate with application owners and infrastructure teams to implement access requirements for new and existing systems.
Participate in automation initiatives to streamline provisioning and de-provisioning workflows , integrating with identity governance platforms and HR systems and IAM controls.
Conduct periodic access reviews , entitlement audits , and certification campaigns to ensure compliance and identify access anomalies.
Investigate and remediate access-related incidents, working closely with cybersecurity and risk teams to address vulnerabilities and improve controls.
Stay current with emerging IAM technologies, regulatory changes, and industry best practices to continuously enhance the access provisioning program.
Prepare metrics, reports, and recommendations to senior leadership and audit teams regarding access provisioning effectiveness and risk posture.
Required Qualifications:
3-5+ years experience in Identity and Access Management, with a focus on access provisioning across enterprise environments.
Working knowledge of Active Directory , Microsoft Azure AWS, Mainframe , Oracle Database , SQL Server , Windows and Unix file systems , and enterprise storage platforms .
Understanding of IAM governance frameworks , platforms ( e.g., SailPoint, Saviynt ) role-based access control (RBAC) , group policy management , and privileged access management (PAM) tools, CyberArk, Hashi Corp and Beyond Trust.
Experience with automated provisioning/de-provisioning workflows , including integration with HR systems to demonstrate proficiency in scripting and automation (e.g., PowerShell, Python) to support scalable access provisioning and audit processes.
Familiarity with cloud infrastructure security and access controls in hybrid environments, particularly within Microsoft Azure AWS and Oracle Cloud .
Ability to conduct access reviews , entitlement audits , and risk assessments to identify and remediate access-related vulnerabilities.
Excellent analytical, problem-solving, and communication skills, with the ability to collaborate across technical and business teams.
משרות נוספות שיכולות לעניין אותך

This job is responsible for designing and overseeing common, reusable, and scalable software components which are either domain independent (e.g., generic data quality tools over billions of rows of data) or domain specific (e.g., classification models for surveillance or testing framework for Global Markets processes). Key responsibilities include enabling Global Risk Management's data and analytical capabilities. Job expectations include working with senior modelers, risk managers, and technologists to understand the current state and design the future state of data and analytics.
Responsibilities:
Managerial Responsibilities:
This position may also have responsibilities for managing associates. At Bank of America, all managers at this level demonstrate the following responsibilities, in addition to those specific to the role, listed above.
Required Qualifications
Desired Qualifications
Skills:
Minimum Education Requirement:Bachelor’s degree in related field or equivalent work experience
1st shift (United States of America)משרות נוספות שיכולות לעניין אותך

Job Description:
We are seeking a skilled and motivated Network Security Engineer to join our GIS Core Engineering team. The Network Security Engineer is a key individual contributor that has accountability for researching, designing, engineering, implementing, and supporting network security solutions. You will utilize in-depth technical knowledge and business requirements to help design and implement a secure solution to meet customer / client needs while protecting the Bank's assets. Develops and implements security standards, procedures, and guidelines for multiple platforms and diverse environment. Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results.
It is imperative that you have a solid knowledge of network security domains such as DDoS, Segmentation, Network Access, Web Content Inspection, Perimeter Defense, and Network monitoring. You will regularly collaborate with experts both in country and in other regions, so excellent communication skills are very important. If you are seeking a demanding role within Global Information Security (GIS) and have the required skills, this will be a great opportunity for you. Typically, applicants should have 5 to 7 years of cybersecurity or engineering experience.
Key Responsibilities:
Serves as a subject matter expert for one or more engineering initiatives and is the point of contact for clients
Contributes to defining and ensuring security requirements are met based on BofA standards and Policies.
Incorporates basic architecture components including threat-models, diagrams, and technological requirements for in solution development.
Understands and utilizes basic network, virtualization, and datacenter technologies for deployment strategies.
Leads the delivery of the major engineering milestones and acts as the critical decision maker with regards to technical design and implementation
Documents and communicates required information for deployment, maintenance, support, and business functionality.
Adheres to team delivery/release process and cadence pertaining to solution deployment and release.
Identifies and raises risks or potential vulnerabilities at all stages of the security-engineering process
Works closely with a diverse set of stakeholders with varying priorities to debate and negotiate paths forward
Navigates and works effectively across a complex, geographically dispersed organization
Required Qualifications:
· Strong fundamental understanding of information security principles, risks, and controls and of cyber security operations functions.
· Knowledge of how Web Based internet facing applications are deployed and set up and experience architecting complex enterprise cybersecurity solutions for data in transit across web, email and b2b environments. Including technology that provides proxy control, malware inspection, SSL termination, and Data Loss Prevention (DLP).
· Understanding of how Content Delivery Networks (CDNs) work, how they are designed to provide application services, and how they are used to mitigate network security threats.
· Detailed knowledge of Network Security solutions such as DDOS mitigations techniques, WAF, etc.
· Knowledge Solid experience with designing, evaluating, and deploying network security solutions for outbound, inbound, and lateral network traffic. Experience engineering web content inspection solutions using tools such as Skyhigh Web gateway, Trellix (Fireeye), and F5 LTM/APM/SSLO.
· Experience deploying proxies in the cloud (AWS) and experience with SASE platforms
· Experience coordinating delivery of project/changes milestones, ensures projects stay on target, escalating and identifying roadblocks.
· Ability to quickly diagnose the problem areas and come up with solutions and/or workarounds
· Ability to translate business needs into requirements and experience understand analyzing the technical feasibility and design against the requirements.
Effective communication skills and must be comfortable in delivering messages across a wide spectrum of individuals having varying degrees of technical understanding.
· Ability to work independently on various initiatives with little oversight.
· Strong analytical skills/problem solving/conceptual thinking.
· Motivated and willing to learn.
Desired Qualifications
· Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
· Experience deploying security solutions in virtual environments such as VMWare, AWS, Azure
· Experience integrating network security solutions with IAAS, PAAS and SAAS components such as Zscaler, O365, etc.
· Experience deploying security solutions in email environments.
· Experience with Data Governance, Model Risk Management and Application Management.
· Ability to work with Technical and Non-Technical business owners.
· Experience in large enterprise environments.
· Assist with internal efficiencies projects and development.
· Familiarity with industry standard endpoint tools.
· Relevant certifications: CCNA, CCNP, CISSP, or CEH.
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
משרות נוספות שיכולות לעניין אותך

