Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.
Mobile Logo

Job Information

Truist CIAM- Phone Chanel Authentication Engineer in Charlotte, North Carolina

Req ID: R0071517

The position is described below. If you want to apply, click the Apply button at the top or bottom of this page. You'll be required to create an account or sign in to an existing one.

Need Help?

If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email toAccessibility(accommodation requests only; other inquiries won't receive a response).

Regular or Temporary:


Language Fluency: English (Required)

Work Shift:

1st shift (United States of America)

Please review the following job description:

The Truist Client Identity and Access Management Team is developing and implementing game changing capabilities for our client experience. We are laser focused on providing client centric solutions which reduce fraud, increase client satisfaction, and are best of class in the financial industry. This role is responsible for developing and maintaining the technical IT/cyber security capabilities within the phone channel necessary for safeguarding the firm's information systems and applications, enabling our clients’ secure access to systems and applications, and helping to define policies and procedures related to CIAM functions.


Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Ensure frictionless external client experience is incorporated into the program design and delivered across phone-channel applications (contact centers and IVRs).

  • Participate in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used in managing external client authentication.

  • Participate in the analysis of information to determine, recommend, and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources

  • Participate in the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff

  • Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.

  • Provide technical support of information security technologies, providing problem analysis and resolution in a timely manner and explain and interpret complex, difficult, or sensitive information.

  • Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives covering program design, testing, debugging and documentation.


Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.


  • Bachelor’s degree and five years of experience with Client Identity and Access Management solutions or an equivalent combination of education and work experience

  • In-depth knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security

  • Previous experience in planning and managing IT projects

Preferred Qualifications:

  1. CISSP, CISM, CISA or CRISC Certification

  2. Prior experience working with Phone/Voice authentication technologies

  3. Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate actions.

  4. Experience with security architecture related to protocols such as SAML, FIDO2, WebAuthN, SSH, SNMP, HTTP, SOAP, SOA, OAuth, XML, REST, WS-Security

  5. Agile methodology experience

  6. DevOps Pipeline deployment and Scrum team member experience

  7. Password-less MFA migration from legacy username and password

  8. IT GRC, Security Information management

  9. Financial IAM sector experience

  10. Lexis Nexis Threatmetrix experience

  11. Neustar Authenticator/Accountlink experience

  12. Nice Engage/RTA experience

Experience with cloud technologies, such as AWS in using AWS IAM, VPC, KMS, Secrets Manager services and AWS Certified Security Specialty

Other Job Requirements / Working Conditions

Sitting/Standing/Walking/Bending/Liftingþ Sitting(if checked, indicate frequency)

Constantly (More than 50% of the time)

☐ Standing(if checked, indicate frequency)

Choose an item.

☐ Walking(if checked, indicate frequency) Choose an item.

☐ Bending(if checked, indicate frequency) Choose an item.

☐ Lifting(if checked, indicate pounds)

Choose an item.

þ Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

þ Manual Dexterity / KeyboardingAble to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.þ AvailabilityAble to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.þ Travel(Must select one)Minimal and up to 10%

Other Job Requirements / Working Conditions


Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.


Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.


Minimal and up to 10%

Truist supports a diverse workforce and is an Equal Opportunity Employer that does not discriminate against individuals on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Truist is a Drug Free Workplace.

EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify

© 2017 SunTrust Banks, Inc. All rights reserved.

SunTrust is federally registered service marks of SunTrust Banks, Inc.