About The Position

At BNY, our culture allows us to run our company better and enables employees’ growth and success. As a leading global financial services company at the heart of the global financial system, we influence nearly 20% of the world’s investible assets. Every day, our teams harness cutting-edge AI and breakthrough technologies to collaborate with clients, driving transformative solutions that redefine industries and uplift communities worldwide. Recognized as a top destination for innovators, BNY is where bold ideas meet advanced technology and exceptional talent. Together, we power the future of finance – and this is what #LifeAtBNY is all about. Join us and be part of something extraordinary. BNY is seeking a Senior SOC Analyst to join our Security Operations Center. In this role, you will lead incident triage, coordinate response efforts across teams, and mentor analysts to continuously improve detection, response, and recovery capabilities. You will leverage SIEM, EDR, and SOAR tooling to investigate complex threats, reduce dwell time, and strengthen operational resilience for mission-critical services. We’re seeking a future team member for the role of Senior SOC Analyst to join our Security Operations Center team. This role can be in Pittsburgh PA or Lake Mary FL. Schedule: Tuesday–Saturday. POSITION SUMMARY: The Vice President, Information Security plays a pivotal role in safeguarding BNY's information assets by developing, implementing, and managing security strategies. This position is crucial in upholding BNY's Principles of trust and integrity, ensuring that security measures align with the organization's Strategic Pillars. As an Individual Contributor, the Vice President is responsible for leveraging their expertise in the Information Security field to mitigate risks and enhance the protection of sensitive data across the company. This role supports the broader mission of BNY by maintaining a secure and resilient digital environment, fostering an organizational culture of security awareness.

Requirements

  • 6 and 3; years of experience in a SOC, incident response, or threat detection role, including Tier 2/3 investigations.
  • Advanced proficiency with SIEM (e.g., Splunk, QRadar, Sentinel), EDR (e.g., CrowdStrike, Microsoft Defender), and SOAR platforms.
  • Strong knowledge of network security, Windows/Linux, identity systems, and common cloud logging sources.
  • Hands-on experience with the MITRE ATT&CK framework, threat hunting, IOC/IOA development, and detection tuning.
  • Demonstrated ability to lead complex incidents, coordinate stakeholders, and communicate clearly under time pressure.
  • Scripting or automation experience (e.g., Python, PowerShell) for investigation enrichment and workflow improvements.
  • Familiarity with NIST CSF/800-61, CIS Controls, and common regulatory requirements impacting incident response.
  • Excellent documentation skills and an evidence-driven approach to investigations.
  • Bachelor's degree in Information Security, Computer Science, or a related field
  • Strong analytical and problem-solving skills, with the ability to assess complex security challenges
  • Excellent communication and collaboration capabilities to work effectively with various teams
  • Proficiency in security tools and technologies, demonstrating expertise in the Information Security domain
  • Typically 6-10 years of experience

Nice To Haves

  • Relevant certifications: GCIA, GCED, GCIH, GCFA, GNFA, CISSP, CCSP, or equivalent experience.
  • Experience with ticketing and case management systems (e.g., ServiceNow) and knowledge management practices.
  • Prior experience with threat intel platforms, sandboxing tools, and malware triage is a plus.
  • Advanced certifications such as CISSP or CISM are preferred

Responsibilities

  • Lead triage and investigation of security alerts, escalating and coordinating incident response as needed.
  • Perform root cause analysis, scope affected assets, and drive containment, eradication, and recovery.
  • Correlate events across SIEM, EDR, IDS/IPS, firewalls, cloud logs, and identity platforms to identify true positives and reduce false positives.
  • Develop, refine, and maintain SOC playbooks, runbooks, and detection logic aligned to the MITRE ATT&CK framework.
  • Mentor junior analysts and provide guidance on investigation techniques, documentation standards, and operational best practices.
  • Coordinate with Threat Intelligence to enrich investigations, track adversary TTPs, and proactively hunt for indicators of compromise.
  • Partner with Engineering teams to tune detections, improve log fidelity, and strengthen preventive controls.
  • Create clear, actionable incident reports and executive summaries; contribute to metrics and trend analysis.
  • Support purple team exercises and post-incident reviews to capture lessons learned and drive continuous improvement.
  • Ensure adherence to regulatory and security policies; maintain audit-ready documentation for investigations and incidents.
  • Develop and implement comprehensive information security strategies by applying advanced knowledge of security protocols and risk management.
  • Conduct regular security assessments and audits by utilizing industry-standard practices to identify vulnerabilities and recommend improvements.
  • Collaborate with cross-functional teams to integrate security measures into business processes, ensuring seamless protection of digital assets.
  • Monitor emerging security threats and trends, providing expert insights to proactively address potential risks.
  • Lead incident response efforts by coordinating with relevant stakeholders to ensure timely resolution and mitigation of security breaches.
  • Educate and train employees on security best practices, fostering a culture of security awareness across the organization.

Benefits

  • BNY offers highly competitive compensation, benefits, and wellbeing programs rooted in a strong culture of excellence and our pay-for-performance philosophy.
  • We provide access to flexible global resources and tools for your life’s journey.
  • Focus on your health, foster your personal resilience, and reach your financial goals as a valued member of our team, along with generous paid leaves, including paid volunteer time, that can support you and your family through moments that matter.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service