Vice President, Digital Forensics, Global Information Security

Details of the offer

Bank of America What would you like the power to do? For you and your family, your business and your community. At Bank of America, our purpose is to help make financial lives better through the power of every connection.
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities, and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
Your background
Bank of America is seeking to expand and diversify their Digital Forensics and Incident Response (DFIR) capability with motivated and adaptable individuals from a range of different backgrounds and experience. This role is open to individuals with at least 3 years of Digital Forensics experience.
Required Background and Experience
Identify, analyze, and present evidential data from workstation-oriented systems, including but not limited to systems installed with Microsoft Windows. Experience in investigating specific facets or workstreams of various incident scenarios/investigations as part of a broader DFIR/investigative team. Generalist or broad knowledge in computing and networking, together with at least a generalist understanding of information security technologies, techniques, and processes. Experience leading or starting to lead a limited amount of incident scenarios/investigations from commencement to cessation (though not a requirement). Desired Background and Experience
Identify, analyze, and present evidential data from a wide range of enterprise systems for various incident or investigative scenarios, especially involving cloud technology (e.g., Azure or AWS). Experience in investigating and leading various incident scenarios/investigations as part of a broader DFIR/investigative team from commencement to cessation. Well-versed knowledge in computing and networking, together with information security technologies, techniques, and processes. Experience initiating or driving initiatives to transform, evolve, or upgrade incident scenarios/investigative processes and/or technologies. For all candidates, please refer to the following in terms of skills and qualifications:
One of the below qualifications or certifications are a requirement: Bachelor's, Masters or Doctorate Degree in Computer Science, Computer Engineering, Information Security, or Cyber/Digital Forensics related discipline; or Digital Forensics and Incident Response Certification (i.e., EnCE or related SANS certification, such as GCFA). One or more of the following qualifications or certifications are highly advantageous, though not essential: A Cloud related qualification or certification, such as Certified Cloud Security Professional (CCSP), or related to Microsoft Azure and Amazon Web Services (AWS); or Linux Qualification or Certification, e.g., Red Hat Certified System Administrator. One or more of the following skills or experience are also highly advantageous and would be particularly exciting, though not essential: Programming and scripting skills or experience, such as: Programming skills and experience, such as Java, C++, Python; or Batch or shell scripting experience within Windows or Linux environments. Experience in one of the following Digital Forensics and Incident Response (DFIR) backgrounds: Cloud and/or containerization technologies (i.e., Docker and Kubernetes) within an enterprise environment; or Linux/Unix systems with particular focus on RedHat or other enterprise scale distributions (distros). What you can expect
The Cyber Threat Defense (CTD) team's aim is to protect the bank and has an end-to-end view and influence over all security controls at the Bank. Digital Forensics (DF), which is part of CTD, is a reactive team that responds to events or incidents in order to identify and mitigate risk to the Bank. Digital Forensics purview encompasses a wide breadth of incidents, which includes but are not limited to third party breaches, determining data exfiltration, and anything else in-between. The Digital Forensics team are well trained and comprise individuals with various backgrounds, including law enforcement, consulting, and industry. The Digital Forensics team has a vested interest in taking members of the team to the next level. Regardless of levels of experience, training and certification opportunities are commonplace and actively encouraged, as well as the empowerment to invest time in learning new and upcoming technologies that improve on the way that we respond to incidents.
What you will do
Utilize your extensive Digital Forensics and Incident Response experience to conduct and manage your individual caseload across the entire incident response or investigative lifecycle from start to finish. Discover unfamiliar technology or data during the midst of an incident or investigation and assess its relevance to the issues at hand, i.e., stored information, auditing capability, evidential value, etc. Leverage your ability to communicate, both written and verbal, in a clear, concise, and inclusive manner to technical and non-technical audiences with colleagues, peers, and stakeholders at all levels. Embrace new and upcoming technologies and assess how they could apply and improve on the way in which the team responds to incidents. Work alongside a global team with colleagues in the USA and Europe, emphasizing collaboration and sharing of ideas and methodologies. Undertake and share the responsibilities of working an on-call schedule so that the bank is well placed to respond to incidents or investigations when required. #J-18808-Ljbffr


Nominal Salary: To be agreed

Source: Talent2_Ppc

Requirements

Secure Kernel Engineer, Sydney - Australia

Secure Kernel Engineer, Sydney - AustraliaSoftware and ServicesThe people here at Apple don't just build products, we build the kind of wonder that revolutio...


Apple Inc. - New South Wales

Published 5 days ago

Senior Technical Analyst, Erdm | Sydney, Au

Senior Technical Analyst, ERDM Westpac Banking Corporation, Sydney, Australia Job Description Permanent Sydney based Data Platforms How will I help? The ERDM...


Westpac - New South Wales

Published 5 days ago

Nbn Telecommunications Desktop Designer

Telecommunications (Information & Communication Technology)Full timeThis opportunity will suit an experienced Telecommunications Designer. This is your chanc...


Northbridge Recruitment - New South Wales

Published 5 days ago

Cloud Operations Lead

Cloud Operations Lead (AWS)Job DescriptionSydney or Melbourne location with flexible workingBe a part of a world class teamHow will I help?The Cloud Support ...


Westpac - New South Wales

Published 5 days ago

Built at: 2024-11-17T14:29:56.135Z