Cybersecurity Manager - Head of Incident Response (SOC) - 3rd Shift

Truist Bank
Zebulon, NC Full Time
POSTED ON 5/23/2024 CLOSED ON 5/26/2024

Job Posting for Cybersecurity Manager - Head of Incident Response (SOC) - 3rd Shift at Truist Bank

Language Fluency: English (Required)


Work Shift:

3rd Shift - 15% Automatic Pay Differential (United States of America)

Job Grade:

112

Please review the following job description:

The SOC Manager (3rd Shift) ensures that the SOC team has proper processes, resources, and tools to timely detect, analyze and respond to security incidents. Sets and execute a clear strategy for a SOC that includes items such as log collection, detection approach, detection practices, and security incident practices. Establish a clear security incident process and protocol; ensuring that the team understand what needs to be done to handle uncertain security issues.

Serves as an escalation point and contact for security incidents, and a liaison between the other internal stakeholders. Establish a threat intelligence function leveraging tactical and strategic intelligence.

This role is on-site in Zebulon, NC and will participate in an on-call rotation with the following shift options:

3rd Shift, Monday to Friday 11pm to 7am
**3rd Shift Pay Differential: 15%***

ESSENTIAL DUTIES AND RESPONSIBILITIES

Following is a summary of the essential functions for this job.  Other duties may be performed, both major and minor, which are not mentioned below.  Specific activities may change from time to time. 

  • Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.

  • Lead efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.

  • Analyze information to determine, recommend, and plan the use of new information security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources.

  • Lead the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff.

  • Use sophisticated analytical thought through models, testing, and experience to exercise judgment and identify innovative solutions.

  • Responsible for technical support of information security technologies providing expert problem analysis and resolution in a timely manner.

  • Set the team's direction and communicates individual and team priorities and deliverables for the team against expected results.

  • Make leadership decisions within established policies, procedures, and established objectives.  

  • Leads complex and visible projects with moderate to high risk and complexity.

QUALIFICATIONS

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required.  Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. 

  • Bachelor’s degree and six to eight years of experience in systems engineering or administration or an equivalent combination of education and work experience. 
  • Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security. 
  • Previous experience in leading complex IT projects 

Preferred Qualifications:  

  • Seven (7) or more years of cybersecurity experience in a technical role 

  • Five (5) or more years’ working experience in a technology environment with exposure to information security principles.  

  • A bachelor’s degree in Information Security, Information Technology, Computer Science, Engineering, or similar field. 

  • Extensive working knowledge of common IT and security concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques, cyber incident response, malware analysis, computer forensics and the tools that support these processes.  

  • Display a working knowledge of at least one the following technologies: SIEM, EndPoint Detection & Response tools, and Digital forensic suites.  

  • Ability to solve complex problems by applying best practices. Demonstrated proficiency utilizing security platforms related to logging, event correlation, incident management, vulnerability management, and/or computer forensics.  

  • Demonstrated teamwork and collaboration skills.  

  • Strong time management skills and ability to manage competing priorities effectively. 

  • Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization. 

  • Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.  

  • Experience leading incidents as the primary technical voice 

  • Experience working with DDoS attacks and other network-based attack types  

  • Extensive working knowledge of Digital Forensics & Incident Response (DFIR) skills, including log, network, endpoint, memory, malware, reverse engineering, and root cause analysis. 

  • Although, not required, a background in software development and/or scripting is highly desirable. 

  • Three or more of the following (or similar) certifications: Security , Network , CySA , GSEC, CEH, CHFI, GCIA, GCIH, GCFE, GCFA, GCED, GREM, OSCP. 

  • Support a variety of tasks in support of the larger Cybersecurity Mission 

  • Demonstrate the ability to work as a self-starter and acquire new skills quickly 

  • Exemplify the characteristics of a great team player and overall positive mindset 

  • Ability to support an on-call and regular shift within a 24/7 operations environment. 

  • Ability to obtain requisite technical certification(s) within six months of hire. 

OTHER JOB REQUIREMENTS / WORKING CONDITIONS

Sitting

Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Availability

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.

Travel

Minimal and up to 10%

General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.

Incident Response Engineer - Remote / Telecommute
Cynet Systems -
Cary, NC
Sr. Security Analyst - Third Party Incident Response
Metlife -
Cary, NC
Lead Security Analyst - Continuous Monitoring and Incident Response
Metlife -
Cary, NC

Estimate Salary for Cybersecurity Manager - Head of Incident Response (SOC) - 3rd Shift in Zebulon, NC
$177,388 (Medium)
$156,037 (25th)
$198,739 (75th)
For Employer
Looking for Real-time Job Posting Salary Data?
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

Sign up to receive alerts about other jobs that are on the Cybersecurity Manager - Head of Incident Response (SOC) - 3rd Shift career path.

Click the checkbox next to the jobs that you are interested in.

Income Estimation: 
$160,697 - $204,674
Income Estimation: 
$189,668 - $252,984
Income Estimation: 
$160,697 - $204,674
Income Estimation: 
$189,668 - $252,984

Sign up to receive alerts about other jobs with skills like those required for the Cybersecurity Manager - Head of Incident Response (SOC) - 3rd Shift.

Click the checkbox next to the jobs that you are interested in.

  • Disaster Recovery Planning Skill

    • Income Estimation: $107,038 - $129,206
    • Income Estimation: $111,868 - $140,454
  • Cloud Security Skill

    • Income Estimation: $119,119 - $150,318
    • Income Estimation: $123,156 - $156,058
This job has expired.
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at Truist Bank

Truist Bank
Hired Organization Address Washington, DC Full Time
Language Fluency: English (Required) Work Shift: 1st shift (United States of America) Job Grade: 110 Please review the f...
Truist Bank
Hired Organization Address Washington, DC Full Time
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. Aft...
Truist Bank
Hired Organization Address Pickens, SC Full Time
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. Aft...
Truist Bank
Hired Organization Address Surfside, SC Full Time
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. Aft...

Not the job you're looking for? Here are some other Cybersecurity Manager - Head of Incident Response (SOC) - 3rd Shift jobs in the Zebulon, NC area that may be a better fit.

Incident Response Coordinator

Retail Talent, Raleigh, NC