Language Fluency: English (Required)
Work Shift:
1st shift (United States of America)Job Grade:
112Please review the following job description:
Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Design, plan, test and implement phases of cybersecurity technology projects.Essential Duties and Responsibilities: Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
- Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
- Lead efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.
- Analyze information to determine, recommend, and plan the use of new information security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources
- Lead the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff
- Use sophisticated analytical thought through models, testing, and experience to exercise judgment and identify innovative solutions.
- Responsible for technical support of information security technologies providing expert problem analysis and resolution in a timely manner
- Leads teams or projects with moderate resource requirements, risk, and complexity.
- Design, Develop, implement, and maintain identity and access management solutions and systems.
- Troubleshoot, identify, and resolve technical identity and access management related issues.
- Improve identity and access management solutions and systems for protection against evolving threats and efficiency.
- Coach other members of the organization on the best practices that should be followed in identity and access management.
- Stay up-to-date on the IGA solution framework, technology and industry best practices.
- Act as IGA technical expert & provide expertise on roadmap, security strategy & alignment of strategy for business needs.
- Work with internal BU, understand the ask , translate business requirement to technical solutions & implement it.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
- Bachelor’s degree and eight years of experience in systems engineering or administration or an equivalent combination of education and work experience
- Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
- Previous experience in leading complex IT projects
Preferred Qualifications:
- Master’s degree or MBA and ten years of experience or an equivalent combination of education and work experience.
- Banking or financial services experience.
- Other security certifications (e.g. CCNA Security, GSEC, GCED, GPPA, etc.)
- Other technical Certifications (e.g. CCNA, RHCE, MCSE, etc.)
- Certification in Information Security Management (e.g. Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC) or Certified Information Security Manager (CISM)), or related security certification(s)
- Extensive hands-on knowledge of identity and access management best practices, procedures, and software solutions such as Oracle Identity Governance, SailPoint.
- Extensive knowledge and experience with identity and access management technology, such as single sign-on (SSO), two-factor authentication, privileged access management.
- Experience with one or more programming languages such as C++, Java, Python, Node.JS, Javascript, or C#
- Experience with Windows, Linux / Unix, scripting (Bash, Powershell, or Perl), LDAP, Oracle, MS SQL, and web services.
- Support on business development (bids) including defining scope of work and interacting with clients and the vendors as required during the proposal development as a part of project and developer teams
- Excellent communication and Strong analytical skills.
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.