Cyber Security Master

North Dallas Campus, United States

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

Texas Capital

Bank boldly with Texas Capital.

View all jobs at Texas Capital

Apply now Apply later

 

Texas Capital is built to help businesses and their leaders. Our depth of knowledge and expertise allows us to bring the best of the big firms at a scale that works for our clients, with highly experienced bankers who truly invest in people’s success — today and tomorrow.  

  

While we are rooted in core financial products, we are differentiated by our approach. Our bankers are seasoned financial experts who possess deep experience across a multitude of industries. Equally important, they bring commitment — investing the time and resources to understand our clients’ immediate needs, identify market opportunities and meet long-term objectives. At Texas Capital, we do more than build business success. We build long-lasting relationships. 

 

Texas Capital provides a variety of benefits to colleagues, including health insurance coverage, wellness program, fertility and family building aids, life and disability insurance, retirement savings plans with a generous 401K match, paid leave programs, paid holidays, and paid time off (PTO). 

 

Headquartered in Dallas with offices in Austin, Fort Worth, Houston, Richardson, Plano and San Antonio, Texas Capital was recently named Best Regional Bank in 2024 by Bankrate and was named to The Dallas Morning News’ Dallas-Fort Worth metroplex Top Workplaces 2023 and GoBankingRate’s 2023 list of Best Regional Banks. For more information about joining our team, please visit us at www.texascapitalbank.com

 

Responsibilities

  • Proficient understanding of various regulatory and compliance assessments including, FFIEC, PCI, HIPPA, GDPR, SWIFT and CISA.
  • Ability to use different vulnerability platforms to Identification and assessment of On-prem and cloud vulnerabilities.
  • Review and challenge on remediation efforts.
  • Reporting weekly | monthly| quarterly past due vulnerabilities and any escalations.
  • Oversight and adherence of the Operational Risk Framework, Methodology, Information and Data Governance.
  • Contribute to the development, implementation, and maintenance of the Information Risk program strategy, framework, plan, policies, standards, processes, and procedures within the bank.
  • Oversight of compliance with Information Technology and Information Security policies, programs and standards including exception management.
  • Conducting ongoing monitoring of Information, Technology, and Cyber Security risks leveraging the outputs of the Information Technology and Cyber Security programs, and other information, e.g., key risk metrics, risk appetite metrics (RAS), risk events, and issues.
  • Responsible for identifying, prioritizing, monitoring, and reporting information, technology and cyber risks and controls, including conducting risk and control targeted assessments.
  • Supporting internal and external audits and regulatory exams.


The duties listed above are the essential functions, or fundamental duties within the job classification. The essential functions of individual positions within the classification may differ. Texas Capital Bank may assign related additional duties to individual employees consistent with standard departmental policy.

Qualifications:

  • Bachelor's degree in information security, Information Technology, Computer Science, Engineering, or related field.
  • Minimum 8 years of experience in an appropriate domain.
  • Proficient understanding of the external threat landscape and adversary tactics & techniques.
  • Proficient knowledge in network based and agent-based vulnerability scanning software.
  • Proficient technical understanding of Cloud Vulnerabilities/"GCP" within CVSS, OWASP Top 10, SANS top 25, and Vulnerability Exploitability ratings.
  • Proficient programming knowledge and the ability to code exploits in at least one language, including but not limited to Ruby, Python, PowerShell, or BASH.
  • Proficient knowledge and understanding in various disciplines such as security engineering, system and network security, authentication and security protocols, cryptography, and application security.
  • Proficient understanding of all phases of adversary emulation operations including reconnaissance, social engineering, exploitation, post-exploitation, covert techniques, lateral movement, and data exfiltration.
  • Proficient knowledge with cloud service providers and offerings.
  • Proficient understanding of vulnerabilities, common attack vectors and ability to translate the attacker mindset.
  • Proficient ability to think about creative threats and attack vectors.
  • Proficient documentation capabilities.
  • Proficient ability to communicate results to both technical and business audiences.
  • Proficient analytical mindset, focused on results with critical thinking, research and problem-solving, and decision-making skills.
  • Proficient ability to implement and communicate actionable insights to streamline processes/transactions.
  • Highly self-motivated with a strong sense of initiative.
  • Strong ability to manage competing priorities on concurrent large, complex projects, initiatives, and deliverables.
  • Strong ability to interact, communicate, and present to executive management and potential audit and regulatory bodies.
  • Strong verbal, written, and interpersonal communication skills.

Additional Requirements/Skills:

Preferred Certifications (one or more) – CISSP (ISC2), CISM (ISACA), GIAC (SANS) CRM, CISA (ISACA), CRISC (ISACA), AWS or Azure Cloud Certification

A good working or background knowledge for majority of areas listed is preferred: Networking, server and storage infrastructure, cloud computing (SaaS, PaaS, IaaS), cloud security, application security, risk assessment, vulnerability assessment, enterprise architecture, risk management, operating systems, and data security.

The duties listed above are the essential functions, or fundamental duties within the job classification.  The essential functions of individual positions within the classification may differ. Texas Capital Bank may assign reasonably related additional duties to individual employees consistent with standard departmental policy.Texas Capital is an Equal Opportunity Employer. 

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Application security Audits AWS Azure Bash CISA CISM CISSP Cloud Compliance Computer Science CRISC Cryptography CVSS Exploits FFIEC GCP GDPR GIAC Governance IaaS ISACA Monitoring Network security OWASP PaaS PowerShell Python Risk assessment Risk management Ruby SaaS SANS Strategy Vulnerabilities

Perks/benefits: 401(k) matching Fertility benefits Flex vacation Health care Insurance Team events Wellness

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.