Senior Threat Hunter

Bank of America Bank of America · Banking · Boston, MA +5

This role focuses on threat hunting within a large financial institution, analyzing large datasets to identify novel threats and attack techniques. It involves collaborating with data science and threat research teams to develop detection methods for advanced threat actors and creating new threat hunt hypotheses. The role also requires sharing knowledge, mentoring junior members, and advising on security controls and architectural transformations.

What you'd actually do

  1. analyzing and correlating large data sets to uncover novel threats and attack techniques that may be present within the bank’s environments.
  2. collaborating with data science, threat research, and cyber defense control teams to identify opportunities to develop analytical methods to detect advanced threat actors who utilize emerging tactics and techniques.
  3. developing and documenting new and innovative threat hunt hypotheses to increase the team’s ability to find existing threats that are otherwise going unidentified or unnoticed.
  4. actively share knowledge and mentor more junior members of the threat hunt team.
  5. work with all Cyber Defense operational and technical teams within Global Information Security (GIS) to gain insight into critical security controls and architectural specifics to develop valuable hunt strategies and analytics that identify malicious behavior accurately while maintaining a low false positive rate.

Skills

Required

  • Direct experience performing threat hunting in an active corporate environment.
  • 8+ years of experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence.
  • Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain.
  • Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue.
  • Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways
  • Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution
  • Familiarity with offensive security strategies and assessment methodology
  • Experience explaining threat hunt objectives in plain English and able to communicate associated risk.
  • Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.
  • Ability to navigate and work effectively across a complex, geographically dispersed organization.
  • Experience with more than one or more enterprise scale EDR and SIEM tools.
  • Previous experience performing digital forensics or indecent response on major security incidents.
  • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.

Nice to have

  • Knowledge of basic Data Science concepts and processes.
  • Experience with offensive security tools such as Cobalt Strike/Metasploit, techniques such as OSINT, and the methods used to compromise large enterprise networks.
  • Experience performing security analysis and threat hunting in Cloud environments such as Azure, M365, AWS

What the JD emphasized

  • Direct experience performing threat hunting in an active corporate environment.
  • Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain.
  • Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue.
  • Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.