The position is described below. If you want to apply, click the Apply button at the top or bottom of this page. You'll be required to create an account or sign in to an existing one.
Need Help?
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility or call 877-891-2510 (accommodation requests only; other inquiries won't receive a response).
Regular or Temporary:
Regular
Language Fluency: English (Required)
Work Shift:
1st shift (United States of America)
Please review the following job description:
***This position is available for remote work, anywhere within the US. Requires occasional travel to Truist locations in Georgia and North Carolina***
Responsible for developing, engineering and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC, hardware and software stack. Design, plan, test and implement phases of cybersecurity technology projects.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
- Develop, Engineer and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle, hardware and software stack which includes but not limited to, Check Point and ASA firewalls, proxies, Network Access Control (NAC) and DNS.
- Lead efforts related to designing, planning, enhancing, and testing the above cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.
- Analyze information to determine, recommend, and plan the use of new information security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources.
- Lead the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff.
- Responsible for technical support of information security technologies providing expert problem analysis and resolution in a timely manner.
- Set the team's direction and communicates individual and team priorities and deliverables for the team against expected results.
- Make leadership decisions within established policies, procedures, and established objectives.
- Leads complex and visible projects with moderate to high risk and complexity.
QUALIFICATIONS
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
- Bachelor’s degree and six to eight years of experience in systems engineering or administration or an equivalent combination of education and work experience
- Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
- Previous experience in leading complex IT projects
Preferred Qualifications:
- Ten years of experience or an equivalent combination of education and work experience
- CISSP Certification Banking or financial services experience
- Other security certifications (e.g. CCNA Security, GSEC, GCED, GPPA, etc.)
- Other technical Certifications (e.g. CCNA, RHCE, MCSE, etc.)
- Experience in developing, engineering and maintaining the technical IT/cyber capabilities including all phases of the software development lifecycle, hardware and software stack which includes but not limited to:
- Check Point (strongly preferred)
- Cisco Adaptive Security Appliance (ASA) firewalls
- Proxies
- Network Access Control (NAC)
- DNS
- Experience with Zscaler Cloud Firewall preferred
- Forescout platform experience
Truist supports a diverse workforce and is an Equal Opportunity Employer who does not discriminate against individuals on the basis of race, gender, color, religion, national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Drug Free Workplace.
Thank you for your interest in Truist! BB&T and SunTrust have come together in a transformational merger of equals to create Truist, the premier financial organization in the country. You may notice references to our legacy company names, BB&T and SunTrust, in places throughout this site. All such references should be understood to refer to Truist moving forward while we continue to transition to the Truist name.
EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify