The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.Need Help? ( you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility ( ?subject=Accommodation%20request)(accommodation requests only; other inquiries won't receive a response).Regular or Temporary:RegularLanguage Fluency: English (Required)Work Shift:1st shift (United States of America)Please review the following job description:Responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Assist in the designing, planning, testing and implementation phases of cybersecurity technology projects.Essential Duties and ResponsibilitiesFollowing is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.Participate in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.Participate in the analysis of information to determine, recommend, and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resourcesParticipate in the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoffTake a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.Provide technical support of information security technologies, providing problem analysis and resolution in a timely manner and explain and interpret complex, difficult, or sensitive information.Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives.QualificationsRequired Qualifications:The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.Bachelor’s degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experienceIn-depth knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe securityPrevious experience in planning and managing IT projectsPreferred Qualifications:Linux Administration:5+ years managing RHEL systems in production environments, including user management, system tuning, and service management.Experience with system performance monitoring, troubleshooting, and log management (journalctl, rsyslog).Automation and Scripting:Proficiency in automating tasks with Bash or Python.Experience with infrastructure automation tools (Ansible, Puppet) for system provisioning and configuration management a plus.Networking and Security:Strong understanding of networking (DNS, IPtables, VPN) and Linux security practices.Familiarity with security compliance (CIS benchmarks, security patching).Storage and Backup Management:Experience managing storage solutions (LVM, NFS) and implementing backup and recovery strategies.Growth Opportunities:Exposure to system integration with APIs, containerization (e.g., Docker), and CI/CD pipelines.Opportunities to expand into automation, orchestration, and cross-functional collaboration within a SOAR team.SOAR technology experience or training is a plusOther Job Requirements / Working ConditionsSittingConstantly (More than 50% of the time)Visual / Audio / SpeakingAble to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.Manual Dexterity / KeyboardingAble to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.AvailabilityAble to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.TravelMinimal and up to 10%General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site ( Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.Truist supports a diverse workforce and is an Equal Opportunity Employer that does not discriminate against individuals on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Truist is a Drug Free Workplace.EEO is the Law ( Transparency Nondiscrimination Provision ( (
Similar Jobs
- View Job
Cybersecurity Engineer
Raleigh - View Job
Principal Cybersecurity Software Development Engineer
Cary - View Job
Cloud Red Hat Enterprise Linux (RHEL) Engineer
Raleigh - View Job
Cloud Red Hat Enterprise Linux (RHEL) Engineer
Raleigh - View Job
Cloud Red Hat Enterprise Linux (RHEL) Engineer
Raleigh