Cybersecurity Engineer (ASM)
Truist - Charlotte, NC
Apply NowJob Description
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status. Need Help? ( _If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to_ Accessibility (?subject=Accommodation request) _(accommodation requests only; other inquiries won't receive a response)._ Regular or Temporary: Regular Language Fluency: English (Required) Work Shift: 1st shift (United States of America) Please review the following job description: The Cybersecurity Engineer (Attack Surface Management) is responsible for designing, implementing, and maturing advanced security validation capabilities to safeguard enterprise systems and applications. This role focuses on continuous security validation through External Attack Surface Management (EASM) tools, integration with existing security infrastructure, and providing actionable insights to strengthen the firmu2019s cyber resilience. The engineer partners with cross-functional teams to simulate real-world adversarial tactics, techniques, and procedures (TTPs), evaluate control effectiveness, and recommend enhancements that align with enterprise risk management and regulatory standards. Essential Duties and Responsibilities Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. + u200bu200bu200b EASM V alidation and E ngineering : Investigate and reproduce findings from EASM platforms (e.g., exposed services, misconfigurations, weak crypto, DNS issues, leaked assets) + u200b Perform Active/Passive Reconnaissance : Familiarity withopen-sourcetechniques and tools for profiling attack surface + u200b Advance EASM C apabilities : Develop tuning logic fordiscoveryseeds and asset correlation. Continuously improve signal fidelity and automate common validation tasks + u200b Execute BAS Scenarios : Plan and conduct realistic cyberattack simulations that mirror real-world threat actor TTPs across enterprise environments. + u200b Analyze Simulation Results : Assess BAS outcomes toidentifysecurity control gaps, vulnerabilities, and opportunities for improved detection and response. + u200b Provide Actionable Recommendations : Develop and communicate prioritized recommendations to strengthen security policies, procedures, and technical controls. + u200b Collaborate Across Teams : Work with red, blue, and purple teams, as well as incident response and threat intelligence groups, to adjust alerts, rules, and detection logic. + u200b Threat Hunting and Intelligence : Leverage threat intelligence to informEASMscenarios and proactively address emerging threats. + u200b Vulnerability Management Support : Contribute to the identification, prioritization, and remediation of vulnerabilities based on simulation and testing results. + u200b Documentation and Reporting :Maintaindetailed documentation ofASM &BAS methodologies, procedures, and findings; communicate technical results clearly to both technical and non-technical stakeholders. + u200b Continuous Integration/Continuous Deployment (CI/CD) :Design,developandmaintainCI/CD Pipeline(s)(e.g.,Gitlab,Terraform, AWS,Jenkins,Github) + u200b Automation/Scripting :Design and Executeautomationscripts (e.g., Python,Powershell, Bash, etc.)u200bu200b Qualifications Required Qualifications: The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. + Bacheloru2019s degree andfiveyears of experience in systems engineering or administration or an equivalent combination of education and work experience + Knowledge inapplied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security + u200bPrevious experience in planning and managing IT projectsu200b Preferred Qualifications: + Experience with Breach and Attack (BAS) or Continuous Security Validation (CSV) tool(s) + Bacheloru2019s degree andfiveyears of experience or an equivalent combination ofeducation and work experience + Banking or financialservices experience + Experience indesigning and executing Attack Scenarios:Plan and conduct realistic cyberattack simulations that mimic real-world threat actor tactics, techniques, and procedures (TTPs). + Analyze Simulation Results:Evaluate the outcomes of BAS,identifyingweaknesses in security controls, vulnerabilities, and gaps in detection and response capabilities. + Provide Actionable Recommendations:Develop and present recommendations to improve security policies, procedures, and technologies based on simulation findings. + Document and Communicate:Maintaindocumentation of BAS methodologies, procedures, and results, and communicate findings to technical and non-technical stakeholders. + Collaborate with Security Teams:Work with security analysts and engineers to adjust alerts, rules, and controls based on simulation results. + AdvancedThreat Hunting and Intelligence:Utilizethreat intelligence to inform attack scenarios andidentifyemerging threats. + Vulnerability Management:Identify, prioritize, and recommendremediation ofhigh-risk vulnerabilities. + Red Teaming and Blue Teaming:May alsoparticipatein red, purple,and blue team exercises to further evaluate security posture. + Strong understanding of cybersecurity concepts, including attack vectors, TTPs, and security controls. + Hands-on experience witharchitecting, maturing, and automation -CI/CD pipeline end to end lifecycle + Experience with penetration testing, vulnerability management, and security tools. + Proficiencyin scriptingforautomation,datawranglingand enrichment(e.g., Python, PowerShell). + Knowledge of common threat intelligence sources and frameworks. + Excellent analytical, problem-solving, and communication skills. + Ability to work independently and as part of a team. + Experiencewith cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CKand D3FEND). + Experience withGRC engineering + Strong knowledge of cloud security (AWS/Azure), PKI/TLS hygiene, DNS hardening, and external service posture. + Hands-on experience with EASM platforms (e.g., Defender EASM, CortexXpanse,CyCognito, etc.) and strong understanding of internet-scale asset discovery + Hands-on experience withvulnerability engineering or external attack surface security, with proven leadership in complex environments + Experience withcommercial BAS tools:AttackIQ,SafeBreach,Cymulate, etc. + Experience with detection engineering and SOAR General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truistu2019s generous benefit plans, please visit our Benefits site ( . Depending on the position and division, this job may also be eligible for Truistu2019s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work. _Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace._ EEO is the Law ( E-Verify ( IER Right to Work (
Created: 2026-04-03