Senior Splunk Detection Engineer

Bank of America

3.2

(114)

Multiple Locations

Why you should apply for a job to Bank of America:

  • 57% say women are treated fairly and equally to men
  • 74% say the CEO supports gender diversity
  • Ratings are based on anonymous reviews by Fairygodboss members.
  • A competitive benefits and programs have earned us recognition by Working Mother magazine for more than 30 years.
  • Employee Financial Services offers U.S. employees financial education and special access to financial products, services and expertise.
  • Offers comprehensive domestic partner benefits to U.S. employees and incorporate sexual orientation into non-discrimination policies.
  • #JR-25010107

    Position summary

    on works to continuously strengthen the bank's cyber security posture through partnership and delivery of technology to support our threat hunt teams and rapid deployment in response to offensive security engagements. This team works with partners throughout the bank to both discover and develop mitigations from threats to help secure a critical infrastructure around the world that interacts with millions of customers.

    Role Responsibilities

    The position of Senior Splunk Detection Engineer is responsible for analyzing and correlating large data sets to uncover novel threats and attack techniques that may be present within the bank's environments. A Senior Splunk Detection Engineer also will be tasked with and collaborating with data science, threat research, and cyber defense control teams to identify opportunities to develop analytical methods to detect advanced threat actors who utilize emerging tactics and techniques. In support of these processes, the role will also include developing and documenting new and innovative detection content to increase the team's ability to find existing threats that are otherwise going unidentified or unnoticed. The role will also be expected to actively share knowledge and mentor more junior members of the Security Operations and Threat Response team.

    The role will work with all Cyber Defense operational and technical teams within Global Information Security (GIS) to gain insight into critical security controls and architectural specifics to develop valuable detection strategies and analytics that identify malicious behavior accurately while maintaining a low false positive rate. This role advises on and reviews product assessments, policy adjustments, and architectural transformations that impact the global Corporation, and will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls. The role will need hands on technical acumen with writing efficient SPL and Macros within short timelines to support detection needs of the firm.

    Required Skills:

    • Minimum of 8+ years of experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Defensive Security/Purple Team, or Cyber Threat Intelligence.

    • Direct experience performing content detection engineering and threat hunting in an active corporate environment.

    • Significant experience working with Splunk Procedure Language to create and tune detections.

    • Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue.

    • Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.

    • Ability to navigate and work effectively across a complex, geographically dispersed organization.

    • Experience with more than one or more enterprise scale EDR, SIEM, and SOAR tools.

    • Previous experience performing digital forensics or indecent response on major security incidents.

    • Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain.

    • Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways

    • Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution

    • Familiarity with offensive security strategies and assessment methodology

    • Experience explaining threat hunt objectives in plain English and able to communicate associated risk.

    • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.

    Beneficial but not required:

    • Experience with offensive security tools and integration of SIEM, SOAR, CSPM and other technical integrations within large enterprise networks.

    • Knowledge of basic Data Science concepts and processes.

    • Experience performing security analysis and threat hunting in Cloud environments such as Azure, M365, AWS

    Skills:

    • Application Development

    • Automation

    • Influence

    • Solution Design

    • Technical Strategy Development

    This job will be open and accepting applications for a minimum of seven days from the date it was posted.

    Shift:
    1st shift (United States of America)

    Hours Per Week:
    40

    Learn more about this role

    Why you should apply for a job to Bank of America:

  • 57% say women are treated fairly and equally to men
  • 74% say the CEO supports gender diversity
  • Ratings are based on anonymous reviews by Fairygodboss members.
  • A competitive benefits and programs have earned us recognition by Working Mother magazine for more than 30 years.
  • Employee Financial Services offers U.S. employees financial education and special access to financial products, services and expertise.
  • Offers comprehensive domestic partner benefits to U.S. employees and incorporate sexual orientation into non-discrimination policies.