The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
Need Help (https://pp-cdn.phenompeople.com/CareerConnectResources/prod/TBJTBFUS/documents/Career site FAQ-1758133253710.pdf)
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (careers@truist.comsubject=Accommodation%20request)
(accommodation requests only; other inquiries won't receive a response).
Regular or Temporary:
Regular
Language Fluency: English (Required)
Work Shift:
1st shift (United States of America)
Please review the following job description:
The Cybersecurity Senior Engineer (Attack Surface Management) is responsible for designing, implementing, and maturing advanced security validation capabilities to safeguard enterprise systems and applications. This role focuses on continuous security validation through External Attack Surface Management (EASM) tools, integration with existing security infrastructure, and providing actionable insights to strengthen the firm's cyber resilience. The engineer partners with cross-functional teams to simulate real-world adversarial tactics, techniques, and procedures (TTPs), evaluate control effectiveness, and recommend enhancements that align with enterprise risk management and regulatory standards.
Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
Lead EASM V * * alidation and E * * ngineering : Investigate and reproduce findings from EASM platforms (e.g., exposed services, misconfigurations, weak crypto, DNS issues, leaked assets)
* * Perform Active/Passive Reconnaissance : Familiarity withopen-sourcetechniques and tools for profiling attack surface
* * Advance EASM C * * apabilities : Develop tuning logic fordiscoveryseeds and asset correlation. Continuously improve signal fidelity and automate common validation tasks
* * Design and Execute BAS Scenarios : Plan and conduct realistic cyberattack simulations that mirror real-world threat actor TTPs across enterprise environments.
* * Analyze Simulation Results : Assess BAS outcomes toidentifysecurity control gaps, vulnerabilities, and opportunities for improved detection and response.
* * Provide Actionable Recommendations : Develop and communicate prioritized recommendations to strengthen security policies, procedures, and technical controls.
* * Collaborate Across Teams : Work with red, blue, and purple teams, as well as incident response and threat intelligence groups, to adjust alerts, rules, and detection logic.
* * Threat Hunting and Intelligence : Leverage threat intelligence to informEASMscenarios and proactively address emerging threats.
* * Vulnerability Management Support : Contribute to the identification, prioritization, and remediation of vulnerabilities based on simulation and testing results.
* * Documentation and Reporting :Maintaindetailed documentation ofASM &BAS methodologies, procedures, and findings; communicate technical results clearly to both technical and non-technical stakeholders.
* * Continuous Integration/Continuous Deployment (CI/CD) :Design,developandmaintainCI/CD Pipeline(s)(e.g.,Gitlab,Terraform, AWS,Jenkins,Github)
* * Automation/Scripting :Design and Executeautomationscripts (e.g., Python,Powershell, Bash, etc.)
Qualifications
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Bachelor's degree andfiveyears of experience in systems engineering or administration or an equivalent combination of education and work experience
In-depth knowledge inapplied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
Previous experience in planning and managing IT projects
Preferred Qualifications:
Experience with Breach and Attack (BAS) or Continuous Security Validation (CSV) tool(s)
Bachelor's degree andtwelveyears of experience or an equivalent combination ofeducation and work experience
Banking or financialservices experience
Experience indesigning and executing Attack Scenarios:Plan and conduct realistic cyberattack simulations that mimic real-world threat actor tactics, techniques, and procedures (TTPs).
Analyze Simulation Results:Evaluate the outcomes of BAS,identifyingweaknesses in security controls, vulnerabilities, and gaps in detection and response capabilities.
Provide Actionable Recommendations:Develop and present recommendations to improve security policies, procedures, and technologies based on simulation findings.
Document and Communicate:Maintaindocumentation of BAS methodologies, procedures, and results, and communicate findings to technical and non-technical stakeholders.
Collaborate with Security Teams:Work with security analysts and engineers to adjust alerts, rules, and controls based on simulation results.
AdvancedThreat Hunting and Intelligence:Utilizethreat intelligence to inform attack scenarios andidentifyemerging threats.
Vulnerability Management:Identify, prioritize, and recommendremediation ofhigh-risk vulnerabilities.
Red Teaming and Blue Teaming:May alsoparticipatein red, purple,and blue team exercises to further evaluate security posture.
Strong understanding of cybersecurity concepts, including attack vectors, TTPs, and security controls.
Hands-on experience witharchitecting, maturing, and automation -CI/CD pipeline end to end lifecycle
Experience with penetration testing, vulnerability management, and security tools.
Proficiencyin scriptingforautomation,datawranglingand enrichment(e.g., Python, PowerShell).
Knowledge of common threat intelligence sources and frameworks.
Excellent analytical, problem-solving, and communication skills.
Ability to work independently and as part of a team.
Experiencewith cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CKand D3FEND).
Experience withGRC engineering
Strong knowledge of cloud security (AWS/Azure), PKI/TLS hygiene, DNS hardening, and external service posture.
Hands-on experience with EASM platforms (e.g., Defender EASM, CortexXpanse,CyCognito, etc.) and strong understanding of internet-scale asset discovery
Hands-on experience withvulnerability engineering or external attack surface security, with proven leadership in complex environments
Experience withcommercial BAS tools:AttackIQ,SafeBreach,Cymulate, etc.
Experience with detection engineering and SOAR
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist's generous benefit plans, please visit our Benefits site (https://benefits.truist.com/)
. Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.
EEO is the Law (https://www.eeoc.gov/sites/default/files/2022-10/EEOC KnowYourRights screen reader 10_20.pdf)
E-Verify (https://pp-cdn.phenompeople.com/CareerConnectResources/prod/TBJTBFUS/documents/E-Verify Participation Poster-1757074518541.pdf)
IER Right to Work (https://pp-cdn.phenompeople.com/CareerConnectResources/prod/TBJTBFUS/documents/IER_RightToWorkPoster-1757074222028.pdf)