Truist Financial - Atlanta, GA
posted about 2 months ago
The position is responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding the firm's information systems and applications throughout the software development lifecycle (SDLC). This includes involvement in every phase of the SDLC and the software stack. The role requires assisting in the design, planning, testing, and implementation phases of cybersecurity technology projects. In this role, you will partner with senior business leaders to understand business strategies and work in cross-functional teams to drive successful strategic outcomes. You will lead the analysis of business and user needs, document requirements, measure performance, and interpret results for both internal and external stakeholders. Additionally, you will coordinate meetings between data engineers and user experience developers to ensure that the final deliverables meet client expectations both visually and in terms of documented requirements. Your responsibilities will also include measuring client interactions to improve client experience, digital adoption, and process outcomes. You will manage approval processes for requirements, proofs of concept (POCs), wireframes, and enhancements. Applying your subject-matter expertise, you will recommend actions to business leaders based on ongoing analysis of metrics in production to uphold data integrity and identify root causes of risk metrics that breach risk appetite thresholds. Furthermore, you will lead the operational development of sustainable data solutions that increase efficiency, reduce risk, and create competitive strategic advantages for Truist. This involves managing client intake requirements, ensuring end-user interfaces function as expected, and triaging issues to appropriate data intelligence teammates. You will also take a new perspective on existing solutions to solve complex problems and provide timely analysis and resolution of complex, difficult, or sensitive information. Lastly, you will participate in the analysis of information to recommend and plan the use of new technologies or modifications to existing systems that will enhance operational efficiency and effective resource use. You will lead small cybersecurity projects with manageable risks and resource requirements while playing significant roles in larger, more complex initiatives.