TRUIST FINANCIAL CORP. Cybersecurity Program Senior Strategist in Raleigh, NC

pin
pin

The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.

Need Help

If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).

Regular or Temporary:

Regular

Language Fluency: English (Required)

Work Shift:

1st shift (United States of America)

Please review the following job description:

Provides technical expertise and leadership to internal business clients for their Cybersecurity related projects and initiatives by working with Corporate Information Security Management, external vendors, and internal lines of business. Responsible for oversight and communication of the cybersecurity programs, which includes: providing strategic direction, financial oversight, and investment prioritization of new security controls/initiatives to address emerging threats; managing portfolio reporting and delivery of cybersecurity controls/capabilities to address risks in our environment.

ESSENTIAL DUTIES AND RESPONSIBILITIES

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

1. Collaborate with lines of business and internal IT groups in evaluating and gathering technical requirements for business clients’ projects and initiatives.

2. Research clients’ requirements to develop potential technical solutions by interacting with any internal and/or external solution providers and subject matter experts.

3. Communicate and document potential solutions, impact analysis, benefits/risks, implementation requirements, and recommended approach.

4. Oversee and conduct a variety of analysis to guide program strategy and develop short- and long-term plans.

5. Make recommendations regarding cybersecurity related projects and initiatives.

6. Consults with business leaders on the development of policies, processes and practices.

7. Remain aware of the corporate technology, infrastructure, standards, processes, and strategic direction and use these tools to help guide the client in accomplishing their business goals.

8. Maintains cybersecurity collaboration and knowledge platforms (Teams/SharePoint) and designs automation solutions (AI, Power Automate/Power Apps), including managing AI agents that analyze data and support

QUALIFICATIONS

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1. Bachelor’s degree preferably in regulatory affairs, business, organizational or compliance law, or financial services

2. Five years related experience performing legal, compliance, or other duties such as risk management and/or project management

3. Strong knowledge of cyber governance terms, disciplines and frameworks

Preferred Qualifications:

1. Knowledge of financial services industry and all applicable regulations and industry standards

2. Cyber security certifications such as CISA, CISSP

3. Banking or financial services experience

4. Experience designing and supporting workflow automations (e.g., Microsoft Power Automate and/or Power Apps).

5. Working knowledge of Microsoft 365 collaboration tools (Teams and SharePoint), including site/page maintenance and permissions-aware content management.

6. Ability to create, refine, and manage AI prompts in Microsoft Copilot or similar tools, with attention to quality, repeatability, and safe data handling.

7. Experience producing operational metrics, dashboards, or reports from security tooling and collaboration platforms.

8. Demonstrated ability to handle sensitive information with discretion and maintain confidentiality.

9. Hands-on experience with JSON (parsing, formatting, and working with structured data), plus scripting/automation with PowerShell.

10. Experience in event response, cyber/operational risk management, or control assurance; able to document risk statements, impact, and mitigations for stakeholders.

11. Experience with remediation tracking (corrective action plans/issues management) and using case management/GRC/workflow tools to drive issues to closure.

OTHER JOB REQUIREMENTS / WORKING CONDITIONS

Sitting

Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Availability

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.

Travel

Minimal and up to 10%

General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.

Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.

EEO is the Law E-Verify IER Right to Work

Provides technical expertise and leadership to internal business clients for their Cybersecurity related projects and initiatives by working with Corporate Information Security Management, external vendors, and internal lines of business. Responsible for oversight and communication of the cybersecurity programs, which includes: providing strategic direction, financial oversight, and investment prioritization of new security controls/initiatives to address emerging threats; managing portfolio reporting and delivery of cybersecurity controls/capabilities to address risks in our environment. ESSENTIAL DUTIES AND RESPONSIBILITIES - Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. 1. Collaborate with lines of business and internal IT groups in evaluating and gathering technical requirements for business clients’ projects and initiatives. 2. Research clients’ requirements to develop potential technical solutions by interacting with any internal and/or external solution providers and subject matter experts. 3. Communicate and document potential solutions, impact analysis, benefits/risks, implementation requirements, and recommended approach. 4. Oversee and conduct a variety of analysis to guide program strategy and develop short- and long-term plans. 5. Make recommendations regarding cybersecurity related projects and initiatives. 6. Consults with business leaders on the development of policies, processes and practices. 7. Remain aware of the corporate technology, infrastructure, standards, processes, and strategic direction and use these tools to help guide the client in accomplishing their business goals. 8. Maintains cybersecurity collaboration and knowledge platforms (Teams/ SharePoint) and designs automation solutions (AI, Power Automate/ Power Apps), including managing AI agents that analyze data and support QUALIFICATIONS - Required Qualifications:The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions .. Bachelor’s degree preferably in regulatory affairs, business, organizational or compliance law, or financial services 2. Five years related experience performing legal, compliance, or other duties such as risk management and/or project management 3. Strong knowledge of cyber governance terms, disciplines and frameworks. Preferred Qualifications:1. Knowledge of financial services industry and all applicable regulations and industry standards 2. Cyber security certifications such as CISA, CISSP 3. Banking or financial services experience 4. Experience designing and supporting workflow automations (e.g., Microsoft Power Automate and/or Power Apps). 5. Working knowledge of Microsoft 365 collaboration tools (Teams and SharePoint), including site/page maintenance and permissions-aware content management. 6. Ability to create, refine, and manage AI prompts in Microsoft Copilot or similar tools, with attention to quality, repeatability, and safe data handling. 7. Experience producing operational metrics, dashboards, or reports from security tooling and collaboration platforms. 8. Demonstrated ability to handle sensitive information with discretion and maintain confidentiality. 9. Hands-on experience with JSON (parsing, formatting, and working with structured data), plus scripting/automation with PowerShell. 10. Experience in event response, cyber/operational risk management, or control assurance; able to document risk statements, impact, and mitigations for stakeholders. 11. Experience with remediation tracking (corrective action plans/issues management) and using case management/ GRC/workflow tools to drive issues to closure. OTHER JOB REQUIREMENTS / WORKING CONDITIONS - Sitting. Constantly (More than 50% of the time)Visual / Audio / Speaking. Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone. Manual Dexterity / Keyboarding Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers. Availability. Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need. Travel. Minimal and up to 10%
search terms: Cybersecurity+Security
Expired
pin
pin
Local Job Bulletin is an independent Job Search Engine. Local Job Bulletin is not endorsed, sponsored or affiliated with the actual employer of the job. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder.
Upload your Resume - Let Employers find you!
pin
pin
 
 
Local Job Bulletin is an independent Job Search Engine. Local Job Bulletin is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Local Job Bulletin uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, job descriptions and other company descriptions / details are the property of their respective holder. Local Job Bulletin does not have its users apply for a job on the LocalJobBulletin.com website. Additionally, Local Job Bulletin may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.;
pin
pin