Cyber Threat Analyst III
Req ID: 76967
Location: Tulsa -TUL
Areas of Interest: Information Security
Pay Transparency Salary Range: Not Available
Application Deadline: 10/01/2025
BOK Financial Corporation Group includes BOKF, NA; BOK Financial Securities, Inc. and BOK Financial Private Wealth, Inc. BOKF, NA operates TransFund and Cavanal Hill Investment Management, Inc. BOKF, NA operates banking divisions: Bank of Albuquerque; Bank of Oklahoma; Bank of Texas and BOK Financial®.
Bonus Type
Summary
BOK Financial’s cybersecurity team is at the core of the organization’s digital defense, ensuring the confidentiality, integrity, and availability of sensitive financial and personal data. With deep expertise in areas like databases, networks, firewalls, and encryption, the team safeguards the bank’s advanced technology infrastructure against evolving cyber threats. Their work supports secure digital operations and drives innovation, enabling BOK Financial to deliver seamless and protected banking experiences.
Job Description
Through their expertise and knowledge of databases, networks, hardware, firewalls and encryption, the Cyber Threat Analyst III position is responsible for preventing the theft of financial and personal information housed on the extensive network of BOKF IT systems and blocking intruders from accessing and divulging proprietary data.
In performing these duties, the Cyber Threat Analyst assesses and mitigates risks and consults with internal IS and IT personnel to resolve threats, securing network weaknesses, and continuously improving the efficiency of security operations through recommendation of hardware and software upgrades.
This position will also serve as part of an on-call escalation for critical events that assistance is required and provide process/policy improvements for the 24x7 Security Operation Center.
Team Culture
We lead with a deep commitment to cybersecurity because protecting sensitive financial and personal data is essential to earning and maintaining trust. Security is more than a responsibility—it’s a mindset woven into every decision, driven by collaboration, innovation, and continuous learning. Our focus is on empowering individuals to grow while making a meaningful impact on the safety and resilience of our digital environment.
How You'll Spend Your Time
- You will conduct proactive threat analysis and live response to detect and prevent cyber breaches.
- You will perform digital forensics and malware analysis to identify root causes and assess impact.
- You will curate and share threat intelligence using internal and external sources and platforms.
- You will advise on security policies, infrastructure improvements, and insider threat tools.
- You will collaborate with IT and cybersecurity teams while engaging with external partners.
- You will lead and mentor analysts, aligning team goals and delivering strategic intelligence briefs.
Education & Experience Requirements
This level of knowledge is normally acquired through completion of a Bachelor’s Degree in Computer Science, Information Assurance, Technology or equivalent experience. Working towards or completion of CISSP, CISA, CRISC, CISM, CEH, GIAC or related certification.
- Minimum 5 years’ years of hands on ethical hacking and system vulnerability testing experience
- Minimum 3 years’ hands on software development experience with a core focus on remediation of security vulnerabilities
- 1-3 years’ experience coding using Java, PowerShell, Microsoft.Net; in addition to the following system/network and cyber security experience General understanding of BOKF business information systems
- Strong knowledge of a broad array of security tools including Security Information and Event Management (SIEM) system, intrusion detection systems, web proxy systems, threat intelligence platforms and other tools used to assess network security
- Deep understanding of the life cycle of network threats, attacks, attack vectors, methods of exploitation, and cybercrime tactics
- Strong experience conducting trending and correlation of cyber intelligence for the purposes of attribution and establish strategic countermeasures
- Strong ability to analyze vulnerabilities in order to appropriately discern magnitude and characterization of threats and provide remediation advice.
- Solid knowledge of log analysis, traffic flow analysis and experience with associated infrastructure and systems to aid in the identification of malware or other malicious behavior
- Strong understanding of the cyber kill chain, Diamond Model, MITRE ATT&CK Framework and intelligence lifecycles
- Solid knowledge of networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection systems, encryption, load balancing, and other network protocols
- Advanced knowledge of risk management laws and regulations, regulatory mandates and processes associated with managing Information Security risk
BOK Financial Corporation Group is a stable and financially strong organization that provides excellent training and development to support building the long term careers of employees. With passion, skill and partnership you can make an impact on the success of the bank, customers and your own career!
Apply today and take the first step towards your next career opportunity!
The companies in BOK Financial Corporation Group are equal opportunity employers. We are committed to providing equal employment opportunities for training, compensation, transfer, promotion and other aspects of employment for all qualified applicants and employees without regard to sex, race, color, religion, national origin, age, disability, pregnancy status, sexual orientation, genetic information or veteran status.
Please contact recruiting_coordinators@bokf.com with any questions.
Tulsa, OK, US, 74101
Top 3 reasons to apply
Investing in our talent and building a great workplace is a top priority for us.
- Empowered employees
- Award-winning culture
- Community commitment
Nearest Major Market: Tulsa
Nearest Secondary Market: Oklahoma
Job Segment:
Cyber Security, Computer Forensics, Bank, Banking, Computer Science, Security, Finance, Technology