×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Threat & Intelligence Detection and Capabilities Lead

Job in Denver, Denver County, Colorado, 80285, USA
Listing for: Bank of America
Full Time position
Listed on 2026-02-07
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security
Job Description & How to Apply Below
Position: Cyber Threat Hunt & Intelligence Detection and Capabilities Lead

Overview

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day. Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.

Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!

Responsibilities

The position of Detections and Capabilities lead is responsible for working with our Cyber Threat Intelligence and Cyber Threat Hunt teams to manage detection content to production and develop bespoke capabilities and automations. As a member of the CTHID team you also will be tasked with and collaborating with data science, threat research, and cyber defense control teams to identify opportunities to develop analytical methods to detect advanced threat actors who utilize emerging tactics and techniques.

In support of these processes, the role will also include developing and documenting the detection lifecycle from content creation, triage methodology and transfer to the respective production operations team. The role will also be expected to actively share knowledge and mentor more junior members of the threat hunt and intel teams.

The role will work with all Cyber Defense operational and technical teams within Global Information Security (GIS) to gain insight into critical security controls and architectural specifics to develop valuable hunt strategies and analytics that identify malicious behavior accurately while maintaining a low false positive rate. This role advises on and reviews product assessments, policy adjustments, and architectural transformations that impact the global corporation, and will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls.

Required

Skills
  • 8+ years of experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence
  • Direct experience developing detections for threats within cyber security tools
  • Direct experience developing automations within security orchestration and automation platforms
  • Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain.
  • Direct experience working with very large datasets and log analysis tools including but not limited to:
    Splunk, Python, Pandas, SQL, Hadoop, Hue.
  • Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways
  • Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution
  • Familiarity with offensive security strategies and assessment methodology
  • Experience explaining threat hunt objectives in plain English and able to communicate associated risk.
  • Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.
  • Ability to navigate and work effectively across a complex, geographically dispersed organization.
  • Experience with more than one or more enterprise scale EDR and SIEM tools.
  • Previous experience performing digital forensics or indecent response on major security incidents.
  • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.
Desired Qualifications
  • Knowledge of basic Data Science concepts and processes.
  • Experience with offensive security tools such as Cobalt Strike/Metasploit, techniques such as OSINT, and the methods used to compromise large enterprise networks.
  • Experience performing…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary