Sr Cybersecurity Engineer Job at GM Financial in Arlington
GM Financial, Arlington, TX, United States
Overview:
Opportunity to work in a hybrid model: Potential to work 4 days onsite and 1 day remote
Why GMF Cybersecurity?
Our Cybersecurity team is tasked with the security engineering, regulatory response, third party risk, and incident response capabilities necessary to secure GM Financial, the captive auto finance subsidiary of General Motors. Reporting directly to the CEO, our Cybersecurity team enjoys unprecedented support to deliver the highest level of security capabilities using cutting edge technologies and automating mundane tasks, allowing our teams to focus on interesting and rewarding security work. As a part of GM, youll have the opportunity to work on Cybersecurity projects across financial services, automotive, manufacturing, high-tech, and military industries. We are looking for team players who want the freedom to innovate leading edge capabilities to join our growing Cybersecurity team.
Responsibilities:About the role:
The Sr Cybersecurity Engineer is responsible for developing, deploying, monitoring, tuning, evaluating, reporting and maintaining systems and procedures to identify and mitigate threats to the corporate network, corporate assets and corporate users. This team member will identify core requirements, design and implement security technologies, and work with stakeholders to perform ongoing tuning and alerting on those technologies. Said technologies may include, but are not limited to: Data Loss Prevention (DLP), Security Incident Event Management (SIEM), User Behavior Analytics, Host Intrusion Prevention (HIPS) and Web/Email Gateway. This team member will be responsible for both technical implementation of systems and communication of security requirements to management and security leadership.
Qualifications:What makes you a dream candidate?
- Engineer, design, install and support security technologies such as Data Loss Prevention (DLP), Host Intrusion Prevention (HIPS), Security Incident and Event Managers (SIEM), Endpoint Security, Vulnerability Management (VM), Email user and entity behavior analytics, Certificate Management, SSL encryption and decryption, Identity Management, Cloud Security, Database Security, Web Gateways
- Identifying areas of security risk, implementing detection and/or prevention methods.
- Proactively identifies potential technologies to better secure enterprise information assets
- Ability to perform basic malware analysis and identify associated host behaviors.
- Using information from threat intelligence feeds, incident response and SIEM analysis, identifies and deploys custom rules and policies to security technologies to further protect information assets
- Works with cybersecurity management to develop and implement project plans to rapidly mature security initiatives
- Participation in emergency response team activities for responding to various security incidents
- Prepare and update information procedures, standards and/or other technical requirement documents
- Participate in periodic information systems risk assessments
- Develop detailed proposals and plans for new information security systems that would enhance or enable new capabilities for network or host systems
- Recommends and evaluates security tools to identify more efficient and effective security measures
- Advanced knowledge in Infrastructure design and management
- Working knowledge of management processes such as personnel administration, planning and budgeting
- Strong technical skills and hands on experience in information security as it relates to server security, client security, user security, network communications and data storage
- Strong knowledge of IT technologies and methods to secure them, specifically for databases, SharePoint, storage area networking, cloud-based storage, and data warehouses
- Advanced understanding of IT Service Management (ITSM) best practices and processes
- Experience with UML Design Tools
- Advanced knowledge of TCP/IP, OSI model and imp subnetting
- High level understanding of technology infrastructure, security concepts and platforms
- Demonstrated success in project management
- Advanced knowledge of the OSI model and security that is associated with each layer
- Understanding of routing and switching protocols as they relate to load balancing
- Strong understanding of application layer protocols including HTTP, SSH, SSL and DNS
- Knowledge and stay abreast on the latest security and privacy legislation, regulations, advisories, alerts and vulnerabilities
- Knowledge of IT security processes and controls as well as IT infrastructure and networking technical knowledge
- Possess strong understanding of cloud technologies and concepts
- Experience securing cloud deployments on common platforms like Microsoft Azure, Amazon Web Services, or Google Cloud Platform
- Experience with deploying environments by defining infrastructure as code (IaC)
- Experience with declarative IaC approaches and immutable infrastructure is a plus
- Experience with securing container deployments, Kubernetes, managed Kubernetes PaaS services, Agile environments, and DevOps environments
- Experience with managing infrastructure through CI/CD pipelines
- Knowledge of Linux operating systems and microservice architecture
- Knowledge of scripting and automation in widely used languages such as Python, Go, Ruby, etc
- Ability to think strategically and make collaborative decisions
- Ability to apply structured analysis methods to various types of data to establish trends, determine variability and business impact
- Communicates quickly, clearly, concisely, appropriately and intelligently
- Foster open communication, speaks with impact, listens to others and writes effectively
- Experience with alternate management methods using SSH, serial connections and the command-line interface TMSH
- Ability to approach problems with an open-mind and create new and innovative ideas and methods
- Experience in documentation tools such as Visio and Microsoft Office products
- Advanced information security standards/frameworks (ie, NIST Cybersecurity Framework, ISO 27001) skills
- Advanced experience with Network and VLAN segmentation
- Think positively when faced with obstacles, build on others ideas, think logically and intuitively
Experience:
- Bachelors Degree in related field or equivalent work experience strongly preferred
- 3-5 years of experience in data loss prevention, cybersecurity or network operations in an enterprise environment preferred
Licenses
- One or more security related certifications, such as CISSP, CCNP-Security, GIAC, CEH, CPTS, is highly preferred
What We Offer: Benefits effective day 1, 401K, Bonding leave for new parents (12 weeks, 100% paid), Pet insurance, training, certifications
Our Culture: Our team members define and shape our culture an environment that welcomes innovative ideas, fosters integrity, and creates a sense of community and belonging. Here we do more than work we thrive.
Compensation: Competitive pay
Work Life Balance: Flexible hybrid work environment
Benefits Package: Generous benefits package