Senior Manual Ethical Hacker
Listed on 2026-03-05
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, Systems Analyst
Job Description
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in‑office culture with specific requirements for office‑based attendance and a flexible arrangement based on role‑specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America’s Cyber Security Assurance Offensive Security group. The program provides services to assess the security resilience of the bank’s applications to malicious hacking activity.
This senior technical role is responsible for performing and leading ethical hacking assessments of the bank’s technologies, applications and cyber security controls while adapting testing methods to evolving and emerging threats. It involves leading and performing research, understanding the bank’s security policies, working with appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiple lines of business.
They are expected to perform application security‑oriented dynamic and static assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code.
- Perform assigned analysis of internal and external threats on information systems and predict future threat behaviour.
- Incorporate threat actors’ tactics, techniques, and procedures into offensive security testing to identify high‑value vulnerabilities or chained attacks.
- Develop proof‑of‑concepts for exploitation.
- Perform assessments of the security, effectiveness and practicality of multiple technology systems.
- Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
- Prepare and present detailed technical information for various media including documents, reports, and notifications.
- Provide clear and practical advice regarding managing risks.
- Learn and develop advanced technical and leadership skills, mentor Junior and Intermediate assessors in technical tradecraft and soft skills.
- Respond to security incidents and provide technical assistance to leadership across the Information Security organization.
- Minimum of 5+ years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment.
- Detailed technical knowledge in at least five of the following areas:
- Security engineering
- Application architecture
- Authentication and security protocols
- Application session management
- Applied cryptography
- Common communication protocols
- Mobile frameworks
- Single sign‑on technologies
- Exploit automation platforms
- Web APIs
- Cloud environments
- LLM security
- Mobile application analysis
- Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage and support incidents, and produce high‑value findings.
- Experience performing manual web application assessments (i.e., must be able to simulate an OWASP Top 10 vulnerability without the use of tools).
- Experience performing manual code reviews for security‑relevant issues.
- Experience working with DAST and SAST tools to identify vulnerabilities.
- Knowledge of network and web‑related protocols/technologies (e.g.,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).