Job Detail

24/7 Cyber Monitoring, Hunting & Response Deputy (Technical Cyber Response Deputy) - Truist
Zebulon, NC
Posted: Jul 09, 2024 03:35

Job Description

The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.

Need Help? (https://www.brainshark.com/bbandt/careers-site-faq)

If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (careers@truist.com?subject=Accommodation%20request)

(accommodation requests only; other inquiries won't receive a response).

Regular or Temporary:

Regular

Language Fluency: English (Required)

Work Shift:

1st shift (United States of America)

Please review the following job description:

The Technical Cyber Response Deputy within the Cyber Fusion Center (CFC) provides leadership and direction for highly technical analysts, threat hunters, and incident responders directly and indirectly. The Technical Response Deputy supports the people, processes, and technology associated with a modern cyber monitoring, threat hunting, and incident response. This role must have a deep understanding of the 24/7 corporate-wide cybersecurity technology infrastructure to ensure monitoring and response appropriately meets industry best practices.

This role will enhance communication and awareness of risk posture across their 24/7 teams and the broader cyber teams they support to identify, assess, and manage imminent cybersecurity threats & risks. Additionally, this role is responsible for translating complex technical cyber incidents into actionable insights for leadership while pioneering the organization's Digital Forensics & Incident Response (DFIR) discipline.

This position is on-site in Downtown Atlanta (with Zebulon, NC as alternate location) with on-call responsibilities.

ESSENTIAL DUTIES AND RESPONSIBILITIES

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Provide essential leadership and oversee tactical implementation of corporate-wide security principles, policies, and practices.

  • Point of contact (POC) for specialized building facilities and office space designated for restricted and sensitive cyber work.

  • Partner with technology & operations leadership team and stakeholders to guide planning, continuous improvement, standards development, and governance of business units of moderate complexity and scale with a lens specific to cybersecurity.

  • Build partnerships with management and technology partners to enable business strategy and ability to execute in fashion that adheres to our cybersecurity risk tolerance.

  • Provide necessary subject matter expertise and ensure implementation of information security architecture, risk management standards, best practices, and systems/processes to ensure information privacy/protection.

  • Clearly and accurately communicate strategic direction to peers, subordinates, clients, and vendors on a timely basis.

  • Directly and indirectly lead imminent threat response activity for highest risk cyber priorities.

  • Develop technical workflows to escalate and contain insider threats.

  • Provide necessary subject matter expertise and coordinate efforts on a corporate level to identify key security risks, needs and initiatives.

  • Manage the translation of strategic direction into efficient, effective, and supportable solutions ensuring success while maintaining compliance to internal processes and policies.

  • Monitor controls to ensure that the availability, reliability, performance, and service levels remain consistently high and in keeping with line of business expectations.

  • Support enterprise-level information security-related functions (e.g.,firewall administration, communications, incident response, encryption, access control.)

  • Make technical recommendations for improvements to program, respond to alleged policy violations and function astechnical lead for incident containment activities.

QUALIFICATIONS

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  1. Bachelor's degree and 10 years of experience in systems engineering or an equivalent combination of education and work experience

  2. Strong functional and technical knowledge of information/cyber security capabilities with deep expertise in one or more of the following areas: Encryption, Data Security, Application Security, End Point Security, Identity and Access Management, Windows/Unix/Linux Systems Security, Mainframe Security, Perimeter Security, Network Security, Mobility Security, Cloud Security, Cyber Security, Cryptography, or Authentication Systems

  3. Strong understanding of service lifecycle management, strategic planning, and the cyber security landscape CISSP Certification

Preferred Qualifications:

  • At least 8 years of technical experience working in cybersecurity.

  • Strong functional and technical knowledge of information/cyber security capabilities with deep expertise in several of the following areas: Data Security, Digital Forensics, Incident Response, End Point Security, Identity and Access Management, Windows/Unix/Linux Systems Security, Network Security, Mobility Security, Cloud Security, Cyber Security.

  • Understanding of incident management, strategic planning, and the cyber security landscape

  • Knowledge of one or more cloud platforms and cloud security

  • Knowledge of general information technology (IT) and cybersecurity

  • Knowledge of computer networking concepts and protocols, and network security methodologies.

  • Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).

  • Knowledge of operating systems, including Windows/Unix ports and services.

  • Knowledge of modern identity and access management concepts

  • Knowledge of phishing tactics and techniques

  • Knowledge of advanced cyber threats and vulnerabilities.

  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

  • Knowledge of incident response and handling methodologies.

  • Knowledge of countermeasures to address a variety of threats

  • Knowledge around leveraging automation, ML, and/or AI

  • Knowledge of organization objectives , leadership priorities, and decision-making risks.

  • Knowledge of organizational hierarchy and cyber decision-making processes.

  • Technical Master's degree or 8 years of equivalent combination of education and work experience

  • Banking or financial services experience. Prior management experience

  • Experience in leading large-scale complex projects from beginning to end.

  • Industry Certifications: Security+, Network+, CySA+, GSEC, CEH, CHFI, GCIA, GCIH, GCFE, GCFA, GCED, GREM, OSCP.

  • Experience leading incidents as the primary technical voice

  • Experience working with DDoS attacks and other network-based attack types.

  • Strong working knowledge of Digital Forensics & Incident Response (DFIR) skills, including log, network, endpoint, memory, malware, reverse engineering, and root cause analysis.

  • Although, not required, a background in software development and/or scripting is highly desirable.

  • Strong working knowledge of common IT and security concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques, cyber incident response, malware analysis, computer forensics and the tools that support these processes.

  • Strong working knowledge in multiple areas of Digital Forensics & Incident Response (DFIR), including skills in log, network, endpoint, memory, malware, and root cause analysis.

  • Display a working knowledge of at least one the following technologies: SIEM, Endpoint Detection & Response tools, and Digital forensic suites.

  • Ability to solve complex problems by applying best practices. Demonstrated proficiencyutilizing security platforms related to logging, event correlation, incident management, vulnerability management, and/or computer forensics.

  • Strong time management skills and ability to manage competing priorities effectively.

  • Strong verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.

  • Strong verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.

  • Support a variety of tasks in support of the larger Cybersecurity Mission

  • Ability to support an on-call schedule within a 24/7 operations environment.

OTHER JOB REQUIREMENTS / WORKING CONDITIONS

Sitting (if checked, indicate frequency)

Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Availability

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.

Travel

Minimal and up to 10%

General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no

. Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.

Truist supports a diverse workforce and is an Equal Opportunity Employer that does not discriminate against individuals on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Truist is a Drug Free Workplace.

EEO is the Law (https://www.eeoc.gov/sites/default/files/2022-10/EEOC_KnowYourRights_screen_reader_10_20.pdf)

Pay Transparency Nondiscrimination Provision (https://www.dol.gov/sites/dolgov/files/OFCCP/pdf/pay-transp_%20English_formattedESQA508c.pdf)

E-Verify (https://e-verify.uscis.gov/web/media/resourcesContents/E-Verify_Participation_Poster_ES.pdf)



Job Detail

  • Location:
    Zebulon, NC
  • Company:

Company Overview

Truist

Zebulon, NC