Job Description
About the Role
Title: Sr Cybersecurity Engineer
Location:
Arlington, Texas
Hybrid (Remote/On Site)
Job Description:
Job Description
Overview
Opportunity to work in a hybrid model: Potential to work 4 days onsite and 1 day remote
Why GMF Cybersecurity?
Our Cybersecurity team is tasked with the security engineering, regulatory response, third party risk, and incident response capabilities necessary to secure GM Financial, the captive auto finance subsidiary of General Motors. Reporting directly to the CEO, our Cybersecurity team enjoys unprecedented support to deliver the highest level of security capabilities using cutting edge technologies and automating mundane tasks, allowing our teams to focus on interesting and rewarding security work. As a part of GM, you’ll have the opportunity to work on Cybersecurity projects across financial services, automotive, manufacturing, high-tech, and military industries. We are looking for team players who want the freedom to innovate leading edge capabilities to join our growing Cybersecurity team.
Responsibilities
About the role:
The Sr Cybersecurity Engineer is responsible for developing, deploying, monitoring, tuning, evaluating, reporting and maintaining systems and procedures to identify and mitigate threats to the corporate network, corporate assets and corporate users. This team member will identify core requirements, design and implement security technologies, and work with stakeholders to perform ongoing tuning and alerting on those technologies. Said technologies may include, but are not limited to: Data Loss Prevention (DLP), Security Incident Event Management (SIEM), User Behavior Analytics, Host Intrusion Prevention (HIPS) and Web/Email Gateway. This team member will be responsible for both technical implementation of systems and communication of security requirements to management and security leadership.
Qualifications
What makes you a dream candidate?
Engineer, design, install and support security technologies such as Data Loss Prevention (DLP), Host Intrusion Prevention (HIPS), Security Incident and Event Managers (SIEM), Endpoint Security, Vulnerability Management (VM), Email user and entity behavior analytics, Certificate Management, SSL encryption and decryption, Identity Management, Cloud Security, Database Security, Web Gateways
Identifying areas of security risk, implementing detection and/or prevention methods.
Proactively identifies potential technologies to better secure enterprise information assets
Ability to perform basic malware analysis and identify associated host behaviors.
Using information from threat intelligence feeds, incident response and SIEM analysis, identifies and deploys custom rules and policies to security technologies to further protect information assets
Works with cybersecurity management to develop and implement project plans to rapidly mature security initiatives
Participation in emergency response team activities for responding to various security incidents
Prepare and update information procedures, standards and/or other technical requirement documents
Participate in periodic information systems risk assessments
Develop detailed proposals and plans for new information security systems that would enhance or enable new capabilities for network or host systems
Recommends and evaluates security tools to identify more efficient and effective security measures
Advanced knowledge in Infrastructure design and management
Working knowledge of management processes such as personnel administration, planning and budgeting
Strong technical skills and hands on experience in information security as it relates to server security, client security, user security, network communications and data storage
Strong knowledge of IT technologies and methods to secure them, specifically for databases, SharePoint, storage area networking, cloud-based storage, and data warehouses
Advanced understanding of IT Service Management (ITSM) best practices and processes
Experience with UML Design Tools
Advanced knowledge of TCP/IP, OSI model and imp subnetting
High level understanding of technology infrastructure, security concepts and platforms
Demonstrated success in project management
Advanced knowledge of the OSI model and security that is associated with each layer
Understanding of routing and switching protocols as they relate to load balancing
Strong understanding of application layer protocols including HTTP, SSH, SSL and DNS
Knowledge and stay abreast on the latest security and privacy legislation, regulations, advisories, alerts and vulnerabilities
Knowledge of IT security processes and controls as well as IT infrastructure and networking technical knowledge
Possess strong understanding of cloud technologies and concepts
Experience securing cloud deployments on common platforms like Microsoft Azure, Amazon Web Services, or Google Cloud Platform
Experience with deploying environments by defining infrastructure as code (IaC)
Experience with declarative IaC approaches and immutable infrastructure is a plus
Experience with securing container deployments, Kubernetes, managed Kubernetes PaaS services, Agile environments, and DevOps environments
Experience with managing infrastructure through CI/CD pipelines
Knowledge of Linux operating systems and microservice architecture
Knowledge of scripting and automation in widely used languages such as Python, Go, Ruby, etc
Ability to think strategically and make collaborative decisions
Ability to apply structured analysis methods to various types of data to establish trends, determine variability and business impact
Communicates quickly, clearly, concisely, appropriately and intelligently
Foster open communication, speaks with impact, listens to others and writes effectively
Experience with alternate management methods using SSH, serial connections and the command-line interface TMSH
Ability to approach problems with an open-mind and create new and innovative ideas and methods
Experience in documentation tools such as Visio and Microsoft Office products
Advanced information security standards/frameworks (ie, NIST Cybersecurity Framework, ISO 27001) skills
Advanced experience with Network and VLAN segmentation
Think positively when faced with obstacles, build on others ideas, think logically and intuitively
Experience:
Bachelor’s Degree in related field or equivalent work experience strongly preferred
3-5 years of experience in data loss prevention, cybersecurity or network operations in an enterprise environment preferred
Licenses
One or more security related certifications, such as CISSP, CCNP-Security, GIAC, CEH, CPTS, is highly preferred
What We Offer: Benefits effective day 1, 401K, Bonding leave for new parents (12 weeks, 100% paid), Pet insurance, training, certifications
Our Culture: Our team members define and shape our culture â an environment that welcomes innovative ideas, fosters integrity, and creates a sense of community and belonging. Here we do more than work â we thrive.
Compensation: Competitive pay
Work Life Balance: Flexible hybrid work environment
Benefits Package: Generous benefits package
GM Financial is an Equal Opportunity Employer and is committed to diversity and inclusion at every level of our organization. We do not discriminate against any applicant or employee based on race, color, age, gender, national origin, religion, sexual orientation, gender identity, veteran status, disability or any other federal, state or local protected class.