T-MOBILE USA, Inc.
Sr Engineer, Cybersecurity Threat Hunting
T-MOBILE USA, Inc., Frisco, Texas, United States, 75034
At T-Mobile, we invest in YOU! Our Total Rewards Package ensures that employees get the same big love we give our customers. All team members receive a competitive base salary and compensation package - this is Total Rewards. Employees enjoy multiple wealth-building opportunities through our annual stock grant, employee stock purchase plan, 401(k), and access to free, year-round money coaches. That's how we're UNSTOPPABLE for our employees!
Job DescriptionThe Sr Cybersecurity Engineer, Threat Hunting will identify previously unknown Cybersecurity threats and incidents faced by T-Mobile by hypothesis-based hunting. They will work closely with other Cybersecurity operations teams including incident response, detection engineering, vuln management, bug bounty, and threat intelligence. Additionally, the candidate must have some knowledge of system security design and network security standard processes. Analytical and organizational skills, and the ability to effectively communicate and work independently and as part of a team are required.
Job Responsibilities
Identify previously unknown Cybersecurity incidents and threats by hypothesis-based hunting
Assist with Incident Response as necessary
Develop content to improve detective capabilities in Security Information and Event Management (SIEM) tool
Analyze disparate data sources for security incidents
A champion for process, recommending tool, software development, or infrastructure changes to improve or enhance security
Lead small to medium sized projects as directed
Develop and deliver metrics as requested
Participate in on call rotation that may involve non-traditional working hour
Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies.
QualificationsHighly Desired
In-depth knowledge of security technologies such as, but not limited to:
Telecommunication and mobile network technologies, specifically VoIP, SIP, IOS, Android, mobile device hardware, and 4G/5G security.
Intrusion Detection systems (I.E. Checkpoint, McAfee, ISS, Snort, etc.)
Security Information and Event Management (SIEM)
Network Windows/Linux forensics techniques
Vulnerability scanning tools (WebInspect, Nessus, etc.)
In-depth knowledge of networking and OS technologies such as, but not limited to:
Diagnostic tools such as packet capture/decode and WAN probes
Operating Systems: Windows & UNIX - Solaris, HP/UX, or Linux operating systems administration
Networking components including routers, hubs, switches, etc.
TCP/IP protocols
OSI Seven Layer Model
Education
Bachelor's Degree in Computer Science or Information Technology or equivalent work experience
Skills and Experience
4-7 years experience with threat hunting, incident response, or other relatable cybersecurity operations functions
Strong verbal and written communication skills
High-level network problem solving ability
Ability to plan, organize and prioritize tasks to complete independently and within time frame established
Knowledge and experience with current cyber threats and landscape to Enterprise environments.
In-depth knowledge of security standard processes in large-scale environments
Medium to advance knowledge of programming tools (Python/Java/Perl/Shell/HTML/PHP)
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
Familiarity with load balancers (ex - A10, F5), firewalls (ex - CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex - CyberArk), SIEM (ex - ArcSight), Log & Event (ex - Splunk), Intrusion IDS/IPS (ex - Symantec), Cloud Platform (ex - PCF, Docker), Scanning (ex - Qualys), AppSec (ex - Veracode)
Strong verbal and communication skills with diverse multi-functional groups & the ability to communicate effectively to small & large groups
Proven knowledge of current technological trends and developments in the area of info security
Ability to plan, organize and prioritize tasks to complete independently
Licenses and Certifications Preferred
GCIH, GCFA, GCIA, CMON, GCDA
Certified Information Systems Security Professional (CISSP) CISSP and/or CCSK and/or CCSP and/or CISA/CISM certification a plus
* At least 18 years of age* Legally authorized to work in the United States
TravelTravel Required: Yes
Base Pay Range$103,400 - $186,400. Corporate Bonus Target: 15%
The pay range above is the general base pay range for a successful candidate in the role. The successful candidate's actual pay will be based on various factors, such as work location, qualifications, and experience, so the actual starting pay will vary within this range.
