#JR-26012505
can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Job Description:
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. As part of Global Information Security (GIS), the Cyber Security Operations (CSO) function defends the organization and our clients by identifying, mitigating, and responding to cyber and insider threats. This role integrates responsibilities from both Insider Threat Investigations and Threat Management functions, emphasizing proactive risk detection, investigation, analysis, and partnership across the enterprise.
We value curiosity, critical thinking, operational excellence, and the ability to collaborate across diverse teams and technical backgrounds. You'll have opportunities to learn, grow, and make an impact on global security.
Position Summary:
The Information Security Threat & Insider Risk Management Specialist is responsible for identifying, analyzing, and mitigating threats posed by malicious actors-both internal and external. This role conducts technical assessments, performs complex investigations, analyzes data from monitoring tools, and evaluates security controls to detect and address risks across the bank's systems, applications, and personnel.
The specialist will develop subject-matter expertise across insider threat indicators, cyber threat tactics, data loss trends, and adversarial behaviors. The role also requires strong communication skills, sound judgment, and the ability to collaborate with investigative teams, technical partners, and executive stakeholders.
A rotational on-call duty, around once per month, may be required to support a global Follow-the-Sun (FTS) model.
Responsibilities:
Threat Detection, Investigation & Analysis
Conduct complex insider threat and cyber-related investigations using data from monitoring tools, system logs, and multiple internal resources
Collect, analyze, and correlate data across applications, systems, and investigative platforms to identify anomalous or high-risk activity
Perform interviews and engage with persons of interest when required to validate investigative findings
Assess systems, applications, and access mechanisms for compliance with GIS policies and threat frameworks
Monitor emerging cyber and insider threat trends, tools, and adversarial tactics to ensure early detection and response
Security Controls, Risk Assessment & Remediation
Evaluate the effectiveness of security controls, policies, and monitoring technologies; identify opportunities for improvement
Document investigative findings, risk assessments, and recommended remediation through formal reports
Utilize risk management and escalation processes to ensure timely mitigation of identified vulnerabilities or threats
Support the implementation and improvement of preventative controls, insider risk tooling, data loss detection, and correlation engines
Collaboration & Stakeholder Engagement
Partner with cross-functional teams across GIS, Compliance, Legal, HR, and global business units to drive case resolution and strengthen controls
Present investigative results, risk insights, and technical explanations to audiences with varying levels of cybersecurity understanding
Serve as a subject matter expert on insider threat behaviors, detection mechanisms, and response procedures
Develop strong operational partnerships and contribute to long-term program enhancements
Documentation & Operational Excellence
Maintain detailed investigative notes and case documentation
Manage multiple cases, projects, and ad hoc requests with strong organizational discipline
Adapt testing and investigative methodologies in alignment with evolving threat landscapes and regulatory requirements
Required Skills & Qualifications:
5+ years of experience in insider threat, cyber threat analysis, counterintelligence, or related investigative functions
Strong knowledge of networking fundamentals, log analysis, security monitoring, and adversarial techniques
Experience with investigative and monitoring tools (e.g., Splunk, ENCASE, CrowdStrike, SIEM platforms)
Demonstrated ability to conduct complex investigations independently with minimal oversight
Exceptional written and verbal communication skills, including presenting to executives
Strong analytical, problem-solving, and critical-thinking skills
Proficiency in Jira, Excel, and executive-level reporting
Ability to manage multiple concurrent investigations with minimal risk impact
Ability to collaborate across regions, cultures, and technical skill levels
Desired Skills & Qualifications: