CASY-MSCCN Jobs

CASY-MSCCN Logo

Job Information

Truist Cybersecurity Engineer in Greensboro, North Carolina

Req ID: R0062807

The position is described below. If you want to apply, click the Apply button at the top or bottom of this page. You'll be required to create an account or sign in to an existing one.

Need Help?

If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email toAccessibilityor call 877-891-2510 (accommodation requests only; other inquiries won't receive a response).

Regular or Temporary:

Regular

Language Fluency: English (Required)

Work Shift:

1st shift (United States of America)

Please review the following job description:

Responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Assist in the designing, planning, testing and implementation phases of cybersecurity technology projects.

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

1.Ensure frictionless external client experience is incorporated into the program design and delivered across all channels (omni-channel) which includes ATM, Branch, Call Center and Digital. Participate in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used in managing external client authentication. Participate in the analysis of information to determine, recommend, and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources Participate in the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information. Provide technical support of information security technologies, providing problem analysis and resolution in a timely manner and explain and interpret complex, difficult, or sensitive information. Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives covering program design, testing, debugging and documentation.

Qualifications

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Bachelor’s degree and five years of experience with Client Identity and Access Management solutions or an equivalent combination of education and work experience In-depth knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security Previous experience in planning and managing IT projects

Preferred Qualifications:

  1. CISSP, CISM, CISA or CRISC Certification

  2. Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate actions.

  3. Experience with security architecture related to protocols such as SAML, FIDO2, WebAuthN, SSH, SNMP, HTTP, SOAP, SOA, OAuth, XML, REST, WS-Security

  4. Agile methodology experience

  5. DevOps Pipeline deployment and Scrum team member experience

  6. Password-less MFA migration from legacy username and password

  7. IT GRC, Security Information management

  8. Financial IAM sector experience

9.Lexis Nexis Threatmetrix experience

Other Job Requirements / Working Conditions

Sitting

Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Availability

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.

Travel

Minimal and up to 10%

Truist supports a diverse workforce and is an Equal Opportunity Employer who does not discriminate against individuals on the basis of race, gender, color, religion, national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Drug Free Workplace.

EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify

© 2017 SunTrust Banks, Inc. All rights reserved.

SunTrust is federally registered service marks of SunTrust Banks, Inc.

DirectEmployers