Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Truist Cybersecurity Manager - SOC 3rd Shift 
United States, North Carolina 
703182577

26.06.2024

Regular or Temporary:

English (Required)

The SOC Manager (3rd Shift) ensures that the SOC team has proper processes, resources, and tools to timely detect, analyze and respond to security incidents. Sets and execute a clear strategy for a SOC that includes items such as log collection, detection approach, detection practices, and security incident practices. Establish a clear security incident process and protocol; ensuring that the team understand what needs to be done to handle uncertain security issues.Serves as an escalation point and contact for security incidents, and a liaison between the other internal stakeholders. Establish a threat intelligence function leveraging tactical and strategic intelligence.This role is on-site in Zebulon, NC and will participate in an on-call rotation with the following shift options:3rd Shift, Monday to Friday 11pm to 7am
**3rd Shift Pay Differential: +15%***

ESSENTIAL DUTIES AND RESPONSIBILITIES

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.

  • Lead efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.

  • Analyze information to determine, recommend, and plan the use of new information security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources.

  • Lead the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff.

  • Use sophisticated analytical thought through models, testing, and experience to exercise judgment and identify innovative solutions.

  • Responsible for technical support of information security technologies providing expert problem analysis and resolution in a timely manner.

  • Set the team's direction and communicates individual and team priorities and deliverables for the team against expected results.

  • Make leadership decisions within established policies, procedures, and established objectives.

  • Leads complex and visible projects with moderate to high risk and complexity.

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability

  • Bachelor’s degree and six to eight years of experience in systems engineering or administration or an equivalent combination of education and work experience.
  • Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security.
  • Previousexperience in leading complex IT projects


Preferred Qualifications:

  • Seven (7) or more years of cybersecurity experience in a technical role

  • Five (5) or more years’ working experience in atechnologyenvironment with exposure to information security principles.

  • Abachelor’s degree in Information Security, Information Technology, Computer Science, Engineering, or similar field.

  • Extensive working knowledge of common IT and security concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques, cyber incident response, malware analysis, computer forensics and the tools that support these processes.

  • Display a working knowledge of at leastonethe following technologies: SIEM,EndPointDetection & Response tools, and Digital forensic suites.

  • Ability to solve complex problems by applying best practices. Demonstratedproficiencyutilizingsecurity platforms related to logging, event correlation, incident management, vulnerability management, and/or computer forensics.

  • Demonstrated teamwork and collaboration skills.

  • Strong time management skills and ability to manage competing priorities effectively.

  • Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.

  • Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.

  • Experience leading incidents as the primary technical voice

  • Experience working with DDoS attacks and other network-based attack types

  • Extensive working knowledge of Digital Forensics & Incident Response (DFIR) skills, includinglog, network, endpoint, memory, malware,reverse engineering,and root cause analysis.

  • Although, notrequired, a background in software development and/or scripting is highly desirable.

  • Three or more of the following (or similar) certifications: Security+, Network+,CySA+, GSEC, CEH, CHFI, GCIA, GCIH, GCFE, GCFA, GCED, GREM, OSCP.

  • Support a variety of tasks in support of the larger Cybersecurity Mission

  • Demonstrate the ability to work as a self-starter andacquirenew skills quickly

  • Exemplify the characteristics ofa great teamplayer and overall positive mindset

  • Ability to support an on-call and regular shift within a 24/7 operations environment.

  • Ability to obtain requisite technical certification(s) within six months of hire.

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need