Senior Cybersecurity Architect
Listed on 2026-03-05
-
IT/Tech
Cybersecurity, Systems Engineer
Position Overview
Truist is hiring a Principal and Senior Cybersecurity Architect responsible for defining and maintaining cyber security architecture and technology plans with a focus on researching emerging technology, best practices, and applicable regulatory/compliance requirements then applying them to enable business solutions. Ensure that security controls are reliable and supports business initiatives and future growth through coordination with the Truist architectural community, engineering teams, application delivery services, and other stakeholders.
Act as a lead subject matter expert on cyber capabilities, best practices, and security controls for your aligned applications and technology stacks. Initially, primary focus will be in Identity and Access Management and Cloud Security domains.
- Lead the planning, creation, and management of security architecture deliverables, including but not limited to requirements, solution designs, patterns, building blocks, target architectures, policies, standards, and guidance for all applicable platforms and environments to influence Truist Protection Services (TPS), Enterprise Technology, and line of business decision making.
- Act as thought leader in new technology innovation, incubation, introduction and implementation critical to the TPS roadmap and Truist’s success. Build roadmap for acquiring, integrating, and implementing high-value technology and processes. Oversee efforts (e.g. proof of concepts) to measure and prove new technology value.
- Lead development of system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standards.
- Create and maintain system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standards.
- Ensure that all acquired or developed security systems and security architectures integrate with enterprise security architecture.
- Establish strong relationships with key technology stakeholders and create convergence by demonstrating credibility, empathy and expertise on business and technical issues. Facilitate, communicate, collaborate, and persuade others in the definition, adoption and implementation of a coherent architecture.
- Evaluate existing or emerging technologies to consider factors such as cost, security, compatibility and usability and ensure security product life cycles are managed proactively.
- Demonstrate comprehensive experience and skill in Information Security (Info Sec) and cyber security technology and practices necessary to negotiate and persuade technology direction on security principals and tenets such as confidentiality, integrity, availability, authentication and non-repudiation.
- Perform security reviews, identify gaps in security architecture and develop security risk management plans.
- Bachelor’s degree in Business, Management, MIS-related field, or equivalent education and related training.
- Twelve years (For Principal) and Eight years (For Senior) of progressively responsible leadership experience in Information/Cyber Security.
- Highly and/or Comprehensive experience in network security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives, operational objectives and tradeoffs.
- Specialized and/or Thorough knowledge of The Open Group Architecture Framework (TOGAF), including infrastructure, data, information security, applications, architectural concepts, and associated disciplines.
- Deep to General Knowledge of:
- Mainframe security, including access control, monitoring, integration with non-mainframe technologies, and virtualization;
- Authentication and authorization technologies including remote access;
- Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments;
- Enterprise databases and database security, including database activity monitoring and database access control technologies;
- Encryption methods and technologies for data-in-transit and data-at-rest scenarios;
- Incident response processes;
- Denial of Service prevention mechanisms;
- Firewall technologies and intrusion prevention methods;
- Cloud technologies and hosting;
- Operating system hardening;
- Virtualization technologies;
- Mobile technologies;
- Encryption and key management technologies;
- Endpoint Protection (includes malware);
- Data Loss Protection technologies;
- Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of findings.
Preferred Qualifications & Experience
- Broad knowledge across a wide range security and technology domains, and deep…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).