The position is described below. If you want to apply click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application youll be invited to create a profile which will let you see your application status and any communications. If you already have a profile with us you can log in to check status.
Need Help
If you have a disability and need assistance with the application you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries wont receive a response).
Regular or Temporary:
Regular
Language Fluency: English (Required)
Work Shift:
1st shift (United States of America)
Please review the following job description:
Derive security specifications from business requirements and design security solutions that support core organizational functions and assure their confidentiality integrity and high availability. Gain organizational commitment for security infrastructure systems and software plans as well as assist to evaluate and select security technologies required to complete those plans. Provide integrated infrastructure-related technical expertise across the organization from conceptualization and project planning to the post-implementation support level. Principally works under limited supervision with Corporate Information Security (CIS) personnel Line of Business (LOB) personnel external vendors and internal IT Services personnel including Enterprise Architects Application & Data Services personnel and other IT Operations Services teams. Security Solution Architects develop security specifications requirements and architecture artifacts in compliance with corporate standards laws and regulations for architecture adherence and performance guidelines.
Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed both major and minor which are not mentioned below. Specific activities may change from time to time.
- Architecting effective and efficient fit for purpose solutions that meet the Banks needs and requirements - includes creation of Cybersecurity Blueprints that will present detailed views of application interaction/integrations between both on prem and cloud-based applications.
- Applies in-depth and specialized expertise in Identity and Access Management and significant breadth of experience across cyber / information security.
- May be called upon to contributed to scope and business cases
- Participates in the gathering and development of requirements by coaching stakeholders and decomposing business requirements into technical and system requirements
- Interpret requirements to determine the best solutions and approaches
- Creates architectures and operational documentation with support of engineering and operations staff
- Advise consult lead guide and mentor project teams engineers analysts and support staff in the delivery of solutions
- Participate in the agile planning processes and delivery methodologies
- Build relationships with internal clients
- Conducts threat modeling and security gap assessment exercises in concert with other teams
- Contributes to the creation of policy standards Minimum Security Baselines (MSBs) procedures and guidelines
- Bring visibility to and escalates security risks as well as technical execution deployment or other risks as applicable
- Conducts post-mortem reviews of projects / products to measure design versus implementation differentials
- Contribute to the Truist Cyber Architecture Practice by supporting Cyber Enterprise Architecture objectives
Qualifications
Required Qualifications:
The requirements listed below are representative of the knowledge skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
- Bachelors degree in a technical or business field or equivalent education and related training
- Eight years of demonstrated experience of systems engineering and/or architecture in at least one of the information security areas: network security access management end point protection data loss prevention vulnerability management application security forensics web security mainframe incident response and/or cyber threat management in a medium to large corporation
- Highly experienced in network security architecture including design tools methods and techniques and the application of Defense-in-Depth principles; knowledge of network design processes including understanding of security objectives
- Specialized depth and thorough Knowledge of The Open Group Architecture Framework (TOGAF) including infrastructure data information security applications architectural concepts and associated disciplines
- Deep knowledge of:
- Mainframe security including access control monitoring integration with non-mainframe technologies and virtualization;
- Authentication and authorization technologies including remote access;
- Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments;
- Enterprise databases and database security including database activity monitoring and database access control technologies;
- Encryption methods and technologies for data-in-transit and data-at-rest scenarios;
- Incident response processes;
- Denial of Service prevention mechanisms;
- Firewall technologies and intrusion prevention methods;
- Cloud technologies and hosting;
- Operating system hardening;
- Virtualization technologies;
- Mobile technologies;
- Encryption and key management technologies;
- Endpoint Protection (includes malware);
- Data Loss Protection technologies
- Experience with peripheral component interconnect and other security audit processes evidence gathering and development/management of remediation plans used in resolution of finding
Preferred Qualifications:
- Subject matter expert with deep specialization or comprehensive knowledge within a discipline which crosses multiple areas of specialization relative to Cloud architectures and security principles Data Protection IT Risk Network Security Application Security Security Operations and IAM. Deep knowledge/experience with securing complex AWS and Azure architectures.
- Understanding of Security foundations and Standards such as hardening least privilege attack surface reduction NIST SP800-series NIST Cybersecurity Framework FIPS 140-2 Common Criteria FFIEC FISMA/FedRAMP ISO 27000 PCI-DSS CIS Benchmarks and similar.
- Applies in-depth and specialized expertise and/or a significant breadth of expertise in own professional discipline and other related disciplines.
- Interprets internal/external business challenges and recommends best practices to improve products processes or services.
- Works independently with guidance in only the most complex and unusual situations.
- Solution expertise (in the following) preferred:
- AWS / Azure Cloud - application migration fit for purpose etc.
- Large data management architecture and integrations
- Multifactor authentication Risk Based Authentication
- Application authentication models
- Application Security OWASP control and evaluation criteria
- Cryptographic technology Transit encryption storage encryption Hash KMS Digital Signature etc.
- Federated Identity Management / Identity Providers / Single Sign On (SSO)
- Client authentication approaches for anti-bot technologies signaling and fraud prevention
- Certification: CISSP-ISSAP AWS AZURE SANS or TOGAF certifications
- Generative AI / LLM
- Consulting or professional services backgrounds are a plus.
- Financial services industry experience is a major plus.
- Masters degree in: Computer Science Information Systems Security or other closely related field.
- Ideal candidate will also have experience in the following areas
- Developing patterns building blocks target architectures policies standards and guidance for all applicable platforms
- Containerization Micro-services API CI/CD
- Content Delivery technologies
Other Job Requirements / Working Conditions
Sitting
Constantly (More than 50% of the time)
Visual / Audio / Speaking
Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.
Manual Dexterity / Keyboarding
Able to work standard office equipment including PC keyboard and mouse copy/fax machines and printers.
Availability
Able to work all hours scheduled including overtime as directed by manager/supervisor and required by business need.
Travel
Minimal and up to 10%
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits though eligibility for specific benefits may be determined by the division of Truist offering the offers medical dental vision life insurance disability accidental death and dismemberment tax-preferred savings accounts and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment along with 10 sick days (also prorated) and paid holidays. For more details on Truists generous benefit plans please visit our Benefits site. Depending on the position and division this job may also be eligible for Truists defined benefit pension plan restricted stock units and/or a deferred compensation plan. As you advance through the hiring process you will also learn more about the specific benefits available for any non-temporary position for which you apply based on full-time or part-time status position and division of work.
Truist is an Equal Opportunity Employer that does not discriminate on the basis of race gender color religion citizenship or national origin age sexual orientation gender identity disability veteran status or other classification protected by law. Truist is a Drug Free Workplace.
EEO is the LawPay Transparency Nondiscrimination Provision E-Verify