BB&T Suntrust Now Truist Jobs

Careers

Job Information

Truist CIS Cyber Threat Analyst II in Atlanta, Georgia

Req ID: R0027171

Specific information related to the position is outlined below. To apply, click on the button above. You will be required to create an account (or sign in with an existing account). Your account will provide you access to your application information.Need Help?

Should you have a disability and need assistance with the application process, please request a reasonable accommodation by emailing Accessibilityor by calling 877-891-2510. This email inbox is monitored for reasonable accommodation requests only. Any other correspondence will not receive a response.

Regular or Temporary: Regular Language Fluency: English (Required) Work Shift: 1st shift (United States of America)

Please review the following job description:

Support Information Security and Cyber Threat Management programs responding to cyber incidents while working in a multiple-team environment. Process vulnerability and threat data from a variety of internal and external sources to provide actionable intelligence to internal consumers in order to implement countermeasures and maintain and enhance the defenses for our information systems and resources. Serve as first escalation point for security investigations and provide oversight for tier I analysts, when the manager is not available. Assist senior analysts during incident response activities and cyber investigations.

Essential Duties and Responsibilities:

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  1. Assist in escalated computer security incidents and cyber investigations including computer forensics, network forensics, root cause analysis and malware analysis.

  2. Act as coordinator in the event of escalated cyber threats/incidents for Tier 1 analysts.

  3. Execute on appropriate mitigation strategies for identified threats.

  4. Participate in threat hunting activities to proactively search for threats in the enterprise environment.

  5. Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cyber Threat Operations and Cyber Threat Management program.

  6. Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cyber Threat Operations and Cyber Threat Management program.

  7. Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security strategy.

  8. Adhere to all policies and standards, as well as regulatory requirements regarding reporting and escalations.

  9. Work with team members to enhance and enrich security monitoring tools with contextual information.

  10. Provide mentoring for junior level analysts.

  11. Deliver cyber intelligence services and material to information technology and business leaders.

  12. Identify new threat tactics, techniques and procedures used by cyber threat actors.

  13. Publish actionable threat intelligence for business and technology management.

Required Skills and Competencies:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  1. Bachelor’s degree in Computer Science or related field or equivalent education and related training

  2. Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programing, web development or database administration

  3. Demonstrated advanced knowledge of cyber security operations with a focus area in two or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider) vulnerabilities, and exploits; incident response, investigations and remediation

  4. Foundational knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information

  5. Ongoing passion for learning about information security through self-education

  6. Ability to lead and persuade individuals and small teams on ideas, concepts and opportunities

  7. Consistent history of delivering on commitments

  8. Critical thinking and problem solving skills

  9. Knowledge of the incident handling procedures and intrusion analysis models

  10. Ability to work independently with limited supervision

  11. Proven communication skills, both written and verbal, to both business and technology audiences

  12. Demonstrated proficiency in basic computer applications, such as Microsoft Office software products

  13. Ability to travel, occasionally overnight

Desired Skills:

  1. Five years of experience

  2. Industry certifications in general technology (e.g. Microsoft Certified Professional (MCP), Microsoft Certified Solutions Expert (MCSE), Network+)

  3. Industry certifications in cyber security and forensics, such as Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), Cisco Certified Network Associate (CCNA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Security + and other related credentials

  4. Security Operations Center (SOC) or Network Operations Center (NOC) experience

  5. Experience in the Intelligence Community (IC)

  6. Demonstrated leadership experience Truist supports a diverse workforce and is an Equal Opportunity Employer who does not discriminate against individuals on the basis of race, gender, color, religion, national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Drug Free Workplace. Thank you for your interest in Truist! BB&T and SunTrust have come together in a transformational merger of equals to create Truist, the premier financial organization in the country. You may notice references to our legacy company names, BB&T and SunTrust, in places throughout this site. All such references should be understood to refer to Truist moving forward while we continue to transition to the Truist name. EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify

Thank you for your interest in Truist! BB&T and SunTrust have come together in a transformational merger of equals to create Truist, the premier financial organization in the country. You may notice references to our legacy company names, BB&T and SunTrust, in places throughout this site. All such references should be understood to refer to Truist moving forward while we continue to transition to the Truist name.

© 2017 SunTrust Banks, Inc. All rights reserved.

SunTrust is federally registered service marks of SunTrust Banks, Inc.

DirectEmployers