Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Bank Of America Cyber Threat Intelligence Senior Technical Analyst 
United States, Colorado, Denver 
83713022

26.07.2024

Role Responsibilities

The position of Cyber Threat Intelligence Senior Technical Analyst is responsible for collecting, analyzing, and actioning cyber threat intelligence to defend the Bank. The Cyber Threat Intelligence Senior Analyst also will be tasked with and collaborating with defensive control owners, threat research, and incident response to track and defend against emerging threat tactics, techniques, and procedures. The Cyber Threat Intelligence Senior Technical Analyst requires strategic thinking with a strong background in cyber security, threat intelligence, and leadership.

Required Skills:

  • 7+ years of experience in Cyber Threat Intelligence

  • Experience collecting, analyzing, and actioning Threat Intelligence

  • Must demonstrate extensive knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors.

  • Strong experience communicating and summarizing cyber threat intelligence to senior Bank executives.

  • Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution.

  • Ability to provide expert guidance on threat trends, analysis methods, and defensive strategies to senior management and key stakeholders.

  • Strong experience with offensive security tactics, techniques, and procedures (DDoS, Malware, Phishing, Vulnerabilities, etc.)

  • Strong technical experience performing OSINT investigations.

  • Experience with operational security, sandbox and virtual environments, and profiling threat actors

  • Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors.

  • Technical experience with Threat Intelligence tools such as Passive DNS, Network Flow Analysis, Maltego, Virus Total, URLScan, etc.

  • Ability to analyze threats and distill common Indicators of Attack and Indicators of Compromise

  • Technical experience with defensive tools for actioning threat intelligence including tools like SIEM/Splunk, EDR, Big Data Platforms, etc.

  • Deep experience working with industry-wide frameworks and standards like MITRE ATT&CK

  • Ability to navigate and work effectively across a complex, geographically dispersed organization.

  • Experience with threat intelligence vendors and platforms

  • Previous experience performing threat intelligence and incident response on major security incidents.

  • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.

This job will be open and accepting applications for a minimum of seven days from the date it was posted.

1st shift (United States of America)