Bank of America

Vice President, Vulnerability Management Remediation, Global Information Security, Sydney, Australia

Sydney Full time

Job Description:

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.

Being a Great Place to Work and providing a culture of caring is core to how we drive Responsible Growth. We are intentional about fostering an inclusive workplace where every teammate has the opportunity to succeed, build a career and contribute to our shared success. This includes attracting and developing exceptional talent, recognizing and rewarding performance, and supporting our teammates’ physical, emotional, and financial wellness through affordable, competitive and flexible benefits.

We value the unique perspectives individuals bring from all backgrounds and career paths - whether shaped by military service, community college education, or a wide range of work and life experiences. These journeys foster resilience, leadership and innovation, strengthening our workforce and positively impact the communities we serve.

Bank of America is committed to an in-office culture that supports collaboration, engagement, and career development. Our approach includes clear in-office expectations, while providing an appropriate level of flexibility based on role-specific responsibilities and business needs.

At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!

Job Description:

You will be part of the Global Information Security (GIS) Cyber Security Assurance (CSA) Enterprise Infrastructure Remediation Governance (EIRG) team. In this role, you will play an integral part in ensuring the security of our organization’s core and cloud infrastructure by helping to develop, oversee, and improve the governance models of vulnerability remediation.

As part of the EIRG team, you will collaborate closely with cross functional teams and stakeholders in IT, business technology groups, Risk Partners, and other Information Security teams. You will help with ensuring accurate ingestion and review of the organization’s portfolio of key vulnerability risks, engage with teams on key findings, progress of remediation activities, and influence or otherwise escalate issues or anomalies in either the reported vulnerability data or the response activities of key stakeholders.

Ultimately, in conducting remediation efforts as an Information Security Consultant for the GIS CSA EIRG team, you will ensure major risks are addressed as appropriate to appropriate prioritization/risk timelines, and aim to ensure the accuracy and efficiency of the program’s processes, reporting tools, and culture of effectively risk management around all matters of vulnerability remediation.

 Key responsibilities:

  • Oversee remediation efforts for identified vulnerabilities; inclusive of but not limited to software, hardware, and compliance/configuration violations within various infrastructure environments at our organization.
  • Analyze, identify anomalies, and escalate findings for action utilizing security monitoring systems such as Aqua, Qualys Scanning, Network Configuration Compliance tools, and Security Compliance tools, to identify and direct response to potential vulnerabilities that may represent a pathway for major security incidents and data breaches to occur.
  • Conduct iterative, consistent reviews of known vulnerabilities across the organization’s systems which may have environmental context that allows for variation on standard remediation timelines. Discussing and reviewing these plans is conducted with Line of Business contacts, GIS representatives to the business, application design or technology teams, data owners / custodians of key data, or general system administrators.
  • Fundamentally, ensure both routine and bespoke remediation plans are implemented per agreed upon deadlines, proper periodic reviews, and full alignment with information security guidelines. If identification occurs of any potential gaps that may result in possible audit issues, they must be discussed, reviewed and escalated for self-ownership by the EIRG team.
  • Drive routine remediation of vulnerabilities and misconfiguration issues in public and private cloud infrastructure.
  • Design and enhance the overall vulnerability management process for public and private cloud infrastructure.
  • Serve as a key resource for improving the governance of remediation in both cloud and physical assets, acting as the APAC regional subject matter expert for remediation governance.
  • Review all vulnerability scan results to identify all security risks, as well as report on the findings to appropriate partners.
  • Respond to relevant requests received from both key stakeholders, as well as the representatives of stakeholders, for investigation of potential reporting issues.
  • Assist to provide all the necessary reports and presentations on the status of regional remediation efforts, contribute routinely to global reports and presentations, and ensure the escalation of any gaps or potential obstacles or issues, both regional and global, to management and/or relevant Information Security or technical staff.
  • Perform other related duties which may be incidental to the work described herein, along with any special assignments in the broader GIS CSA division as needed or assigned.

Required Qualifications

  • 5+ years of experience in Information Security
  • Proven project management Skills
  • Experience with Aqua, Qualys Scanning or similar security monitoring systems
  • Excellent communication skills, as well as the ability to understand and translate cyber security threats from a technical perspective to business-line understanding and execution; the ability to communicate risks and propose response and/or countermeasures to both technical stakeholders and senior technology executives
  • Well-developed analytic, qualitative, and quantitative reasoning skills and demonstrated creative problem-solving abilities with complementary skills for log analytics and diagnosis skills utilizing regular expression and/or scripting
  • Ability to work independently on initiatives with little oversight. Motivated and willing to learn across the discipline and beyond.
  • Broad technical background utilizing security toolsets and technologies, such as Cloud, Server and Workstation Operating Systems, Network Security, Vulnerability Scanning Tools, and Compliance Management solutions
  • Strong PC skills including Microsoft Office applications

 Desired Qualifications

  • Bachelors and/or Master’s degree in Computer Science, Information Technology or otherwise proven 5+ years experience in a the relevant field
  • Strong analytical skills/problem solving/conceptual thinking
  • Ability to effectively communicate with Technical and Non-Technical business owners
  • Lead internal efficiencies projects and development