Truist Cyber Security Engineer in Raleigh, North Carolina
Req ID: R0032860
Specific information related to the position is outlined below. To apply, click on the button above. You will be required to create an account (or sign in with an existing account). Your account will provide you access to your application information.Need Help?
Should you have a disability and need assistance with the application process, please request a reasonable accommodation by emailing Accessibilityor by calling 877-891-2510. This email inbox is monitored for reasonable accommodation requests only. Any other correspondence will not receive a response.
Regular or Temporary: Regular Language Fluency: English (Required) Work Shift: 1st shift (United States of America)
Please review the following job description:
Under moderate supervision, participate as a highly skilled member on a team of Information Security Engineers, assisting in the designing, planning, testing and implementation phases of information security technology projects, as assigned by management. Take primary or secondary role in installing, configuring, troubleshooting, testing and documenting information security systems and software in a laboratory environment. Assist in efforts related to the successful implementation of information security systems into production while following standards and procedures. Work within existing relationships with key support partners, line of business representatives and vendors. Assist in implementation of complex medium-to-large scale enterprise projects. Assist in development of innovative improvements. Participate in investigating, evaluating and incorporating best practices based on knowledge of environment. Assist in production support, including problem identification and description, ticket documentation, customer/vendor dialogue and root cause analysis.
Essential Duties &Responsibilities:
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. 1. Participate in efforts related to designing, planning, enhancing and testing all information security technologies used throughout the enterprise, including base-lining current systems, trend analysis and capacity planning, as required for future systems requirements. 2. Participate in technical assessment, research and testing of new technologies, as requested, using information security design, automation, and scripting best practices and procedures. 3. Participate in the analysis of information to determine, recommend and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources. 4. Participate in the implementation of new information security technologies or integration of existing technologies, including initial configuration, installation, change management and operational handoff. 5. Provide Tier III technical support of information security technologies, providing problem analysis and resolution in a timely manner. 6. Participate in all areas of information security technology management, systems development, systems implementation and systems support, as assigned. 7. Support training of less experienced personnel. 8. Using manual and automated processes, ensure adherence of all responsible information security technologies to established design and configuration standards. 9. Establish and execute processes to monitor and report on information security technology infrastructure compliance to policies, standards and best practices. 10. Execute system tuning and make recommendations for improvements. 11. Monitor information security systems using enterprise class monitoring systems, proactively identify potential issues and exercise appropriate responses to events ensuring availability of the environment. 12. Generate and communicate appropriate reporting to illustrate operational status and stability of the information security technology infrastructure. 13. Provide 24x7 on-call availability for supported information security technology infrastructure. Required Skills and Competencies:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
* Bachelor’s degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience
* In-depth knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
* Previous experience in planning and managing IT projects Desired Skills:
Knowledge of financial services industry and all applicable regulations and industry standards Detail oriented and committed to accuracy Able to pick up new concepts and work methods quickly Ability to manage the credentials, privileges and access for Truist corporate resources to ensure all information systems are functional and secure while ensuring that SLAs are met. Experience using IT Service Management systems, such as Service Now. Experience with access administration and customer support in the follow areas for Linux/AIX/Unix:
Creating/modifying user accounts and groups in Linux/AIX/Unix
Using Centrify to manage user access for Linux/AIX/Unix systems
Using HPSA to manage user access for Linux/AIX/Unix systems
Creating/modifying and permissioning files and folder in Linux/AIX/Unix
Experience with access administration and customer support for these technologies:
- Active Directory, Windows, Exchange, Mobile Iron, Enterprise Apps, Azure/AWS Cloud IAM, Quest Change Auditor, Splunk
Familiarity with audit processes as they relate to SOX, PCI-DSS, and GLBA information protection requirements. Understanding and experience with Identity and Access Management (IAM) concepts, governance, and identity management solutions, preferably at a financial institution. Other technical certifications (e.g. Microsoft Certified Systems Engineer (MCSE), Cisco Certified Network Associate (CCNA), Red Hat Certified Engineer (RHCE), Security+) Truist supports a diverse workforce and is an Equal Opportunity Employer who does not discriminate against individuals on the basis of race, gender, color, religion, national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Drug Free Workplace. Thank you for your interest in Truist! BB&T and SunTrust have come together in a transformational merger of equals to create Truist, the premier financial organization in the country. You may notice references to our legacy company names, BB&T and SunTrust, in places throughout this site. All such references should be understood to refer to Truist moving forward while we continue to transition to the Truist name. EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify
Thank you for your interest in Truist! BB&T and SunTrust have come together in a transformational merger of equals to create Truist, the premier financial organization in the country. You may notice references to our legacy company names, BB&T and SunTrust, in places throughout this site. All such references should be understood to refer to Truist moving forward while we continue to transition to the Truist name.
© 2017 SunTrust Banks, Inc. All rights reserved.
SunTrust is federally registered service marks of SunTrust Banks, Inc.