Cybersecurity Senior Engineer (ASM)

Truist Bank

Not Interested
Bookmark
Report This Job

profile Job Location:

Charlotte, VT - USA

profile Monthly Salary: Not Disclosed
Posted on: 2 days ago
Vacancies: 1 Vacancy

Job Summary

The position is described below. If you want to apply click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application youll be invited to create a profile which will let you see your application status and any communications. If you already have a profile with us you can log in to check status.

Need Help

If you have a disability and need assistance with the application you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries wont receive a response).

Regular or Temporary:

Regular

Language Fluency: English (Required)

Work Shift:

1st shift (United States of America)

Please review the following job description:

The Cybersecurity Senior Engineer (Attack Surface Management) is responsible for designing implementing and maturing advanced security validation capabilities to safeguard enterprise systems and applications. This role focuses on continuous security validation through External Attack Surface Management (EASM) tools integration with existing security infrastructure and providing actionable insights to strengthen the firms cyber resilience. The engineer partners with cross-functional teams to simulate real-world adversarial tactics techniques and procedures (TTPs) evaluate control effectiveness and recommend enhancements that align with enterprise risk management and regulatory standards.

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed both major and minor which are not mentioned below. Specific activities may change from time to time.

  • Lead EASMValidation andEngineering: Investigate and reproduce findings from EASM platforms (e.g. exposed services misconfigurations weak crypto DNS issues leaked assets)

  • Perform Active/Passive Reconnaissance: Familiarity withopen-sourcetechniques and tools for profiling attack surface

  • Advance EASMCapabilities: Develop tuning logic fordiscoveryseeds and asset correlation. Continuously improve signal fidelity and automate common validation tasks

  • Design and Execute BAS Scenarios: Plan and conduct realistic cyberattack simulations that mirror real-world threat actor TTPs across enterprise environments.

  • Analyze Simulation Results: Assess BAS outcomes toidentifysecurity control gaps vulnerabilities and opportunities for improved detection and response.

  • Provide Actionable Recommendations: Develop and communicate prioritized recommendations to strengthen security policies procedures and technical controls.

  • Collaborate Across Teams: Work with red blue and purple teams as well as incident response and threat intelligence groups to adjust alerts rules and detection logic.

  • Threat Hunting and Intelligence: Leverage threat intelligence to informEASMscenarios and proactively address emerging threats.

  • Vulnerability Management Support: Contribute to the identification prioritization and remediation of vulnerabilities based on simulation and testing results.

  • Documentation and Reporting:Maintaindetailed documentation ofASM &BAS methodologies procedures and findings; communicate technical results clearly to both technical and non-technical stakeholders.

  • Continuous Integration/Continuous Deployment (CI/CD):DesigndevelopandmaintainCI/CD Pipeline(s)(e.g.GitlabTerraform AWSJenkinsGithub)

  • Automation/Scripting:Design and Executeautomationscripts (e.g. PythonPowershell Bash etc.)

Qualifications

Required Qualifications:

The requirements listed below are representative of the knowledge skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Bachelors degree andfiveyears of experience in systems engineering or administration or an equivalent combination of education and work experience

  • In-depth knowledge inapplied enterprise information security technologies including but not limited to firewalls intrusion detection/prevention systems network operating systems identity management database activity monitoring encryption content filtering and Mainframe security

  • Previous experience in planning and managing IT projects

Preferred Qualifications:

  • Experience with Breach and Attack (BAS) or Continuous Security Validation (CSV) tool(s)

  • Bachelors degree andtwelveyears of experience or an equivalent combination ofeducation and work experience

  • Banking or financialservices experience

  • Experience indesigning and executing Attack Scenarios:Plan and conduct realistic cyberattack simulations that mimic real-world threat actor tactics techniques and procedures (TTPs).

  • Analyze Simulation Results:Evaluate the outcomes of BASidentifyingweaknesses in security controls vulnerabilities and gaps in detection and response capabilities.

  • Provide Actionable Recommendations:Develop and present recommendations to improve security policies procedures and technologies based on simulation findings.

  • Document and Communicate:Maintaindocumentation of BAS methodologies procedures and results and communicate findings to technical and non-technical stakeholders.

  • Collaborate with Security Teams:Work with security analysts and engineers to adjust alerts rules and controls based on simulation results.

  • AdvancedThreat Hunting and Intelligence:Utilizethreat intelligence to inform attack scenarios andidentifyemerging threats.

  • Vulnerability Management:Identify prioritize and recommendremediation ofhigh-risk vulnerabilities.

  • Red Teaming and Blue Teaming:May alsoparticipatein red purpleand blue team exercises to further evaluate security posture.

  • Strong understanding of cybersecurity concepts including attack vectors TTPs and security controls.

  • Hands-on experience witharchitecting maturing and automation -CI/CD pipeline end to end lifecycle

  • Experience with penetration testing vulnerability management and security tools.

  • Proficiencyin scriptingforautomationdatawranglingand enrichment(e.g. Python PowerShell).

  • Knowledge of common threat intelligence sources and frameworks.

  • Excellent analytical problem-solving and communication skills.

  • Ability to work independently and as part of a team.

  • Experiencewith cybersecurity frameworks and standards (e.g. NIST MITRE ATT&CKand D3FEND).

  • Experience withGRC engineering

  • Strong knowledge of cloud security (AWS/Azure) PKI/TLS hygiene DNS hardening and external service posture.

  • Hands-on experience with EASM platforms (e.g. Defender EASM CortexXpanseCyCognito etc.) and strong understanding of internet-scale asset discovery

  • Hands-on experience withvulnerability engineering or external attack surface security with proven leadership in complex environments

  • Experience withcommercial BAS tools:AttackIQSafeBreachCymulate etc.

  • Experience with detection engineering and SOAR

General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits though eligibility for specific benefits may be determined by the division of Truist offering the offers medical dental vision life insurance disability accidental death and dismemberment tax-preferred savings accounts and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment along with 10 sick days (also prorated) and paid holidays. For more details on Truists generous benefit plans please visit our Benefits site. Depending on the position and division this job may also be eligible for Truists defined benefit pension plan restricted stock units and/or a deferred compensation plan. As you advance through the hiring process you will also learn more about the specific benefits available for any non-temporary position for which you apply based on full-time or part-time status position and division of work.

Truist is an Equal Opportunity Employer that does not discriminate on the basis of race gender color religion citizenship or national origin age sexual orientation gender identity disability veteran status or other classification protected by law. Truist is a Drug Free Workplace.

EEO is the Law E-Verify IER Right to Work


Required Experience:

Senior IC

The position is described below. If you want to apply click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application youll be invited to create a profile which will let you see your application status and any communications. If you already have ...
View more view more

About Company

Company Logo

Your journey to better banking starts with Truist. Checking and savings accounts, credit cards, mortgages, small business, commercial banking, and more.

View Profile View Profile