Vacancy expired!
Job Description:
Are you passionate about working with the best information security team in the world? Bank of America is hiring top talent to join our team. The Cyber Security Defense (CSD) function within Global Information Security is responsible for all aspects of threat intelligence and monitoring, application and network security, and insider threat. In addition, the CSD team drives out the enterprise-wide cyber exercise program. Are you passionate about working with the best information security team in the world? Bank of America is hiring top talent to join our team. The Cyber Security Defense (CSD) function within Global Information Security is responsible for all aspects of threat intelligence and monitoring, application and network security, and insider threat. In addition, the CSD team drives out the enterprise-wide cyber exercise program. Offensive Security Engineer - Vulnerability ResearcherAs an experienced professional, performs research, analysis, and testing of computer/network vulnerabilities. Leverages multiple methodologies including exploit development, reverse engineering, detection and mitigation analysis, and/or penetration testing across a wide variety of platforms and systems. Creates reporting that outlines and documents test findings and their potential impacts in clear and concise language. Partners with various line of business teammates to educate on specific vulnerabilities associated with their business segments and recommend the appropriate remediation actions. Successful candidates will demonstrate the ability to consistently communicate vulnerability issues to a broad audience including both technical and non-technical colleagues. They will build and sustain relationships with members of Global Information Security, technical stakeholders, risk partners, and executive leadership to ensure that risk is identified and remediated across a variety of Lines of Businesses. This role typically requires 7-10 years of IT experience, with at least 5 of those years focused on vulnerability testing.Required Skills:- Highly proficient with IDA, Ghirda, etc.
- Must have a solid understanding of exploit development and related skills, including debugging, assembly, and exploit mitigations
- Demonstrated proficiency with Metasploit, Burp Suite, Cobalt Strike, etc.
- Possess a solid understanding of voice and data networks, major operating systems, active directory, and their associated peripherals
- Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
- Ability to critically examine an organization and system through the perspective of a threat actor and articulate risk in clear, precise terms.
- Works well independently and as part of a team comprised of individuals with a variety of skills and backgrounds
- Ability to effectively code in a scripting language i.e. Python, Perl, etc.
- Highly proficient with IDA, Ghirda, etc.
- Must have a solid understanding of exploit development and related skills, including debugging, assembly, and exploit mitigations
- Demonstrated proficiency with Metasploit, Burp Suite, Cobalt Strike, etc.
- Possess a solid understanding of voice and data networks, major operating systems, active directory, and their associated peripherals
- Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
- Ability to critically examine an organization and system through the perspective of a threat actor and articulate risk in clear, precise terms.
- Works well independently and as part of a team comprised of individuals with a variety of skills and backgrounds
- Ability to effectively code in a scripting language i.e. Python, Perl, etc.
- Highly proficient with IDA, Ghirda, etc.
- Must have a solid understanding of exploit development and related skills, including debugging, assembly, and exploit mitigations
- Demonstrated proficiency with Metasploit, Burp Suite, Cobalt Strike, etc.
- Possess a solid understanding of voice and data networks, major operating systems, active directory, and their associated peripherals
- Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
- Ability to critically examine an organization and system through the perspective of a threat actor and articulate risk in clear, precise terms.
- Works well independently and as part of a team comprised of individuals with a variety of skills and backgrounds
- Ability to effectively code in a scripting language i.e. Python, Perl, etc.
Vacancy expired!