Job Description:
Job Description:
This position is critical to shaping the organization’s cloud security roadmap. You will drive architectural refactoring, implement cloud-native security frameworks, and ensure compliance with industry standards and regulatory requirements. Your leadership will enable secure innovation and operational resilience at scale.
Strategic Leadership
• Define and execute the enterprise cloud security strategy, aligning with business objectives and regulatory mandates.
• Lead security architecture modernization, including refactoring legacy systems for resilience and compliance.
• Champion cloud security best practices and integrate advanced security solutions across AWS, Azure, and GCP.
Technical Oversight
• Architect and oversee multi-cloud security deployments using Infrastructure-as-Code (IaC) and Policy-as-Code (PaC).
• Implement and optimize Cloud Security Posture Management (CSPM), CNAPP platforms (e.g., Wiz), and other advanced security tools.
• Design and enforce secure CI/CD pipelines, automated testing, and deployment practices.
• Establish security governance models, including identity and access management, workload protection, and compliance monitoring.
Governance & Risk Management
• Ensure alignment with CIS, NIST, ISO 27001, and other regulatory frameworks.
• Partner with internal and external stakeholders to manage security incidents, threat intelligence, and risk mitigation strategies.
Team Development & Mentorship
• Build and mentor a high-performing cloud security engineering team.
• Foster a culture of innovation, accountability, and continuous improvement.
Required Skills
•10+ years in cloud security engineering, with 5+ years in leadership roles within large-scale enterprises.
• Proven experience in multi-cloud security architecture (AWS, Azure, GCP) and cloud-native security services.
• Expertise in architectural refactoring, workload migration, and security governance models.
• Strong knowledge of CSPM, SSPM, CIEM, CWPP solutions and CNAPP platforms (e.g., Wiz).
• Familiarity with Cloud Security Alliance, CIS benchmarks, and SANS standards.
Preferred Skills
• Hands-on experience with container security (Docker, Kubernetes) and orchestration platforms.
• Proficiency in Python, PowerShell, Bash for automation and UAT testing.
• Experience with financial industry compliance and regulatory frameworks.
• Strong communication skills to influence executive leadership and articulate technical strategies to non-technical audiences.
Skills:
Influence
Risk Management
Solution Design
Stakeholder Management
Technical Strategy Development
Analytical Thinking
Application Development
Collaboration
Result Orientation
Solution Delivery Process
Agile Practices
Architecture
Automation
Data Management
DevOps Practices
משרות נוספות שיכולות לעניין אותך

Responsibilities:
Required Skills & Experience:
If interested apply online ator email your resume toand reference the job title of the role and requisition number.
EMPLOYER:BofA Securities, Inc.
1st shift (United States of America)משרות נוספות שיכולות לעניין אותך

