Vice President, Manual Ethical Hacker (MEH) Specialist, Global Information Security
Company
Bank of America
Location
Sydney, Australia
Type
Full Time
Job Description
Job Description:
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Want more jobs like this?
Get Computer and IT jobs in Sydney, Australia delivered to your inbox every week.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
Job Description:
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity.
This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.
Responsibilities:
Key Responsibilities in order of importance:
- Perform assigned analysis of internal and external threats on information systems and predict future threat behavior
- Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
- Perform assessments of the security, effectiveness, and practicality of multiple technology systems
- Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
- Prepare and present detailed technical information for various media including documents, reports, and notifications
- Provide clear and practical advice regarding managed risks
- Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills
Skills:
Required Skills:
- Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
- Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
- SQL injection/XSS attack without the use of tools
- Experience performing manual code reviews for security relevant issues
- Experience working with SAST tools to identify vulnerabilities
- Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
- Experience performing manual web application assessments i.e., must be able to simulate a
- Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
- Experience with vulnerability assessment tools and penetration testing techniques
- Solid programming/debugging skills
- Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map
- Threat Analysis
- Innovative Thinking
- Technology Systems Assessment
- Technical Documentation
- Advisory
Desired:
- CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar
- Strong programming/scripting skills
Date Posted
01/22/2025
Views
0
Similar Jobs
Recruiter/Sales Specialist (Contractor) - Healthcare Abroad
Views in the last 30 days - 0
Healthcare Abroad is seeking a RecruiterSales Specialist to focus on Australian placements Key responsibilities include candidate placement business d...
View DetailsSupport Engineer - Pricefx
Views in the last 30 days - 0
Pricefx a leading SaaS Pricing and Price Optimization Management provider is seeking a Tier 34 Support team member The role involves providing technic...
View DetailsLead Engineer - Frontend, Design Systems - Deputy
Views in the last 30 days - 0
Deputy a global SaaS workforce management company is seeking a Tech Lead to drive the growth and impact of their design system Copilot The role involv...
View DetailsAssociate Account Executive - Octopus Deploy
Views in the last 30 days - 0
Octopus Deploy founded in Australia in 2012 is a global leader in Continuous Delivery solutions serving over 4000 organizations including Ubisoft ASOS...
View DetailsEnterprise Account Executive - Creatio
Views in the last 30 days - 0
Creatio is seeking an experienced Enterprise Account Executive with a minimum of 35 years of experience in enterprise SaaS platform sales into large e...
View DetailsSoftware Engineer II - Backend - Deputy
Views in the last 30 days - 0
Deputy a global SaaS workforce management company is improving the world of work for hourly workers They are seeking a Software Engineer to design imp...
View Details