24/7 Cyber Monitoring, Hunting & Response Deputy (Technical Cyber Response Deputy)

Truist Financial
Apply Now

Job Description

This role will enhance communication and awareness of risk posture across their 24/7 teams and the broader cyber teams they support to identify, assess, and manage imminent cybersecurity threats & risks. Additionally, this role is responsible for translating complex technical cyber incidents into actionable insights for leadership while pioneering the organization’s Digital Forensics & Incident Response (DFIR) discipline.

This position is on-site in Downtown Atlanta (with Zebulon, NC as alternate location) with on-call responsibilities.

ESSENTIAL DUTIES AND RESPONSIBILITIES

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Provide essential leadership and oversee tactical implementation of corporate-wide security principles, policies, and practices.
  • Point of contact (POC) for specialized building facilities and office space designated for restricted and sensitive cyber work.
  • Partner with technology & operations leadership team and stakeholders to guide planning, continuous improvement, standards development, and governance of business units of moderate complexity and scale with a lens specific to cybersecurity.
  • Build partnerships with management and technology partners to enable business strategy and ability to execute in fashion that adheres to our cybersecurity risk tolerance.
  • Provide necessary subject matter expertise and ensure implementation of information security architecture, risk management standards, best practices, and systems/processes to ensure information privacy/protection.
  • Clearly and accurately communicate strategic direction to peers, subordinates, clients, and vendors on a timely basis.
  • Directly and indirectly lead imminent threat response activity for highest risk cyber priorities.
  • Develop technical workflows to escalate and contain insider threats.
  • Provide necessary subject matter expertise and coordinate efforts on a corporate level to identify key security risks, needs and initiatives.
  • Manage the translation of strategic direction into efficient, effective, and supportable solutions ensuring success while maintaining compliance to internal processes and policies.
  • Monitor controls to ensure that the availability, reliability, performance, and service levels remain consistently high and in keeping with line of business expectations.
  • Support enterprise-level information security-related functions (e.g., firewall administration, communications, incident response, encryption, access control.)
  • Make technical recommendations for improvements to program, respond to alleged policy violations and function as technical lead for incident containment activities.

QUALIFICATIONS

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Bachelor’s degree and 10 years of experience in systems engineering or an equivalent combination of education and work experience
  • Strong functional and technical knowledge of information/cyber security capabilities with deep expertise in one or more of the following areas: Encryption, Data Security, Application Security, End Point Security, Identity and Access Management, Windows/Unix/Linux Systems Security, Mainframe Security, Perimeter Security, Network Security, Mobility Security, Cloud Security, Cyber Security, Cryptography, or Authentication Systems
  • Strong understanding of service lifecycle management, strategic planning, and the cyber security landscape CISSP Certification

Preferred Qualifications:

  • At least 8 years of technical experience working in cybersecurity.
  • Strong functional and technical knowledge of information/cyber security capabilities with deep expertise in several of the following areas: Data Security, Digital Forensics, Incident Response, End Point Security, Identity and Access Management, Windows/Unix/Linux Systems Security, Network Security, Mobility Security, Cloud Security, Cyber Security.
  • Understanding of incident management, strategic planning, and the cyber security landscape
  • Knowledge of one or more cloud platforms and cloud security
  • Knowledge of general information technology (IT) and cybersecurity
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
  • Knowledge of operating systems, including Windows/Unix ports and services.
  • Knowledge of modern identity and access management concepts
  • Knowledge of phishing tactics and techniques
  • Knowledge of advanced cyber threats and vulnerabilities.
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Knowledge of incident response and handling methodologies.
  • Knowledge of countermeasures to address a variety of threats
  • Knowledge around leveraging automation, ML, and/or AI
  • Knowledge of organization objectives, leadership priorities, and decision-making risks.
  • Knowledge of organizational hierarchy and cyber decision-making processes.
  • Technical Master’s degree or 8 years of equivalent combination of education and work experience
  • Banking or financial services experience. Prior management experience
  • Experience in leading large-scale complex projects from beginning to end.
  • Industry Certifications: Security+, Network+, CySA+, GSEC, CEH, CHFI, GCIA, GCIH, GCFE, GCFA, GCED, GREM, OSCP.
  • Experience leading incidents as the primary technical voice
  • Experience working with DDoS attacks and other network-based attack types.
  • Strong working knowledge of Digital Forensics & Incident Response (DFIR) skills, including log, network, endpoint, memory, malware, reverse engineering, and root cause analysis.
  • Although, not required, a background in software development and/or scripting is highly desirable.
  • Strong working knowledge of common IT and security concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques, cyber incident response, malware analysis, computer forensics and the tools that support these processes.
  • Strong working knowledge in multiple areas of Digital Forensics & Incident Response (DFIR), including skills in log, network, endpoint, memory, malware, and root cause analysis.
  • Display a working knowledge of at least one the following technologies: SIEM, Endpoint Detection & Response tools, and Digital forensic suites.
  • Ability to solve complex problems by applying best practices. Demonstrated proficiency utilizing security platforms related to logging, event correlation, incident management, vulnerability management, and/or computer forensics.
  • Strong time management skills and ability to manage competing priorities effectively.
  • Strong verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.
  • Strong verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.
  • Support a variety of tasks in support of the larger Cybersecurity Mission
  • Ability to support an on-call schedule within a 24/7 operations environment.

OTHER JOB REQUIREMENTS / WORKING CONDITIONS

Sitting (if checked, indicate frequency)

Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Availability

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.

Travel

Minimal and up to 10%

Company Info.

Truist Financial

Truist Financial Corporation is an American bank holding company headquartered in Charlotte, North Carolina. The company was formed in December 2019 as the result of the merger of BB&T (Branch Banking and Trust Company) and SunTrust Banks. Its bank operates 2,049 branches in 15 states and Washington, D.C., and offers consumer and commercial banking, securities brokerage, asset management, mortgage, and insurance products and services.

  • Industry
    Financial services
  • No. of Employees
    37,000
  • Location
    214 North Tryon Street, Charlotte, North Carolina, USA
  • Website
  • Jobs Posted

Get Similar Jobs In Your Inbox

Truist Financial is currently hiring Cybersecurity Engineer Jobs in Zebulon, NC, USA; Atlanta, GA, USA with average base salary of $121,500 - $248,500 / Year.

Similar Jobs View More