×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Cyber Vulnerability Identification QC; Quality Control Analyst

Job in Denver, Denver County, Colorado, 80285, USA
Listing for: The Association of Technology, Management and Applied Engineering
Full Time position
Listed on 2026-01-11
Job specializations:
  • Security
    Cybersecurity
Job Description & How to Apply Below
Position: Cyber Vulnerability Identification QC (Quality Control) Analyst

Job Description

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.

Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.

Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.

At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!

Position Summary

This position will be a member of the GIS Vulnerability Identification Assurance (VIA) Vulnerability Identification QC (Quality Control) team. In this role, you will help implement, manage, and monitor the effectiveness of infrastructure vulnerability identification efforts to protect the confidentiality, integrity, and availability of the line of businesses' (LOB) information assets, primarily developing and implementing enhanced QC routines for remediation validation.

Analyzes, improves, implements, and executes security controls proactively to prevent external threat actors from infiltrating company information or systems. Typically has 3-5+ years of relevant experience and will act as an individual contributor.

This role is responsible for establishing processes and controls to monitor CVE based vulnerabilities and associated risk on technology where we do not have GIS tools for automated scanning. They will work with stakeholders, Product Owners and Software Engineers to aid in the implementation of data requirements, analyze QC performance, conduct QC related research and troubleshoot any issues.

  • Experience with CVE vulnerability analytics as a focus area within Information Security
  • Strong experience with CVE based vulnerability identification and risk analysis
  • Experience explaining analytics in plain English and ability with communicating associated risk
  • Ability to see the larger picture across the teams in the organization to build consensus and drive results
  • Demonstrated ability to self‑direct, with minimal supervision to achieve assigned goals
  • Identify and develop proposals for program improvement
  • Independent and able to work in an ever changing, fast paced environment
  • Able to validate and analyze scan data returned by the enterprise toolset
Key responsibilities
  • Analyze findings from vulnerability reporting work streams, to perform targeted QC on the vulnerabilities being reported and QC around scope of inventory being assessed.
  • Review current existing vulnerability detection processes for ways to streamline and make them more efficient.
  • Respond to relevant requests received from stakeholders, or representatives of stakeholders, for investigation of potential technology‑based identification reporting issues.
  • Performs other related duties incidental to the work described herein and all special assignments as needed or assigned.
  • Lead effective and sustainable activities associated with required VAI QC's technology‑based identification P2 closures evaluations.
  • Scope: where scanning signatures do not exist or findings are derived from vendor appliances where authenticated scanning cannot occur.
  • Support the expansion of a technology-based identification activity for GIS
  • Support the expansion of QC to cover workstation and ATM vulnerabilities, which are fed from non‑GIS teams today
Required Qualifications
  • 3-5+ years of experience in information security and/or data management roles
  • 3-5+ years of experience with vulnerability management and/or assessment
  • Ability to creatively approach difficult problems to provide a viable solution for risk visibility and risk reduction in the enterprise
  • 3-5+ years of experience with vulnerability management and/or…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary