Job Description
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).
Regular or Temporary:
RegularLanguage Fluency: English (Required)
Work Shift:
1st shift (United States of America)Please review the following job description:
The Cybersecurity Engineer (Attack Surface Management) is responsible for designing, implementing, and maturing advanced security validation capabilities to safeguard enterprise systems and applications. This role focuses on continuous security validation through External Attack Surface Management (EASM) tools, integration with existing security infrastructure, and providing actionable insights to strengthen the firm’s cyber resilience. The engineer partners with cross-functional teams to simulate real-world adversarial tactics, techniques, and procedures (TTPs), evaluate control effectiveness, and recommend enhancements that align with enterprise risk management and regulatory standards.Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
EASM Validation and Engineering: Investigate and reproduce findings from EASM platforms (e.g., exposed services, misconfigurations, weak crypto, DNS issues, leaked assets)
Perform Active/Passive Reconnaissance: Familiarity with open-source techniques and tools for profiling attack surface
Advance EASM Capabilities: Develop tuning logic for discovery seeds and asset correlation. Continuously improve signal fidelity and automate common validation tasks
Execute BAS Scenarios: Plan and conduct realistic cyberattack simulations that mirror real-world threat actor TTPs across enterprise environments.
Analyze Simulation Results: Assess BAS outcomes to identify security control gaps, vulnerabilities, and opportunities for improved detection and response.
Provide Actionable Recommendations: Develop and communicate prioritized recommendations to strengthen security policies, procedures, and technical controls.
Collaborate Across Teams: Work with red, blue, and purple teams, as well as incident response and threat intelligence groups, to adjust alerts, rules, and detection logic.
Threat Hunting and Intelligence: Leverage threat intelligence to inform EASM scenarios and proactively address emerging threats.
Vulnerability Management Support: Contribute to the identification, prioritization, and remediation of vulnerabilities based on simulation and testing results.
Documentation and Reporting: Maintain detailed documentation of ASM & BAS methodologies, procedures, and findings; communicate technical results clearly to both technical and non-technical stakeholders.
Continuous Integration/Continuous Deployment (CI/CD): Design, develop and maintain CI/CD Pipeline(s) (e.g., Gitlab, Terraform, AWS, Jenkins, Github)
Automation/Scripting: Design and Execute automation scripts (e.g., Python, Powershell, Bash, etc.)
Qualifications
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Bachelor’s degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience
Knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
Previous experience in planning and managing IT projects
Preferred Qualifications:
Experience with Breach and Attack (BAS) or Continuous Security Validation (CSV) tool(s)
Bachelor’s degree and five years of experience or an equivalent combination of education and work experience
Banking or financial services experience
Experience in designing and executing Attack Scenarios: Plan and conduct realistic cyberattack simulations that mimic real-world threat actor tactics, techniques, and procedures (TTPs).
Analyze Simulation Results: Evaluate the outcomes of BAS, identifying weaknesses in security controls, vulnerabilities, and gaps in detection and response capabilities.
Provide Actionable Recommendations: Develop and present recommendations to improve security policies, procedures, and technologies based on simulation findings.
Document and Communicate: Maintain documentation of BAS methodologies, procedures, and results, and communicate findings to technical and non-technical stakeholders.
Collaborate with Security Teams: Work with security analysts and engineers to adjust alerts, rules, and controls based on simulation results.
Advanced Threat Hunting and Intelligence: Utilize threat intelligence to inform attack scenarios and identify emerging threats.
Vulnerability Management: Identify, prioritize, and recommend remediation of high-risk vulnerabilities.
Red Teaming and Blue Teaming: May also participate in red, purple, and blue team exercises to further evaluate security posture.
Strong understanding of cybersecurity concepts, including attack vectors, TTPs, and security controls.
Hands-on experience with architecting, maturing, and automation - CI/CD pipeline end to end lifecycle
Experience with penetration testing, vulnerability management, and security tools.
Proficiency in scripting for automation, data wrangling and enrichment (e.g., Python, PowerShell).
Knowledge of common threat intelligence sources and frameworks.
Excellent analytical, problem-solving, and communication skills.
Ability to work independently and as part of a team.
Experience with cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK and D3FEND).
Experience with GRC engineering
Strong knowledge of cloud security (AWS/Azure), PKI/TLS hygiene, DNS hardening, and external service posture.
Hands-on experience with EASM platforms (e.g., Defender EASM, Cortex Xpanse, CyCognito, etc.) and strong understanding of internet-scale asset discovery
Hands-on experience with vulnerability engineering or external attack surface security, with proven leadership in complex environments
Experience with commercial BAS tools: AttackIQ, SafeBreach, Cymulate, etc.
Experience with detection engineering and SOAR
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).
