The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status. Need Help? If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response). Regular or Temporary: Regular Language Fluency: English (Required) Work Shift: 1st shift (United States of America) Please review the following job description: • Responsible for data scanning classification/ tagging DSCT as part of the overall data protection department at Truist. • Manage tools that actively scan unstructured and structured data across the environment both application data. Data that teammates may create/ interact with/ apply the Truist data risk classification taxonomy to that data in alignment within the FDIC standards. • You will focus on assisting in getting the new platforms to get their role groups in place for the new application and installing the application on those new servers and configuring it. • You will start onboarding various data assets in the environment, while continuing the execution of our scanning classification controls, weekly operational routines and keeping in line with rating requirements. • Assist in the designing, planning, testing and implementation phases of cybersecurity technology projects. Essential Duties and Responsibilities Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. Develop and maintain the technical cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing. Lead efforts related to designing, planning, enhancing, and testing proxy cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies. Analyze information to determine, recommend, and plan the use of new security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or workload, efficient operation and effective use of allotted resources. Lead the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff. Use sophisticated analytical thought through models, testing, and experience to exercise judgment and identify innovative proxy solutions. Responsible for technical support of proxy information security technologies providing expert problem analysis and resolution in a timely manner. Leads teams or projects with moderate resource requirements, risk, and complexity. Provides training, knowledge and support to junior members of the DSCT team. Backs up the manager of the DSCT team as delegated for documentation, attestations and system approvals, control execution and functions in the role of team lead as needed.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level