Logo
GM Financial

Cybersecurity Engineer - Cloud

GM Financial, Dallas, Texas, United States, 75215


Opportunity to work in a hybrid model: Potential to work 4 days onsite and 1 day remoteWhy GM Financial?GM Financial is the wholly owned captive finance subsidiary of General Motors and is headquartered in Fort Worth, U.S. We are a global provider of auto finance solutions, with operations in North America, South America and the Asia Pacific region. Through our long-standing relationships with auto dealers, we offer attractive retail financing and lease programs to meet the needs of each customer. We also offer commercial lending products to dealers to help them finance and grow their businesses.At GM Financial, our team members define and shape our culture — an environment that welcomes new ideas, fosters integrity and creates a sense of community and belonging. Here we do more than work — we thrive.Our Purpose: We pioneer the innovations that move and connect people to what matters.Responsibilities

About the role:The Cybersecurity Engineer is responsible for developing, deploying, monitoring, tuning, evaluating, reporting, and maintaining systems and procedures; and to identify and mitigate threats to the corporate network, corporate assets and corporate users. This team member will identify core requirements, design and implement security technologies and work with stakeholders to perform ongoing tuning and alerting on those technologies. Security technologies may include but are not limited to: Data Loss Prevention (DLP), Security Incident Event Management (SIEM), User Behavior Analytics, Host Intrusion Prevention (HIPS) and Web/Email Gateway. This team member will be responsible for both technical implementation of systems and communication of security requirements to management and security leadership. Additionally, this team member will be responsible, as necessary, with assisting in investigations into security threats.Job Duties

Prepares technical requirements and standardsAssists in the identification, engineering and designing of security technologies including, but not limited to: Security Incident and Event Managers (SIEM) and threat intelligence solutions, Web filtering (proxy, network AV), Intrusion Detection and Prevention Systems (IDS/IPS), Endpoint security solutions, Data Loss Prevention (DLP), Vulnerability Management (VM), Threat Intelligence and Threat Detection, Web Application Firewalls (WAF), Email Gateways, Breach Mitigation, Certificate Management, SSL encryption and decryption, Identity Management, Cloud Security, Database Security, Web Gateways, VPNs and FirewallsPerforms analysis of system logs to identify unauthorized use or accessCreates, analyzes and communicates security metrics to leadershipParticipates in emergency response team activities for responding to various security incidentsProvides in-depth support for information security incidents including internal violations, hacker attacks, virus and system outagesPrepares and updates information procedures, standards and/or other technical requirement documentsParticipates in periodic information systems risk assessmentsDevelops detailed proposals and plans for new information security systems that would enhance or enable new capabilities for network or host systemsRecommends and evaluates security tools to identify more efficient and effective security measuresQualifications

What makes you a dream candidate?Local and wide area networking concepts, principles and protocolsAdvanced knowledge in Infrastructure design and managementWorking knowledge of management processes such as personnel administration, planning and budgetingStrong working knowledge of Intel platforms, iSeries and pSeries serversAdvanced understanding of IT Service Management (ITSM) best practices and processesExperience with UML Design ToolsAdvanced knowledge of TCP/IP, OSI model and subnettingHigh level understanding of technology infrastructure, security concepts and platformsDemonstrated success in project managementAdvanced knowledge of IBM pSeries hardware, operating systems and TSM backup infrastructureAdvanced knowledge of the OSI model and security that is associated with each layerUnderstanding of routing and switching protocols as they relate to load balancingStrong understanding of application layer protocols including HTTP, SSH, SSL and DNSKnowledge of the latest security and privacy legislation, regulations, advisories, alerts and vulnerabilitiesKnowledge of IT security processes and controls as well as IT infrastructure and networking technical knowledgeProven expertise developing custom rule sets for tools to identify specific attacks and exploits based on feedback and requirements from business stakeholders including Compliance and Legal CounselUnderstanding of cloud technologies and conceptsExperience securing cloud deployments on platforms like Microsoft Azure, Amazon Web Services, or Google Cloud PlatformExperience with deploying environments by defining infrastructure as code (IaC)Experience with securing container deployments, Kubernetes, managed Kubernetes PaaS services, Agile environments, and DevOps environmentsExperience with managing infrastructure through CI/CD pipelinesKnowledge of Linux operating systems and microservice architectureBackground in scripting and automation in widely used languages such as Python, Go, Ruby, etc.Detailed knowledge of declarative IaC approaches and immutable infrastructure is a plusFamiliarity with Terraform is a plusAdditional Skills

Ability to think strategically and make collaborative decisionsAbility to apply structured analysis methods to various types of data to establish trends, determine variability and business impactCommunicates quickly, clearly, concisely, appropriately and intelligentlyFoster open communication, speaks with impact, listens to others and writes effectivelyExperience with alternate management methods using SSH, serial connections and the command-line interface TMSHAbility to effectively negotiate with vendors on upgrades and acquisitionsEffective planning, time management, negotiation and delegation skillsExpert level IT security processes and controls knowledge as well as IT infrastructure and networking technical knowledgeAbility to approach problems with an open-mind and create new and innovative ideas and methodsAdvanced technical writingExperience in documentation tools such as Visio and Microsoft Office productsAdvanced information security standards/frameworks (ie, NIST Cybersecurity Framework, ISO 27001) skillsAdvanced experience with Network and VLAN segmentationAbility to approach problems with an open-mind, use existing information and resourcesCreative, Innovative, problem-solving and maximizing your potential to solve problems and improve methodsThink positively when faced with obstacles, build on others ideas, think logically and intuitivelyDetail oriented and strong analytical skillsExperience and Education

Minimum of 1 to 5 years of experience in large and complex business environments with a successful track record working directly with senior level management preferredMinimum of 1 year experience in one or more of the following domains: Cybersecurity, Information Security, Network Engineering, or Network Operations, Information Technology, Application Development preferredBachelor’s Degree in related field or equivalent work experience strongly preferredLicenses

Cybersecurity related certifications strongly preferredWhat We Offer:

Generous benefits package available on day one to include: 401K matching, bonding leave for new parents (12 weeks, 100% paid), tuition assistance, training, GM employee auto discount, community service pay and nine company holidays.Our Culture:

Our team members define and shape our culture — an environment that welcomes innovative ideas, fosters integrity, and creates a sense of community and belonging. Here we do more than work — we thrive.Compensation:

Competitive pay and bonus eligibilityWork Life Balance:

Flexible hybrid work environment, 4-days a week in office in Irving, Texas#LI-SC1

#J-18808-Ljbffr