Regular or Temporary:
RegularLanguage Fluency: English (Required)
Work Shift:
1st shift (United States of America)Please review the following job description:
The Cybersecurity Engineer (Attack Surface Management) is responsible for designing, implementing, and maturing advanced security validation capabilities to safeguard enterprise systems and applications. This role focuses on continuous security validation through External Attack Surface Management (EASM) tools, integration with existing security infrastructure, and providing actionable insights to strengthen the firm’s cyber resilience. The engineer partners with cross-functional teams to simulate real-world adversarial tactics, techniques, and procedures (TTPs), evaluate control effectiveness, and recommend enhancements that align with enterprise risk management and regulatory standards.Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
EASM Validation and Engineering: Investigate and reproduce findings from EASM platforms (e.g., exposed services, misconfigurations, weak crypto, DNS issues, leaked assets)
Perform Active/Passive Reconnaissance: Familiarity with open-source techniques and tools for profiling attack surface
Advance EASM Capabilities: Develop tuning logic for discovery seeds and asset correlation. Continuously improve signal fidelity and automate common validation tasks
Execute BAS Scenarios: Plan and conduct realistic cyberattack simulations that mirror real-world threat actor TTPs across enterprise environments.
Analyze Simulation Results: Assess BAS outcomes to identify security control gaps, vulnerabilities, and opportunities for improved detection and response.
Provide Actionable Recommendations: Develop and communicate prioritized recommendations to strengthen security policies, procedures, and technical controls.
Collaborate Across Teams: Work with red, blue, and purple teams, as well as incident response and threat intelligence groups, to adjust alerts, rules, and detection logic.
Threat Hunting and Intelligence: Leverage threat intelligence to inform EASM scenarios and proactively address emerging threats.
Vulnerability Management Support: Contribute to the identification, prioritization, and remediation of vulnerabilities based on simulation and testing results.
Documentation and Reporting: Maintain detailed documentation of ASM & BAS methodologies, procedures, and findings; communicate technical results clearly to both technical and non-technical stakeholders.
Continuous Integration/Continuous Deployment (CI/CD): Design, develop and maintain CI/CD Pipeline(s) (e.g., Gitlab, Terraform, AWS, Jenkins, Github)
Automation/Scripting: Design and Execute automation scripts (e.g., Python, Powershell, Bash, etc.)
Qualifications
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Bachelor’s degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience
Knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
Previous experience in planning and managing IT projects
Preferred Qualifications:
Experience with Breach and Attack (BAS) or Continuous Security Validation (CSV) tool(s)
Bachelor’s degree and five years of experience or an equivalent combination of education and work experience
Banking or financial services experience
Experience in designing and executing Attack Scenarios: Plan and conduct realistic cyberattack simulations that mimic real-world threat actor tactics, techniques, and procedures (TTPs).
Analyze Simulation Results: Evaluate the outcomes of BAS, identifying weaknesses in security controls, vulnerabilities, and gaps in detection and response capabilities.
Provide Actionable Recommendations: Develop and present recommendations to improve security policies, procedures, and technologies based on simulation findings.
Document and Communicate: Maintain documentation of BAS methodologies, procedures, and results, and communicate findings to technical and non-technical stakeholders.
Collaborate with Security Teams: Work with security analysts and engineers to adjust alerts, rules, and controls based on simulation results.
Advanced Threat Hunting and Intelligence: Utilize threat intelligence to inform attack scenarios and identify emerging threats.
Vulnerability Management: Identify, prioritize, and recommend remediation of high-risk vulnerabilities.
Red Teaming and Blue Teaming: May also participate in red, purple, and blue team exercises to further evaluate security posture.
Strong understanding of cybersecurity concepts, including attack vectors, TTPs, and security controls.
Hands-on experience with architecting, maturing, and automation - CI/CD pipeline end to end lifecycle
Experience with penetration testing, vulnerability management, and security tools.
Proficiency in scripting for automation, data wrangling and enrichment (e.g., Python, PowerShell).
Knowledge of common threat intelligence sources and frameworks.
Excellent analytical, problem-solving, and communication skills.
Ability to work independently and as part of a team.
Experience with cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK and D3FEND).
Experience with GRC engineering
Strong knowledge of cloud security (AWS/Azure), PKI/TLS hygiene, DNS hardening, and external service posture.
Hands-on experience with EASM platforms (e.g., Defender EASM, Cortex Xpanse, CyCognito, etc.) and strong understanding of internet-scale asset discovery
Hands-on experience with vulnerability engineering or external attack surface security, with proven leadership in complex environments
Experience with commercial BAS tools: AttackIQ, SafeBreach, Cymulate, etc.
Experience with detection engineering and SOAR
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.
About Truist
Care starts on the inside.
At Truist, our purpose is to inspire and build better lives and communities. And we do that through real, unwavering care. As part of that commitment to care, we’re creating an inclusive and energizing work environment that empowers teammates to learn, grow, and have fulfilling careers.
Why work at Truist?
· Be part of an inclusive culture. We actively recruit and train diverse talent. And not just because it’s the right thing to do—but because we’re inspired by the perspectives and experiences of people from different backgrounds.
· Balance your work and life. We offer flexible healthcare benefits, time off for vacation, wellness, and community service, and company-sponsored financial education programs. We want our teammates to lead full, healthy lives.
· Make meaningful connections. We see the future of financial services as one defined not only by technology, but by humanity. A true balance of innovation, inclusion, and conversation—cutting-edge and close-to-home. You'll be part of building it at Truist.
We’re looking for people with open hearts, big dreams, and new ways of thinking to take us to innovative places in banking. Join us.