Bank of America-posted 3 months ago
Full-time • Mid Level
Washington, DC
Credit Intermediation and Related Activities

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day. Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve. Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!

  • Analyze, triage, and support data transformation initiatives as part of the Splunk team.
  • Enhance the security data environment to provide optimal uptime of the Splunk platform.
  • Provide tactical and strategic enhancements to the platform on behalf of cyber security technology and operations teams.
  • Share knowledge and mentor junior members of the Security Operations and Threat Response team.
  • Work with Cyber Defense operational and technical teams to develop detection strategies and analytics.
  • Advise on product assessments, policy adjustments, and architectural transformations.
  • Design cutting-edge detective, preventative, and proactive controls.
  • Write efficient SPL within short timelines to support detection needs.
  • Design and implement data ingestion strategies for various log sources into Splunk.
  • Develop and maintain parsing configurations to normalize and enrich incoming data.
  • Create and optimize search queries and reports to extract insights from indexed data.
  • Implement security best practices within Splunk to safeguard sensitive data.
  • Collaborate with the security team to configure and monitor alerts for suspicious activities.
  • Develop automation scripts using SPL and other scripting languages to streamline tasks.
  • Maintain thorough documentation of Splunk configurations and processes.
  • Provide training and support to other IT team members on Splunk best practices.
  • Minimum of 6+ years of experience in a technical role in Security Operations, Incident Response, or Content Development.
  • Direct experience performing content detection engineering and threat hunting in a corporate environment.
  • Significant experience with Splunk Procedure Language to create and tune detections.
  • Experience mapping data fields to a common data model such as CEF, OCSF.
  • Experience with large datasets and log analysis tools including Splunk, Python, Pandas, SQL, Hadoop, Hue.
  • Ability to navigate and work effectively across a complex, geographically dispersed organization.
  • Experience with enterprise scale EDR, SIEM, and SOAR tools.
  • Experience in requirements gathering, documenting requirements, and product testing.
  • Splunk Infrastructure Management Experience/Knowledge.
  • Experience in Splunk enterprise and Splunk Cloud.
  • Experience with offensive security tools and integration of SIEM, SOAR, CSPM.
  • Knowledge of basic Data Science concepts and processes.
  • Experience performing security analysis and threat hunting in Cloud environments such as Azure, M365, AWS.
  • Experience Maintaining KV Stores.
  • Experience Performing Regular Updates/Upgrades on Splunk Apps and Add-ons.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service