Raleigh, NC, 27608, USA
1 day ago
Cybersecurity Senior Architect - Application Threat Modeler
**The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.** Need Help? (https://www.brainshark.com/bbandt/careers-site-faq) _If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (careers@truist.com?subject=Accommodation%20request)_ _(accommodation requests only; other inquiries won't receive a response)._ **Regular or Temporary:** Regular **Language Fluency:** English (Required) **Work Shift:** 1st shift (United States of America) **Please review the following job description:** The Cybersecurity Sr. Architect conducts threat modeling activities utilizing the Process of Attack Simulation Threat Analysis (PASTA) methodology, to create an offensive security perspective for technology delivery teams with the goal of creating visibility and context to threats and vulnerabilities to applications and solutions. Analyze business requirements, while validating security specifications, and assess security solutions that support core organizational functions, and assure their confidentiality, integrity and high availability. Principally works, under limited supervision, with Corporate Information Security (CIS) personnel, Line of Business (LOB) personnel, external vendors, and internal IT Services personnel including Enterprise Architects, Application & Data Services personnel and other IT Operations Services teams. **Essential Duties and Responsibilities** The following is a summary of the essential functions for this job.  Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.  **Threat Modeling & Risk Identification** • Conduct structured threat modeling for applications, APIs, and services across the Technology Delivery Lifecycle (TDLC) • Identify potential threats, attack vectors, design flaws, and vulnerabilities that may impact delivery timelines, system security, or regulatory compliance • Assess risks to confidentiality, integrity, availability, and resiliency of business-critical systems **Integration into TDLC** • Embed security-by-design practices into each TDLC phase (requirements, design, build, test, deploy) • Collaborate with delivery teams to ensure security controls and mitigations are defined early and consistently implemented • Track and validate mitigation strategies throughout delivery cycles to ensure secure releases **Risk Communication & Reporting** • Document threat models, risk scenarios, and security design considerations in clear, actionable reports. • Deliver tailored risk communication to technical teams, product owners, and executive stakeholders • Provide risk ratings and recommendations to support informed go/no-go release decisions **Collaboration & Influence** • Partner with architects, engineers, product managers, and delivery leads to balance security and business objectives. • Act as a subject matter expert on secure application design, emerging attack vectors, and industry frameworks (e.g., STRIDE, PASTA, OWASP). • Mentor TDLC team members on threat modeling practices and proactive risk identification. **Continuous Improvement** • Refine threat modeling processes, frameworks, and automation for scalability across delivery portfolios. • Incorporate real-world threat intelligence, incident data, and vulnerability management findings into TDLC risk assessments. • Contribute to the creation of reusable playbooks, secure design patterns, and threat libraries for enterprise-wide adoption. **Qualifications** **Required Qualifications:** The requirements listed below are representative of the knowledge, skill and/or ability required.  Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. • Bachelor's degree in a technical or business field, or equivalent education and related training • Eight years of demonstrated experience of systems engineering and/or architecture in at least one of the information security areas:  network security, access management, end point protection, data loss prevention, vulnerability management, application security, forensics, web security, mainframe, incident response and/or cyber threat management in a medium to large corporation • Highly experienced in network security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives • Specialized depth and thorough Knowledge of The Open Group Architecture Framework (TOGAF), including infrastructure, data, information security, applications, architectural concepts, and associated disciplines **• Deep knowledge of:** o Mainframe security, including access control, monitoring, integration with non-mainframe technologies, and virtualization; o Authentication and authorization technologies including remote access; o Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments; o Enterprise databases and database security, including database activity monitoring and database access control technologies; o Encryption methods and technologies for data-in-transit and data-at-rest scenarios; o Incident response processes; o Denial of Service prevention mechanisms; o Firewall technologies and intrusion prevention methods; o Cloud technologies and hosting; o Operating system hardening; o Virtualization technologies; o Mobile technologies; o Encryption and key management technologies; o Endpoint Protection (includes malware); o Data Loss Protection technologies • Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of finding **Preferred Qualifications:** • Degree in a related field from an accredited program or equivalent experience • Industry certifications in cyber security and forensics, such as CISSP, CFCE, GCFE, GCFA, GCIH and other related credentials preferred • Industry certifications in general technology (MCP, MCSE, Network+, etc) • Industry certifications in networking, such as CCNA, CWNA, and cloud security (AWS & Azure) • Experience producing threat models utilizing PASTA • Experience using ServiceNow, Veracode, Whitehat, Qualys, Splunk, and Attack IQ **Other Job Requirements / Working Conditions** **Sitting** Constantly (More than 50% of the time) **Visual / Audio / Speaking** Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone. **Manual Dexterity / Keyboarding** Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers. **Availability** Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need. **Travel** Minimal and up to 10% **General Description of Available Benefits for Eligible Employees of Truist Financial Corporation:** All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site (https://benefits.truist.com/) . Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work. **_Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace._** EEO is the Law (https://www.eeoc.gov/sites/default/files/2022-10/EEOC\_KnowYourRights\_screen\_reader\_10\_20.pdf) Pay Transparency Nondiscrimination Provision (https://www.dol.gov/sites/dolgov/files/OFCCP/pdf/pay-transp\_%20English\_formattedESQA508c.pdf) E-Verify (https://e-verify.uscis.gov/web/media/resourcesContents/E-Verify\_Participation\_Poster\_ES.pdf)
Por favor confirme su dirección de correo electrónico: Send Email