LOB Summary:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities and operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
Role Description:
This role will be responsible for designing and implementing modernized processes that optimize Identity and Access Management workflows and cross-functional integration with systems that are deeply interconnected with identity management (i.e. HR, IT, Security). The ideal candidate will possess strong organizational, leadership, and communication skills, with the ability to engage senior leaders and teams across the enterprise. In this role, you will partner with stakeholders in Global Information Security (GIS) and the bank to drive end-to-end identity processes aligned with strategic organizational goals. You will ensure transparency in work activities, alignment with business and technology strategies, and establish governance structures for effective delivery oversight.
Responsibilities include leading end-to-end process reviews with the Identity and Access Management and upstream/downstream teams to identify process gaps and risks. Using data-driven analysis, you will recommend strategic improvements with measurable outcomes. You will also provide thought leadership with respect to identifying inefficiencies, document current and future state processes, and develop user guides and metrics to translate identity insights into to optimal user experience while meeting the bank’s security standards.
Designs, develops, tests, implements, and integrates Identity and Access Management (IAM) processes that support operational transformation of systems and solutions.
Define, document, and build detailed workflows, SOP’s, and documentation that enable automation and scalability.
Establish sustainable long-term plans with clear, proactive, and measurable targets.
Serve as a liaison between Identity and Access Management, Human Resources, aligned IT teams, Compliance, and Operations teams to ensure alignment
Develop processes that incorporate input from senior leadership, stakeholders, and partners to ensure alignment of priorities and actions.
Maintain and enhance strategic planning materials, including deep dives and book of work documentation.
Continuously seek innovative solutions, challenge the status quo, and drive process improvements using data analysis and process modeling techniques.
Identify process gaps and risks and collaborate with partners to develop mitigation plans.
Monitor process performance using metrics and drive continuous improvement initiatives.
Ensure compliance with internal policies and external regulations through robust process design.
Act as a subject matter expert in process engineering and identity system integration.
Champion a culture of continuous improvement by applying Lean and Six Sigma methodologies.
Communicate strategic improvement ideas and lead initiatives aligned with business priorities.
Deliver effective process standardization with a human-centered approach, enabling technology teams to implement optimized solutions.
Organize and communicate information clearly to keep cross-functional stakeholders aligned and informed.
Required Qualifications:
5+ years of experience in process analysis and engineering, business architecture, or identity/access management
Strong understanding of IAM platforms (e.g., Okta, SailPoint, Active Directory, etc.)
Experience integrating identity systems with HR platforms (e.g., Workday, SAP)
Knowledge of regulatory requirements and risk management practices
Formal training/certification in Lean, Six Sigma and/or other process quality methodologies
Experience using Visio or other Business Process Mapping Notation (BPMN) tools
Excellent analytical, communication, and cross-functional collaboration skills.
Desired Qualifications:
Passion for continuous improvement by using your experience and expertise to improve existing processes
Ability to utilize logic & reason to navigate complex problem solving
Ability to navigate complex security technology environments
Experience in financial services or highly regulated industries
Familiarity with cloud-based identity solutions and zero trust architectures
משרות נוספות שיכולות לעניין אותך

Job Description:
Job Description:
This job is responsible for defining and leading the engineering approach for complex features to deliver significant business outcomes. Key responsibilities of the job include delivering complex features and technology, enabling development efficiencies, providing technical thought leadership based on conducting multiple software implementations, and applying both depth and breadth in a number of technical competencies. Additionally, this job is accountable for end-to-end solution design and delivery.
Responsibilities:
Required Qualifications:
Desired Qualifications:
Skills:
משרות נוספות שיכולות לעניין אותך

This job is responsible for developing and supporting enterprise-wide information security policies, procedures, and standards. Key responsibilities include applying knowledge of laws, rules, regulations, and information security concepts (e.g., NIST, COBIT, ISO) to establish and maintain policies, validate alignment of processes and controls to requirements, and report on adherence to policy requirements. Job expectations include using data analytics and partnering with internal teams to verify policy compliance, identify gaps in coverage, and support remediation activities.
LOB Overview:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities and operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
Responsibilities:
Support the implementation and ongoing management of access provisioning solutions across enterprise platforms, ensuring alignment with security policies and regulatory requirements.
Apply working knowledge of Active Directory , Microsoft Azure, Amazon Web Services (AWS), and Mainframe , Oracle and SQL databases , file systems , and enterprise storage , with a focus on enforcing least privileged access .
Assist in maintaining access control policies , group structures , and role-based access models to support scalable and secure provisioning.
Collaborate with application owners and infrastructure teams to implement access requirements for new and existing systems.
Participate in automation initiatives to streamline provisioning and de-provisioning workflows , integrating with identity governance platforms and HR systems and IAM controls.
Conduct periodic access reviews , entitlement audits , and certification campaigns to ensure compliance and identify access anomalies.
Investigate and remediate access-related incidents, working closely with cybersecurity and risk teams to address vulnerabilities and improve controls.
Stay current with emerging IAM technologies, regulatory changes, and industry best practices to continuously enhance the access provisioning program.
Prepare metrics, reports, and recommendations to senior leadership and audit teams regarding access provisioning effectiveness and risk posture.
Required Qualifications:
3-5+ years experience in Identity and Access Management, with a focus on access provisioning across enterprise environments.
Working knowledge of Active Directory , Microsoft Azure AWS, Mainframe , Oracle Database , SQL Server , Windows and Unix file systems , and enterprise storage platforms .
Understanding of IAM governance frameworks , platforms ( e.g., SailPoint, Saviynt ) role-based access control (RBAC) , group policy management , and privileged access management (PAM) tools, CyberArk, Hashi Corp and Beyond Trust.
Experience with automated provisioning/de-provisioning workflows , including integration with HR systems to demonstrate proficiency in scripting and automation (e.g., PowerShell, Python) to support scalable access provisioning and audit processes.
Familiarity with cloud infrastructure security and access controls in hybrid environments, particularly within Microsoft Azure AWS and Oracle Cloud .
Ability to conduct access reviews , entitlement audits , and risk assessments to identify and remediate access-related vulnerabilities.
Excellent analytical, problem-solving, and communication skills, with the ability to collaborate across technical and business teams.
משרות נוספות שיכולות לעניין אותך