Cybersecurity Senior Engineer (ASM)
Job
Truist
Greenville, SC (In Person)
Full-Time
Review key factors to help you decide if the role fits your goals.
Pay Growth
?
out of 5
Not enough data
Not enough info to score pay or growth
Job Security
?
out of 5
Not enough data
Calculating job security score...
Total Score
77
out of 100
Average of individual scores
Skill Insights
Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.
Job Description
- The position is described below. If you want to apply, click the button at the top or bottom of this page. After you click and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
- Need Help? (https://pp-cdn.phenompeople.com/CareerConnectResources/prod/TBJTBFUS/documents/Career\_site\_FAQ-1758133253710.pdf) _If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to_ Accessibility (careers@truist.com?subject=Accommodation%20request) _(accommodation requests only; other inquiries won't receive a response)._
Regular or Temporary:
- Regular
Language Fluency:
- English (Required)
Work Shift:
- 1st shift (United States of America)
- Please review the following job description:
- The Cybersecurity Senior Engineer (Attack Surface Management) is responsible for designing, implementing, and maturing advanced security validation capabilities to safeguard enterprise systems and applications.
- Essential Duties and Responsibilities
- Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. +
- Lead EASM Validation and Engineering
- : Investigate and reproduce findings from EASM platforms (e.g., exposed services, misconfigurations, weak crypto, DNS issues, leaked assets) +
- Perform Active/Passive Reconnaissance
- : Familiarity with open-source techniques and tools for profiling attack surface +
- Advance EASM Capabilities
- : Develop tuning logic for discovery seeds and asset correlation. Continuously improve signal fidelity and automate common validation tasks +
- Design and Execute BAS Scenarios
- : Plan and conduct realistic cyberattack simulations that mirror real-world threat actor TTPs across enterprise environments. +
- Analyze Simulation Results
- : Assess BAS outcomes to identify security control gaps, vulnerabilities, and opportunities for improved detection and response. +
- Provide Actionable Recommendations
- : Develop and communicate prioritized recommendations to strengthen security policies, procedures, and technical controls. +
- Collaborate Across Teams
- : Work with red, blue, and purple teams, as well as incident response and threat intelligence groups, to adjust alerts, rules, and detection logic. +
- Threat Hunting and Intelligence
- : Leverage threat intelligence to inform EASM scenarios and proactively address emerging threats. +
- Vulnerability Management Support
- : Contribute to the identification, prioritization, and remediation of vulnerabilities based on simulation and testing results. +
- Documentation and Reporting
- : Maintain detailed documentation of
ASM & BAS
methodologies, procedures, and findings; communicate technical results clearly to both technical and non-technical stakeholders. +- Continuous Integration/Continuous Deployment (CI/CD)
- : Design, develop and maintain CI/CD Pipeline(s) (e.g., Gitlab, Terraform, AWS, Jenkins, Github) +
- Automation/Scripting
- : Design and Execute automation scripts (e.g., Python, Powershell, Bash, etc.)
- Qualifications
Required Qualifications:
- The requirements listed below are representative of the knowledge, skill and/or ability required.
Preferred Qualifications:
- + Experience with Breach and Attack (BAS) or Continuous Security Validation (CSV) tool(s) + Bachelor's degree and twelve years of experience or an equivalent combination of education and work experience + Banking or financial services experience + Experience in designing and executing
Attack Scenarios:
Plan and conduct realistic cyberattack simulations that mimic real-world threat actor tactics, techniques, and procedures (TTPs). +Analyze Simulation Results:
Evaluate the outcomes of BAS, identifying weaknesses in security controls, vulnerabilities, and gaps in detection and response capabilities. +Provide Actionable Recommendations:
Develop and present recommendations to improve security policies, procedures, and technologies based on simulation findings. +Document and Communicate:
Maintain documentation of BAS methodologies, procedures, and results, and communicate findings to technical and non-technical stakeholders. + Collaborate withSecurity Teams:
Work with security analysts and engineers to adjust alerts, rules, and controls based on simulation results. +Advanced Threat Hunting and Intelligence:
Utilize threat intelligence to inform attack scenarios and identify emerging threats. +Vulnerability Management:
Identify, prioritize, and recommend remediation of high-risk vulnerabilities. +Red Teaming and Blue Teaming:
May also participate in red, purple, and blue team exercises to further evaluate security posture. + Strong understanding of cybersecurity concepts, including attack vectors, TTPs, and security controls. + Hands-on experience with architecting, maturing, and automation - CI/CD pipeline end to end lifecycle + Experience with penetration testing, vulnerability management, and security tools. + Proficiency in scripting for automation, data wrangling and enrichment (e.g., Python, PowerShell). + Knowledge of common threat intelligence sources and frameworks. + Excellent analytical, problem-solving, and communication skills. + Ability to work independently and as part of a team. + Experience with cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK and D3FEND). + Experience with GRC engineering + Strong knowledge of cloud security (AWS/Azure), PKI/TLS hygiene, DNS hardening, and external service posture. + Hands-on experience with EASM platforms (e.g., Defender EASM, Cortex Xpanse, CyCognito, etc.) and strong understanding of internet-scale asset discovery + Hands-on experience with vulnerability engineering or external attack surface security, with proven leadership in complex environments + Experience with commercial BAS tools: AttackIQ, SafeBreach, Cymulate, etc. + Experience with detection engineering and SOAR- General Description of Available Benefits for
Eligible Employees of Truist Financial Corporation:
- All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position.
- _Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace._
- EEO is the Law (https://www.
Similar remote jobs
UnitedHealth Group
Fort Wayne, IN
Posted2 days ago
Updated4 hours ago
Similar jobs in Greenville, SC
East Carolina University
Greenville, SC
Posted2 days ago
Updated4 hours ago
East Carolina University
Greenville, SC
Posted2 days ago
Updated4 hours ago
East Carolina University
Greenville, SC
Posted2 days ago
Updated4 hours ago
East Carolina University
Greenville, SC
Posted2 days ago
Updated4 hours ago
Similar jobs in South Carolina
Banyan Pulmonary Services LLC
Florence, SC
Posted2 days ago
Updated4 hours ago
O. P. Earle Elementary School
Landrum, SC
Posted2 days ago
Updated4 hours ago