Cybersecurity Third Party Analyst

TruistAtlanta, GA
Onsite

About The Position

In this role, you will be responsible for evaluating and managing risks introduced by supplier connectivity, including: - Vendor cloud integrations - VPN and network access - Application-to-application connections - API and data exchange pathways The role focuses on technical risk assessment rather than just policy compliance, analyzing how vendors connect, what they can access, and what business risk that introduces. The analyst also drives process improvements, develops new risk attribution methods, and refines governance for vendor access and connectivity. In addition, role will be part of the continuous monitoring team focusing on security risks introduced by third-party suppliers, SaaS platforms, and publicly exposed assets. This role will develop threat models, detection strategies, and monitoring capabilities to identify and reduce external and supply-chain related threats impacting the organization. This is a fully on-site position based in Atlanta, GA or Dallas, TX. Teammates are expected to be in the office five days a week

Requirements

  • Bachelor's degree in business administration, technology related field or equivalent education and related training
  • More than seven years of demonstrated progressive experience in Cybersecurity, with emphasis on data lost prevention, vulnerability management, access management, firewalls, security awareness training, etc.
  • Excellent ability to express complex multi-disciplinary technical and business concepts in terms that are understandable to all levels of Lines of Business and corporate management both verbally and in writing.
  • Strong working knowledge of cybersecurity terms, concepts, disciplines, frameworks, best practices and industry/regulatory requirements.

Nice To Haves

  • Master’s degree or MBA and seven (7+) years of experience or an equivalent combination of education and work experience in Information Security banking.
  • Strong knowledge on cybersecurity risks, frameworks, best practices, and industry/regulatory requirements.
  • Knowledge and experience in use of cyber security frameworks in assessing programs.
  • Experience conducting, preparing, and presenting analysis, findings, and recommendations.
  • Bachelor's degree in business administration, technology related field or equivalent education and related training.
  • Excellent ability to express complex multi-disciplinary technical and business concepts in terms that are understandable to all levels of Lines of Business and corporate management both verbally and in writing.
  • Experience in security architecture reviews, third-party/vendor risk, and threat modeling.
  • Ability to read diagrams, detect weak trust boundaries, challenge unsafe designs diplomatically, and build repeatable processes.
  • Strong understanding of cloud architectures (AWS/Azure/GCP), VPN, IAM, OAuth, API security, and SaaS integrations.
  • Cyber security certifications such as CISA, CISSP
  • Other technical Certifications (e.g., CCNA, RHCE, MCSE, etc.)

Responsibilities

  • Technical Risk Assessment of Vendor Connectivity Evaluate security risks for VPN access, cloud integrations, API connections, and SaaS apps. Assess authentication, authorization, network segmentation, and trust boundaries. Identify excessive access, weak authentication, insecure patterns, and single points of failure. Maintain consistent classification of high-risk integrations and critical vendor access.
  • Line of Business (LOB) Request Review Review and approve/deny new vendor connection requests and modifications. Partner with business and engineering teams to understand use cases, recommend safer patterns, and propose compensating controls. Advise Procurement, Vendor Risk, Application, and Cloud teams on technical risks. Translate technical findings into business risk statements and remediation actions. Support contractual security requirements and risk acceptance documentation.
  • Process Improvement & Method Development Refine vendor risk processes to move beyond questionnaires and annual reviews. Provide risk-based guidance rather than binary approvals. Introduce architecture-based risk reviews and threat-model-informed assessments. Define standard secure integration patterns, risk thresholds, and escalation criteria.
  • Control Validation & Monitoring Alignment Validate network, IAM, and monitoring controls for vendor connections. Partner with SOC and Detection Engineering to ensure high-risk connections are monitored. Coordinate with third party risk management, incident response, and infrastructure teams to validate threats, contain incidents, and recommend remediation steps. Monitor external threat intelligence and vendor security events to assess potential organizational impact. Identify and document abuse cases and attack paths involving external parties and publicly exposed assets. Translate technical findings into business risk and remediation recommendations.

Benefits

  • All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position.
  • Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates.
  • Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays.
  • Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service