Data Security Endpoint Protection Engineer in Addison, TX

Bank of America Corporation   •  

Addison, TX 75001

Industry: Finance & Insurance

  •  

5 - 7 years

Posted 55 days ago

In this role, you will partner with Global Information Security (GIS) senior leaders to assist with defining the strategy and roadmaps for technology products, service standards, and governance routines that impact the global Corporation. You will be partnering with leadership across the Bank to design controls, governance routines, and service alternatives that improve the firm's defenses against Insider risks.

You may direct multiple major technology teams within Global Technology that research, engineer, test, implement, communicate, monitor, and maintain solutions supporting the Bank's information security policies and/or procedures.

You will utilize your in-depth knowledge and business requirements to design and engineer secure solutions to meet customer/client needs, or to address critical audit findings while protecting the Bank's data assets.

Required Skills:

  • Deep experience with Insider Threat as a focus area within Information Security.
  • Expert knowledge of MS Windows Desktop OS and application packaging, customization, and integration.
  • Experience with VMWare ESX and Horizon/ Workspace One products.
  • Experience with Citrix Application and Desktop publishing via XenApp and XenDesktop - customization, and integration.
  • Familiarity and a desire to work with virtualization and cloud computing.
  • Eagerness to learn, test, and develop security controls for virtualized environments.
  • Knowledge of User and Entity Behavior Analytics and associated technologies.
  • Familiarity Unstructured Data inspection technology.
  • Experience and hands on knowledge with Data Loss Prevention security controls.
  • Experience Web Proxy controls.
  • Experience with Microsoft Office suite including MS Project and Visio.
  • Ability to navigate and work effectively across a complex, geographically dispersed organization.
  • Exceptional communication and customer relationship skills.
  • Ability to build consensus and cooperation as well as to influence, interact and negotiate with senior leadership in the organization.
  • Knowledge of change and project management methodologies and principles and the ability to integrate them into project design.
  • Broad knowledge of Information Security technologies, techniques and processes.
  • Familiarity with Six Sigma tools and vocabulary.
  • Experience leading complex technical projects, meeting target timelines, facilitating project meetings, authoring project documentation, issue resolution, and project resource identification.
  • Demonstrable ability to self-direct project outcomes, with minimal supervision to achieve program goals.
  • Excellent process design capability to improve overall efficiency, mitigate resource conflicts, and improve customer/client experience.

Enterprise Role Overview: As an experienced professional, provide advice to client management with regard to moderately complex security issues. Assists in the review, development, testing and implementation of security plans, products and control techniques. Coordinates the reporting data security incidents. Provides technical support to the client and management and staff in risk assessments and implementation of appropriate data security procedures and products. Monitors existing and proposed security standard setting groups. State and Federal legislation and regulations. Identifies and escalates changes that will affect information security policy, standards and procedures. Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs. Researches attempted efforts to compromise security protocols. Administers security policies to control access to systems and maintains the company firewall. Works on complex problems where analysis of situations or data requires an in-depth evaluation of various factors. Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results. Work leadership may be provided by assigning work and resolving problems. Typically 5-7 years of IT experience.

Valid Through: 2019-11-12