Job Family Group : Technology
The Financial Crimes Unit (FCU) brings together our Cybersecurity, Fraud, Physical Security and Resilience Planning capabilities to address the ever-growing and increasingly complex global security environment.
It is a highly collaborative effort that greatly enhances BMO’s ability to rapidly prevent, detect, respond to, and recover from all security & crisis threats.
This position offers a unique experience to learn from experienced leaders in the industry, join a team building the 21st century model for security and helping grow the good by protecting our customers and communities.
This is a great opportunity to work for a global financial organization where you can make an impact and influence change.
Join us to make a difference and leverage your strengths in ethical hacking and work on adversary emulation campaigns to identify weaknesses in security controls, platforms, infrastructure hardening, application logic, and physical security.
In this exciting opportunity, you will provide information security expertise for BMO and businesses / groups as well as liaise with stakeholders to understand problems and opportunities that enables BMO to meet its goals by understanding business vision, objectives and KPIs.
You will lead the development of information security strategy by understanding business processes, policies, information and information systems and you will build exceptional relationships with internal and external stakeholders.
In addition, you will ensure that requirements and solutions align to a real business need, are approved by all relevant stakeholders, and meets essential information security standards.
By providing thought-leadership, promoting new processes and methodologies and emerging technologies, you will align to the unique requirements of the business / group and deliverables.
This role may require up to 20 % travel.
We have offices in New Jersey, Chicago, as well Toronto (Canada). If you reside outside of those cities, you can work 100% remotely
Provides strategic input into business decisions as a trusted advisor.
Understands and can explain to others the core processes, risks and mitigation techniques for designated areas.
Acts as a subject matter expert on relevant regulations and policies.
Identifies and recommends opportunities to create / contribute to the tactical and strategic vision of the organization.
Supports the execution of strategic initiatives in collaboration with internal and external stakeholders.
Acts as the prime subject matter expert for internal / external stakeholders.
Breaks down strategic problems, and analyses data and information to provide insights and recommendations.
Presents data and information to all levels within IT and to business units.
Leads / oversees the management of vendor relationships and provides guidelines for execution; ensures that all agreements are met as per requirements.
Stays abreast of industry, information security and business trends through benchmarking and / or participation in professional associations.
Analyzes trends and stays current with industry events to proactively prevent information security issues.
Understands the strategy, plans, activities and needs of all stakeholders and translates those business needs into solutions and makes recommendations.
Provides advice, counsel and support on information security matters and recommends solutions to assigned business / group leaders on principles, frameworks, programs, approaches, trends, legislation and regulatory requirements including interpretation of policy and identification and management of risk.
Builds credibility and influences / negotiates effectively to drive business performance through development and delivery of information security solutions.
Tracks metrics and milestones, providing recommendations for resolution and escalating as appropriate when issues arise.
Facilitates discussions and follows a disciplined approach to plan, elicit, analyse, document, communicate and manage initiatives and issues with stakeholders by applying a variety of elicitation techniques to probe, challenge and understand associated risks.
Promotes process improvements and methodologies; keeps emerging information security issues and trends in mind and ensures standards are followed.
Creates professional presentations and deliver them in a meaningful concise way.
Assesses information security impact to a project’s benefits and risks when scope changes.
Develops and champions information security best practices, including staying abreast of industry information security and business trends through benchmarking and / or participation in professional associations.
Gathers, examines and interprets data and information to extract meaningful insights, answer business questions and provide actionable recommendations.
Assists with continuous improvement activities and root cause analysis with the goal of strengthening information security capabilities.
Ensures consistent, high quality practices / work and the achievement of business results in alignment with business / group strategies and with productivity goals.
Operates at a group / enterprise-wide level and serves as a specialist resource to senior leaders and stakeholders.
Applies expertise and thinks creatively to address unique or ambiguous situations and to find solutions to problems that can be complex and non-routine.
Implements changes in response to shifting trends.
Broader work or accountabilities may be assigned as needed.
5+ years of experience in Information Security,
2+ years in previous Red team positions or cyber threat-actor simulations
Strong experience with Windows and Linux based platforms, applications and TCP / IP network security technologies
Strong technical knowledge of multifaceted exploits and chained attacks.
Demonstrated ability to execute attack emulations without detection.
Strong experience with information security concepts, principles and components of a comprehensive information security program
Strong experience with application security concepts including common application security issues such as OWASP Top 10
Strong, demonstrable aptitude for and interest in offensive and application security.
Strong understanding of vulnerability exploitation and an aptitude for identifying weaknesses in controls and infrastructure.
Advanced knowledge and / or demonstrated experience in application penetration testing
Advanced knowledge of or demonstrated experience with defense in depth, trust levels, privileges and permissions
Large complex multi-national Financial Services industry related experience
Exploit development experience
In-depth understanding and experience with detection and response evasion techniques.
Experience with Threat intelligence activities and understanding threat actors
Knowledge with MITRE ATT&CK framework
Self-motivated and results-oriented, including ability to prioritize conflicting demands.
Exceptional organizational skills to balance work and lead the execution of multiple projects.
Strong interpersonal skills with experience in mentoring team members
Strong initiative, consensus-building and ability to collaborate directly and build strong relationships with a variety of internal and external stakeholders (business, development, compliance, etc.)
Ability to adapt and apply information to new scenarios and technologies.
Typically 7+ years of relevant experience and a post-secondary degree in Information Security, Computer Science, Engineering, and / or Information Systems or a related field of study or an equivalent combination of education and experience.
Multiple information security certifications from a well-recognized institution (e.g. (ISC)2, ISACA, SANS).Possesses an expert level of knowledge of information security processes, procedures and controls.
Understanding of industry standards and frameworks e.g. NIST Cyber Security Framework (CSF), ISO 27001 and 27002 - In-depth / Expert.
Knowledge of business analysis, project delivery practices and standards across the project lifecycle - In-depth / Expert.
Demonstrates in depth knowledge of information security concepts, methodology, processes, procedures and controls.
Understanding and problem solving ability of information security issues across the bank - In-depth / Expert.
Understanding of information security risk and regulatory requirements - In-depth / Expert.
Knowledge of the technical / business environment and the corporate processes and procedures - In-depth / Expert.
Seasoned professional with a combination of education, experience and industry knowledge.
Verbal & written communication skills - In-depth / Expert.
Analytical and problem solving skills - In-depth / Expert.
Influence skills - In-depth / Expert.
Collaboration & team skills; with a focus on cross-group collaboration - In-depth / Expert.
Able to manage ambiguity.
Data driven decision making - In-depth / Expert.
Relevant professional certifications or working towards attainment such as : OSCE,OSCP, GWAPT, GMOB, GAWN, GXPN, GCIH, CPT, CEPT, GPEN, CEH, and CISSP
We’re here to help
At BMO we are driven by a shared Purpose : Boldly Grow the Good in business and life. It calls on us to create lasting, positive change for our customers, our communities and our people.
By working together, innovating and pushing boundaries, we transform lives and businesses, and power economic growth around the world.
As a member of the BMO team you are valued, respected and heard, and you have more ways to grow and make an impact.We strive to help you make an impact from day one for yourself and our customers.
We’ll support you with the tools and resources you need to reach new milestones, as you help our customers reach theirs. From in-depth training and coaching, to manager support and network-building opportunities, we’ll help you gain valuable experience, and broaden your skillset.
BMO is committed to an inclusive, equitable and accessible workplace. By learning from each other’s differences, we gain strength through our people and our perspectives.
Accommodations are available on request for candidates taking part in all aspects of the selection process. To request accommodation, please contact your recruiter.