
Vulnerability Management Technical Manager - Security Configuration Management
- Atlanta, GA
- Temporary
- Full-time
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
- Align with security configuration management priorities that define ‘our what’ that may change based on business need
- Consistently align with Truist Vision, Mission and Values and demonstrate ‘our how’ security configuration management works:
- Accountability: set expectations, hold teams accountable, check-in and provide feedback
- Remove ‘SCM Blinders’: take a Truist-wide approach to owning and resolving challenges
- Strengthen Team: coach-up, performance manage, develop, and reward top performers/visibility
- Management System: establish and cascade a predictable schedule for team engagement
- Continuous Improvement: consistently seeking ways to get better
- Manage a team of 5-10 direct report teammates and contract workers who oversee defined structured process tasks; may have oversight for complex, unstructured processes.
- Perform hiring, coaching, terminations, disciplinary action, and performance reviews to enable and maintain the strategy.
- Oversee operational and tactical plans in support of business objectives; develop departmental business cases to solve problems by making technical and financial tradeoffs.
- Apply a balance of 50% technical and 50% functional knowledge to deliver quality results.
- Design and implement the security configuration management control strategy on time and within budget:
- Formal Services Level Agreements (SLAs)
- Workforce strategy blend of ~30% onshore and ~70% offshore that is comprised of ~30% teammate, ~60% vendor managed service, and ~10% time and material contract workers
- Improve the user experience and reduce the turnover of critical resources
- Proactively engage with stakeholders to make them aware and willing to adopt our solutions, which includes managing up, out, and down to avoid surprises and position our solutions to be successful.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
- Bachelor’s degree or equivalent
- 10 years’ technical experience working in the identity and access management control function
- 10 years’ experience as a 1st line manager
- 10 yeas’ experience in tactical planning and execution 10 years managing simple and structured work
- 5 years managing complex and unstructured work
- 5 years’ experience leading diverse teams, such as teammates, contract workers, onshore, offshore resources, and/or managed services
- 5 years’ experience and expert-level technical knowledge of product knowledge and processes for specific IAM areas (e.g., Active directory, RACF, Idaptive, CyberArk, PRIVA, Oracle OIM, Persistent Ignite)
- 5 years’ experience and basic functional knowledge of tools and processes for the broader IAM capability
- 5 years’ experience and intermediate-level strength in soft skills and interpersonal communications
- 5 years’ technical experience working for a top 10 US bank
- 5 years’ experience collaborating with the following functions: a) infrastructure b) application development c) application support d) business unit risk management e) technology risk f) audit and g) external auditors
- 3 years’ experience collaborating with the following peer functions in corporate cyber security
- 3 years’ experience managing the remediation of regulatory matters and internal findings
- 2 years’ experience in strategic planning and applying industry best practices to operations (NIST, FFIEC)
- Understand multiple approaches to designing SCM technical solutions
- Experience in waterfall and agile project management methodologies
- Experience managing contracts for managed service providers
- CISSP Certification
- Familiarity/Experience with cloud-based vulnerability management, detection and response (VMDR) services/platforms/tools (ex. Qualys, Azure, AWS Cloud)