Sr Cybersecurity Engineer - Threat Management - GM Financial
Arlington, TX 76014
About the Job
Opportunity to work in a hybrid model: Potential to work 4 days onsite and 1 day remote
Why GMF Cybersecurity?
Our Cybersecurity team is tasked with the security engineering, regulatory response, third party risk, and incident response capabilities necessary to secure GM Financial, the captive auto finance subsidiary of General Motors. Reporting directly to the CEO, our Cybersecurity team enjoys unprecedented support to deliver the highest level of security capabilities using cutting edge technologies and automating mundane tasks, allowing our teams to focus on interesting and rewarding security work. As a part of GM, you’ll have the opportunity to work on Cybersecurity projects across financial services, automotive, manufacturing, high-tech, and military industries. We are looking for team players who want the freedom to innovate leading edge capabilities to join our growing Cybersecurity team.
Responsibilities:
About the role:
The Sr Cybersecurity Engineer is responsible for developing, deploying, monitoring, tuning, evaluating, reporting and maintaining systems and procedures to identify and mitigate threats to the corporate network, corporate assets and corporate users. This team member will identify core requirements, design and implement security technologies, and work with stakeholders to perform ongoing tuning and alerting on those technologies. Said technologies may include, but are not limited to: Data Loss Prevention (DLP), Security Incident Event Management (SIEM), User Behavior Analytics, Host Intrusion Prevention (HIPS) and Web/Email Gateway. This team member will be responsible for both technical implementation of systems and communication of security requirements to management and security leadership.
Qualifications:What makes you a dream candidate?
- Engineer, design, install and support security technologies such as Data Loss Prevention (DLP), Host Intrusion Prevention (HIPS), Security Incident and Event Managers (SIEM), Endpoint Security, Vulnerability Management (VM), Email user and entity behavior analytics, Certificate Management, SSL encryption and decryption, Identity Management, Cloud Security, Database Security, Web Gateways
- Identifying areas of security risk, implementing detection and/or prevention methods.
- Proactively identifies potential technologies to better secure enterprise information assets
- Ability to perform basic malware analysis and identify associated host behaviors.
- Using information from threat intelligence feeds, incident response and SIEM analysis, identifies and deploys custom rules and policies to security technologies to further protect information assets
- Works with cybersecurity management to develop and implement project plans to rapidly mature security initiatives
- Participation in emergency response team activities for responding to various security incidents
- Prepare and update information procedures, standards and/or other technical requirement documents
- Develop detailed proposals and plans for new information security systems that would enhance or enable new capabilities for network or host systems
- Recommends and evaluates security tools to identify more efficient and effective security measures
- Strong technical skills and hands on experience in information security as it relates to server security, client security, user security, network communications and data storage
- Strong knowledge of IT technologies and methods to secure them, specifically for databases, SharePoint, storage area networking, cloud-based storage, and data warehouses
- Advanced understanding of IT Service Management (ITSM) best practices and processes
- Experience with UML Design Tools
- Advanced knowledge of TCP/IP, OSI model and imp subnetting
- Strong understanding of application layer protocols including HTTP, SSH, SSL and DNS
- Experience securing cloud deployments on common platforms like Microsoft Azure, Amazon Web Services, or Google Cloud Platform
- Experience with deploying environments by defining infrastructure as code (IaC)
- Experience with declarative IaC approaches and immutable infrastructure is a plus
- Experience with securing container deployments, Kubernetes, managed Kubernetes PaaS services, Agile environments, and DevOps environments
- Experience with managing infrastructure through CI/CD pipelines
- Knowledge of Linux operating systems and microservice architecture
- Knowledge of scripting and automation in widely used languages such as Python, Go, Ruby, etc
- Experience with alternate management methods using SSH, serial connections and the command-line interface TMSH
- Advanced information security standards/frameworks (ie, NIST Cybersecurity Framework, ISO 27001) skills
- Advanced experience with Network and VLAN segmentation
- Think positively when faced with obstacles, build on others ideas, think logically and intuitively
Experience:
- Bachelor’s Degree in related field or equivalent work experience strongly preferred
- 3-5 years of experience in data loss prevention, cybersecurity or network operations in an enterprise environment preferred
Licenses
- One or more security related certifications, such as CISSP, CCNP-Security, GIAC, CEH, CPTS, is highly preferred
What We Offer: Benefits effective day 1, 401K, Bonding leave for new parents (12 weeks, 100% paid), Pet insurance, training, certifications
Our Culture: Our team members define and shape our culture — an environment that welcomes innovative ideas, fosters integrity, and creates a sense of community and belonging. Here we do more than work — we thrive.
Compensation: Competitive pay
Work Life Balance: Flexible hybrid work environment
Benefits Package: Generous benefits package
#LI-HH1
#LI-Hybrid