Digital Forensics Analyst Job at Bank of America Corporation, Charlotte, NC

cUJBVEJKZ05DTWpoZXp3WUd4b1hOdFpZN2c9PQ==
  • Bank of America Corporation
  • Charlotte, NC

Job Description

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.

One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.

Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.

Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!

Bank of America is seeking to expand and diversify their Digital Forensics and Incident Response (DFIR) capability with motivated and adaptable individuals from a range of different backgrounds and experience. This role is open to individuals with at least 3 years of Digital Forensics experience.

Required Background and Experience

  • Identify, analyze and present evidential data from workstation orientated systems, including but not limited to systems installed with Microsoft Windows; and

  • Such candidates will have experience in investigating specific facets or workstreams of various incident scenarios/investigations as part of a broader DFIR/investigative team; and

  • This particular type of candidate will have accumulated some form of generalist or broad knowledge in computing and networking, together with at least a generalist understanding of information security technologies, techniques and processes.

  • This candidate may also have led or started to lead a limited amount of incident scenarios/investigations from commencement to cessation, though not a requirement.

Desired Background and Experience

  • Identify, analyze and present evidential data from a wide range of enterprise systems for a wide range of incident or investigative scenarios. Scenarios involving cloud technology, such as Azure or AWS, would be especially advantageous; and

  • Such candidates will have experience in investigating and leading various incident scenarios/investigations as part of a broader DFIR/investigative team from commencement to cessation; and

  • This particular type of candidate will be able to draw upon their well-versed knowledge in computing and networking, together with information security technologies, techniques and processes.

  • This candidate may also have initiated or driven initiatives to transform, evolve or upgrade incident scenarios/investigative processes and/or technologies. 

For all candidates, please refer to the following in terms of skills and qualifications:

One of the below qualifications or certifications are a requirement:

  • Bachelor’s, Masters or Doctorate Degree in a Computer Science, Computer Engineering, Information Security or Cyber/Digital Forensics related discipline; or

  • Digital Forensics and Incident Response Certification (i.e. EnCE or related SANS certification, such as GCFA).

One or more of the following qualifications or certifications are highly advantageous, though not essential:

  • A Cloud related qualification or certification, such as Certified Cloud Security Professional (CCSP), or related to Microsoft Azure and Amazon Web Services (AWS); or

  • Linux Qualification or Certification, e.g Red Hat Certified System Administrator

One or more of the following skills or experience are also highly advantageous and would be particularly exciting, though not essential:

  • Programming and scripting skills or experience, such as:

  • Programming skills and experience, such as Java, C++, Python; or

  • Batch or shell scripting experience within Windows or Linux environments; or

Experience in one of the following Digital Forensics and Incident Response (DFIR) backgrounds:

  • Cloud and/or containerization technologies (i.e. Docker and Kubernetes) within an enterprise environment; or

  • Linux/Unix systems with particular focus on RedHat or other enterprise scale distributions (distros). This experience should also include excellent knowledge of operating system nuances, file systems and inner workings.

What you can expect

The Cyber Security Operation (CSO) team’s aim is to protect the bank and has an end to end view and influence over all security controls at the Bank. Digital Forensics (DF), which is part of CSO, is a reactive team that responds to events or incidents in order to identify and mitigate risk to the Bank. Digital Forensics purview encompasses a wide breadth of incidents, which includes but are not limited to third party breaches, determining data exfiltration and anything else in-between. The Digital Forensics team are well trained and comprise of individuals with a number of different backgrounds, which range from law enforcement, consulting and from within industry. The Digital Forensics team has a vested interest in taking members of the team to the next level. Regardless of levels of experience, training and certification opportunities are commonplace and actively encouraged, as well as the empowerment to invest time in learning new and upcoming technologies that improve on the way that we respond to incidents.

What you will do

Not one day is the same for Cyber Security Operation (CSO) team and this is especially true for Digital Forensics (DF). Anyone working within the Digital Forensics team can expecting the following:

  • Utilizing your extensive Digital Forensics and Incident Response experience to conduct and manage your individual caseload across the entire incident response or investigative lifecycle from start to finish;

  • Discovering unfamiliar technology or data during the midst of an incident or investigation and assessing its relevance to the issues at hand, i.e. stored information, auditing capability, evidential value etc.;

  • Leveraging upon your ability to communicate, both written and verbal, in a clear, concise and inclusive manner to technical and non-technical audiences with colleagues, peers and stakeholders at all levels;

  • Embracing new and upcoming technologies and assessing how they could apply and improve on the way in which the team responds to incidents;

  • Working alongside a global team with colleagues in the USA and Europe, whilst placing emphasis on collaboration and sharing of ideas and methodologies;

  • Undertaking and sharing the responsibilities of working an on-call schedule so that the bank is well placed to respond to incidents or investigations when required.

This job is responsible for supporting evaluations of cyber security threats and updating defensive capabilities to reduce the bank's risk of exposure. Key responsibilities include conducting analyses of the threat environment and threats to the bank, including post incident analysis, applying a multi-faceted situational awareness of cyber security processes to protect against threats, and implementing proactive defensive actions for the security, continuity, and confidentiality of information.

Shift:

1st shift (United States of America)

Hours Per Week: 

40

Job Tags

Full time, Shift work, Day shift,

Similar Jobs

Loyola University Chicago

Web Designer Job at Loyola University Chicago

 ...Position Details Position Details Job Title WEB DESIGNER Position Number 8102482 Job Category University...  ...developing web pages in corporate, educational, or freelance environment. Certificates/Credentials/Licenses n/... 

The Pines Healthcare Center

RN Registered Nurse, Up to $41, Night Shift Job at The Pines Healthcare Center

The Pines Healthcare Center , a member of the CommuniCare Family of Companies, is currently recruiting for RN Charge Nurses to join our team. Earn up to $41 an hour on night shift based on experience! Starting Rates: $34-37 based on experience, plus $4 shift ...

Terr Heel Inc

No CDL Package Delivery Driver for FedEx contractor Job Job at Terr Heel Inc

No CDL Package Delivery Driver for FedEx contractor JobJob Description:-Daily parcel delivery to local businesses and private residences-Must be willing to work quickly/safely delivering to upwards of 100 stops a day-Must have good customer service skills-Able... 

Stretchplex

Personal Trainer Job at Stretchplex

 ...schedule ~ Health insurance Stretchplex is hiring personal trainers, physical therapist assistants, massage therapists, yoga and...  ...adhere to our attendance policies includes a combination of online tutorials and in-person/hands-on training Must be available... 

Cox Automotive

Automotive Mechanic Technician I (Manheim) - $1,500 New Hire Tool Bonus Job at Cox Automotive

 ...cars but also a willingness to get your hands dirty and embrace the art and science of machines. Does this resonate with you? We're hiring an Auto Maintenance Tech I to perform repairs and maintenance on a variety of vehicles. If you're looking for an exciting career...