Cybersecurity Senior Engineer (ASM)
Company: Truist Bank
Location: Charlotte
Posted on: April 3, 2026
|
|
|
Job Description:
The position is described below. If you want to apply, click the
Apply Now button at the top or bottom of this page. After you click
Apply Now and complete your application, you'll be invited to
create a profile, which will let you see your application status
and any communications. If you already have a profile with us, you
can log in to check status. Need Help? If you have a disability and
need assistance with the application, you can request a reasonable
accommodation. Send an email to Accessibility (accommodation
requests only; other inquiries won't receive a response). Regular
or Temporary: Regular Language Fluency: English (Required) Work
Shift: 1st shift (United States of America) Please review the
following job description: The Cybersecurity Senior Engineer
(Attack Surface Management) is responsible for designing,
implementing, and maturing advanced security validation
capabilities to safeguard enterprise systems and applications. This
role focuses on continuous security validation through External
Attack Surface Management (EASM) tools, integration with existing
security infrastructure, and providing actionable insights to
strengthen the firm’s cyber resilience. The engineer partners with
cross-functional teams to simulate real-world adversarial tactics,
techniques, and procedures (TTPs), evaluate control effectiveness,
and recommend enhancements that align with enterprise risk
management and regulatory standards. Essential Duties and
Responsibilities Following is a summary of the essential functions
for this job. Other duties may be performed, both major and minor,
which are not mentioned below. Specific activities may change from
time to time. ? ? ? Lead EASM V alidation and E ngineering :
Investigate and reproduce findings from EASM platforms (e.g.,
exposed services, misconfigurations, weak crypto, DNS issues,
leaked assets) ? Perform Active/Passive Reconnaissance :
Familiarity with open-source techniques and tools for profiling
attack surface ? Advance EASM C apabilities : Develop tuning logic
for discovery seeds and asset correlation. Continuously improve
signal fidelity and automate common validation tasks ? Design and
Execute BAS Scenarios : Plan and conduct realistic cyberattack
simulations that mirror real-world threat actor TTPs across
enterprise environments. ? Analyze Simulation Results : Assess BAS
outcomes to identify security control gaps, vulnerabilities, and
opportunities for improved detection and response. ? Provide
Actionable Recommendations : Develop and communicate prioritized
recommendations to strengthen security policies, procedures, and
technical controls. ? Collaborate Across Teams : Work with red,
blue, and purple teams, as well as incident response and threat
intelligence groups, to adjust alerts, rules, and detection logic.
? Threat Hunting and Intelligence : Leverage threat intelligence to
inform EASM scenarios and proactively address emerging threats. ?
Vulnerability Management Support : Contribute to the
identification, prioritization, and remediation of vulnerabilities
based on simulation and testing results. ? Documentation and
Reporting : Maintain detailed documentation of ASM & BAS
methodologies, procedures, and findings; communicate technical
results clearly to both technical and non-technical stakeholders. ?
Continuous Integration/Continuous Deployment (CI/CD) : Design ,
develop and maintain CI/CD Pipeline(s) (e.g. , Gitlab, T erraform ,
AWS, Jenkins , Github ) ? Automation/Scripting : Design and Execute
automation scripts (e.g., Python, Powershell , Bash, etc.) ? ?
Qualifications Required Qualifications: The requirements listed
below are representative of the knowledge, skill and/or ability
required. Reasonable accommodations may be made to enable
individuals with disabilities to perform the essential functions.
Bachelor’s degree and five years of experience in systems
engineering or administration or an equivalent combination of
education and work experi ence ? ? In-depth knowledge in applied
enterprise information security technologies including but not
limited to firewalls, intrusion detection/prevention systems,
network operating systems, identity management, database activity
monitoring, encryption, content filtering, and Mainframe security ?
Previous experience in pl anning and managing IT projects ?
Preferred Qualifications: Experience with Breach and Attack (BAS)
or Continuous Security Validation (CSV) tool (s) Bachelor’s degree
and twelve years of experience or an equivalent combination of
education and work experience Banking or financial services
experience Experience in designing and executing Attack Scenarios:
Plan and conduct realistic cyberattack simulations that mimic
real-world threat actor tactics, techniques, and procedures (TTPs).
Analyze Simulation Results: Evaluate the outcomes of BAS,
identifying weaknesses in security controls, vulnerabilities, and
gaps in detection and response capabilities. Provide Actionable
Recommendations: Develop and present recommendations to improve
security policies, procedures, and technologies based on simulation
findings. Document and Communicate: Maintain documentation of BAS
methodologies, procedures, and results, and communicate findings to
technical and non-technical stakeholders. Collaborate with Security
Teams: Work with security analysts and engineers to adjust alerts,
rules, and controls based on simulation results. Advanced Threat
Hunting and Intelligence: Utilize threat intelligence to inform
attack scenarios and identify emerging threats. Vulnerability
Management: Identify , prioritize, and recommend remediation of
high-risk vulnerabilities. Red Teaming and Blue Teaming: May also
participate in red , purple, and blue team exercises to further
evaluate security posture. Strong understanding of cybersecurity
concepts, including attack vectors, TTPs, and security controls.
Hands-on experience with architecting, maturing, and automation -
CI/CD pipeline end to end lifecycle Experience with penetration
testing, vulnerability management, and security tools. Proficiency
in scripting for automation , data wrangling and enrichment (e.g.,
Python, PowerShell). Knowledge of common threat intelligence
sources and frameworks. Excellent analytical, problem-solving, and
communication skills. Ability to work independently and as part of
a team. Experience with cybersecurity frameworks and standards
(e.g., NIST, MITRE ATT& CK and D3FEND ). Experience with GRC
engineering Strong knowledge of cloud security (AWS/Azure), PKI/TLS
hygiene, DNS hardening, and external service posture. Hands-on
experience with EASM platforms (e.g., Defender EASM, Cortex Xpanse
, CyCognito , etc.) and strong understanding of internet-scale
asset discovery Hands-on experience with vulnerability engineering
or external attack surface security, with proven leadership in
complex environments E xperience with commercial BAS tools:
AttackIQ , Safe B reach , C ymulate , etc. Experience with
detection engineering and SOAR General Description of Available
Benefits for Eligible Employees of Truist Financial Corporation:
All regular teammates (not temporary or contingent workers) working
20 hours or more per week are eligible for benefits, though
eligibility for specific benefits may be determined by the division
of Truist offering the position. Truist offers medical, dental,
vision, life insurance, disability, accidental death and
dismemberment, tax-preferred savings accounts, and a 401k plan to
teammates. Teammates also receive no less than 10 days of vacation
(prorated based on date of hire and by full-time or part-time
status) during their first year of employment, along with 10 sick
days (also prorated), and paid holidays. For more details on
Truist’s generous benefit plans, please visit our Benefits site .
Depending on the position and division, this job may also be
eligible for Truist’s defined benefit pension plan, restricted
stock units, and/or a deferred compensation plan. As you advance
through the hiring process, you will also learn more about the
specific benefits available for any non-temporary position for
which you apply, based on full-time or part-time status, position,
and division of work. Truist is an Equal Opportunity Employer that
does not discriminate on the basis of race, gender, color,
religion, citizenship or national origin, age, sexual orientation,
gender identity, disability, veteran status, or other
classification protected by law. Truist is a Drug Free Workplace.
EEO is the Law E-Verify IER Right to Work
Keywords: Truist Bank, High Point , Cybersecurity Senior Engineer (ASM), IT / Software / Systems , Charlotte, North Carolina