hero






Cybersecurity Manager - SOC - 3rd Shift

Truist

Truist

Zebulon, NC, USA
Posted on Tuesday, July 2, 2024

The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.

Need Help?

If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).

Regular or Temporary:

Regular

Language Fluency: English (Required)

Work Shift:

3rd Shift - 15% Automatic Pay Differential (United States of America)

Please review the following job description:

The SOC Manager (3rd Shift) ensures that the SOC team has proper processes, resources, and tools to timely detect, analyze and respond to security incidents. Sets and execute a clear strategy for a SOC that includes items such as log collection, detection approach, detection practices, and security incident practices. Establish a clear security incident process and protocol; ensuring that the team understand what needs to be done to handle uncertain security issues.

Serves as an escalation point and contact for security incidents, and a liaison between the other internal stakeholders. Establish a threat intelligence function leveraging tactical and strategic intelligence.

This role is on-site in Zebulon, NC and will participate in an on-call rotation with the following shift options:

3rd Shift, Monday to Friday 11pm to 7am
**3rd Shift Pay Differential: +15%***

ESSENTIAL DUTIES AND RESPONSIBILITIES

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.

  • Lead efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.

  • Analyze information to determine, recommend, and plan the use of new information security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources.

  • Lead the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff.

  • Use sophisticated analytical thought through models, testing, and experience to exercise judgment and identify innovative solutions.

  • Responsible for technical support of information security technologies providing expert problem analysis and resolution in a timely manner.

  • Set the team's direction and communicates individual and team priorities and deliverables for the team against expected results.

  • Make leadership decisions within established policies, procedures, and established objectives.

  • Leads complex and visible projects with moderate to high risk and complexity.

QUALIFICATIONS

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Bachelor’s degree and six to eight years of experience in systems engineering or administration or an equivalent combination of education and work experience.
  • Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security.
  • Previous experience in leading complex IT projects

Preferred Qualifications:

  • Seven (7) or more years of cybersecurity experience in a technical role

  • Five (5) or more years’ working experience in a technology environment with exposure to information security principles.

  • A bachelor’s degree in Information Security, Information Technology, Computer Science, Engineering, or similar field.

  • Extensive working knowledge of common IT and security concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques, cyber incident response, malware analysis, computer forensics and the tools that support these processes.

  • Display a working knowledge of at least one the following technologies: SIEM, EndPoint Detection & Response tools, and Digital forensic suites.

  • Ability to solve complex problems by applying best practices. Demonstrated proficiency utilizing security platforms related to logging, event correlation, incident management, vulnerability management, and/or computer forensics.

  • Demonstrated teamwork and collaboration skills.

  • Strong time management skills and ability to manage competing priorities effectively.

  • Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.

  • Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.

  • Experience leading incidents as the primary technical voice

  • Experience working with DDoS attacks and other network-based attack types

  • Extensive working knowledge of Digital Forensics & Incident Response (DFIR) skills, including log, network, endpoint, memory, malware, reverse engineering, and root cause analysis.

  • Although, not required, a background in software development and/or scripting is highly desirable.

  • Three or more of the following (or similar) certifications: Security+, Network+, CySA+, GSEC, CEH, CHFI, GCIA, GCIH, GCFE, GCFA, GCED, GREM, OSCP.

  • Support a variety of tasks in support of the larger Cybersecurity Mission

  • Demonstrate the ability to work as a self-starter and acquire new skills quickly

  • Exemplify the characteristics of a great team player and overall positive mindset

  • Ability to support an on-call and regular shift within a 24/7 operations environment.

  • Ability to obtain requisite technical certification(s) within six months of hire.

OTHER JOB REQUIREMENTS / WORKING CONDITIONS

Sitting

Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Availability

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.

Travel

Minimal and up to 10%

General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.

Truist supports a diverse workforce and is an Equal Opportunity Employer that does not discriminate against individuals on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Truist is a Drug Free Workplace.

EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify