At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities, and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
The Malware Defense Team's aim is to reduce risk across Bank of America by using existing or establishing robust cyber-hacking and malicious code containment activities for the security, safeguarding, continuity, and confidentiality of information of Bank of America. They are looking for an advanced-level analyst with experience in threat actor tracking, malware analysis, and reverse engineering of malware.
Responsibilities include, but are not limited to:
1. Working with Malware Defense control owners to evolve malware control strategy and capabilities.
2. Mentioning and training other analysts, helping them to improve their malware analysis and reverse engineering skillsets.
3. Performing in-depth analysis of malware, including authoring analysis reports.
4. Tracking malware campaigns, malicious actors, and related infrastructure.
5. Creating tools and scripts to assist in malware analysis.
Required Skills:
1. Strong direct experience analyzing malware.
2. Intermediate to advanced malware analysis skills.
3. Experience with reverse engineering tools such as IDA Pro, x64dbg, OllyDbg, Immunity Debugger, and Ghidra.
4. Experience analyzing dissembled x86 and x64 code; experience with other architectures like ARM or MIPS is a plus.
5. Experience reverse engineering malware written in C, C++, VisualBasic, Java, .NET, Delphi, JavaScript, and VBScript.
6. Solid background in C++ programming and Win32 APIs.
7. Experience creating malware analysis tools and scripts for tasks like unpacking malware and configuration extraction.
8. Experience building scripts to emulate malware and parse command-and-control traffic is a plus.
9. Knowledge of encryption/obfuscation and reversing techniques.
10. Ability to develop innovative methods to track malware families, infrastructure, and campaigns.
11. Experience with penetration testing or adversary emulation is a plus.
12. Background in network traffic analysis.
13. Knowledge of networking protocols such as TCP/IP, HTTP/HTTPS, FTP, IRC.
14. Certifications like GCIH, GREM, GCFA, or CISSP are desirable but not required.
15. Ability to work independently and as part of a team.
#J-18808-Ljbffr