Cyber Cloud Operations Engineering Specialist (Azure IAM Security)

Posted:
3/1/2026, 9:41:20 PM

Location(s):
Georgia, United States ⋅ Richmond, Virginia, United States ⋅ Virginia, United States ⋅ Charlotte, North Carolina, United States ⋅ North Carolina, United States ⋅ Semmes, Alabama, United States ⋅ Alabama, United States ⋅ Atlanta, Georgia, United States ⋅ Raleigh, North Carolina, United States

Experience Level(s):
Junior ⋅ Mid Level ⋅ Senior

Field(s):
IT & Security

Workplace Type:
Hybrid

The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.

Need Help?

If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).

Regular or Temporary:

Regular

Language Fluency:  English (Required)

Work Shift:

1st shift (United States of America)

Please review the following job description:

***
***For this opportunity, Truist will not sponsor an applicant for work visa status or employment authorization, nor will we offer any immigration-related support for this position (including, but not limited to H-1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN-1 or TN-2, E-3, O-1, or future sponsorship for U.S. lawful permanent residence status.)***


This role is 5 days a week in the Atlanta, Charlotte, Raleigh or Richmond VA office***

The Cyber Operations Engineering Specialist is an advanced, identity-focused role within the Cloud Security team.

This position is responsible for hunting, monitoring, triaging, and mitigating identity-based threats across Microsoft Entra ID (Azure AD), hybrid environments, and cloud infrastructure.

This role evaluates data from specialized security tools (e.g., Microsoft Sentinel, Microsoft Entra ID Protection, Defender for Identity,

Privileged Identity Management (PIM), and SOAR solutions) to analyze unauthorized access attempts, anomalous authentication behavior, and permission misuse in complex, often unstructured environments.

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job.  Other duties may be performed, both major and minor, which are not mentioned below.  Specific activities may change from time to time. 

  • Identify & Analyze Identity Threats: Characterize and analyze security alerts within Microsoft Entra ID (Azure AD), Identity Protection, and Privileged Identity Management (PIM) to understand and mitigate potential identity-based attacks.

  • Event Correlation & Context: Perform correlation of sign-in logs, audit logs, and risk events using Azure Sentinel (SIEM) and Microsoft Defender for Cloud to understand the full scope of a compromised identity.

  • Incident Response & Remediation: Act as an escalation point for high-severity identity incidents; take immediate action to revoke sessions, reset credentials, and block malicious IPs/users to contain threats.

  • Azure AD Governance & Policy: Configure, manage, and audit Conditional Access Policies (CAPs), MFA, and Azure RBAC to ensure compliance with Zero Trust principles.

  • Trend Analysis & Reporting: Perform quarterly reviews of user privileges, identity risk trends, and audit logs; provide reporting on the overall health of the identity security posture.

  • Identity Automation: Develop and improve automation workflows using Azure Logic Apps, PowerShell, and Azure CLI to automate user provisioning, deprovisioning, and incident remediation.

  • Runbook Improvement: Constantly improve SOC/IAM runbooks, focusing on reducing false positives in identity alerts and enhancing response playbooks for PIM escalations.

  • Recommendations & Governance: Provide strategic recommendations to management on enhancing IAM security, implementing Privileged Access Management (PAM), and closing identity security gaps

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required.  Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Bachelor’s degree in Computer Science, Computer Engineering, Cybersecurity, or related field of relevant education, certification, or related training.

  • Three years of experience in Cybersecurity or related work

  • Knowledge of one or more cloud platforms and cloud security

  • Knowledge of general information technology (IT) and cybersecurity

  • Knowledge of computer networking concepts and protocols, and network security methodologies.

  • Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).

  • Knowledge of operating systems, including Windows/Unix ports and services.

  • Knowledge of modern identity and access management concepts

  • Knowledge of phishing tactics and techniques

  • Knowledge of advanced cyber threats and vulnerabilities.

  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

  • Knowledge of incident response and handling methodologies.

  • Knowledge of threat hunting techniques

  • Knowledge of countermeasures to address a variety of threats

  • Knowledge around leveraging automation, ML, and/or AI

Preferred Qualifications:

  • Experience working in cloud environments, namely Microsoft Azure and Amazon AWS.

  • Industry certifications in general technology (e.g. Network+, AWS Certified Cloud Practitioner, Microsoft Azure Fundamentals, etc.)

  • Industry certifications in cyber security, such as Security+, CySA+, Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), Cisco Certified Network Associate (CCNA), GIAC Certified Intrusion Analyst (GCIA), GIAC Security Operations Certified (GSOC), GIAC Certified Incident Handler (GCIH), GIAC Cloud Security Essentials Certification (GCLD)

  • Experience in Security Operations Center (SOC), Network Operations Center (NOC), IT/Cyber Engineering, or  Intelligence Community (IC)

General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.

Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.

EEO is the Law    E-Verify IER Right to Work