At T-Mobile, our benefits exemplify the spirit of One Team, Together! A big part of how we care for one another is working to ensure our benefits evolve to meet the needs of our team members. Full and part-time employees have access to the same benefits when eligible. We cover all of the bases, offering medical, dental and vision insurance, a flexible spending account, 401(k), employee stock grants, employee stock purchase plan, paid time off and up to 12 paid holidays - which total about 4 weeks for new full-time employees and about 2.5 weeks for new part-time employees annually - paid parental and family leave, family building benefits, back-up care, enhanced family support, childcare subsidy, tuition assistance, college coaching, short- and long-term disability, voluntary AD&D coverage, voluntary accident coverage, voluntary life insurance, voluntary disability insurance, and voluntary long-term care insurance. We don't stop there - eligible employees can also receive mobile service & home internet discounts, pet insurance, and access to commuter and transit programs!
T-Mobile USA, Inc. is an Equal Opportunity Employer. All decisions concerning the employment relationship will be made without regard to age, race, ethnicity, color, religion, creed, sex, sexual orientation, gender identity or expression, national origin, religious affiliation, marital status, citizenship status, veteran status, the presence of any physical or mental disability, or any other status or characteristic protected by federal, state, or local law. Discrimination, retaliation or harassment based upon any of these factors is wholly inconsistent with how we do business and will not be tolerated.
#J-18808-Ljbffr
Job DescriptionThe Sr Cybersecurity Engineer, Threat Hunting will identify previously unknown Cybersecurity threats and incidents faced by T-Mobile by hypothesis-based hunting. They will work closely with other Cybersecurity operations teams including incident response, detection engineering, vuln management, bug bounty, and threat intelligence. Additionally, the candidate must have some knowledge of system security design and network security standard processes. Analytical and organizational skills, and the ability to effectively communicate and work independently and as part of a team are required.
Job Responsibilities
Identify previously unknown Cybersecurity incidents and threats by hypothesis-based hunting
Assist with Incident Response as necessary
Develop content to improve detective capabilities in Security Information and Event Management (SIEM) tool
Analyze disparate data sources for security incidents
A champion for process, recommending tool, software development, or infrastructure changes to improve or enhance security
Lead small to medium sized projects as directed
Develop and deliver metrics as requested
Participate in on call rotation that may involve non-traditional working hour
Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies.
QualificationsHighly Desired
In-depth knowledge of security technologies such as, but not limited to:
Telecommunication and mobile network technologies, specifically VoIP, SIP, IOS, Android, mobile device hardware, and 4G/5G security.
Intrusion Detection systems (I.E. Checkpoint, McAfee, ISS, Snort, etc.)
Security Information and Event Management (SIEM)
Network Windows/Linux forensics techniques
Vulnerability scanning tools (WebInspect, Nessus, etc.)
In-depth knowledge of networking and OS technologies such as, but not limited to:
Diagnostic tools such as packet capture/decode and WAN probes
Operating Systems: Windows & UNIX - Solaris, HP/UX, or Linux operating systems administration
Networking components including routers, hubs, switches, etc.
TCP/IP protocols
OSI Seven Layer Model
Education
Bachelor's Degree in Computer Science or Information Technology or equivalent work experience
Skills and Experience
4-7 years experience with threat hunting, incident response, or other relatable cybersecurity operations functions
Strong verbal and written communication skills
High-level network problem solving ability
Ability to plan, organize and prioritize tasks to complete independently and within time frame established
Knowledge and experience with current cyber threats and landscape to Enterprise environments.
In-depth knowledge of security standard processes in large-scale environments
Medium to advance knowledge of programming tools (Python/Java/Perl/Shell/HTML/PHP)
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
Familiarity with load balancers (ex - A10, F5), firewalls (ex - CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex - CyberArk), SIEM (ex - ArcSight), Log & Event (ex - Splunk), Intrusion IDS/IPS (ex - Symantec), Cloud Platform (ex - PCF, Docker), Scanning (ex - Qualys), AppSec (ex - Veracode)
Strong verbal and communication skills with diverse multi-functional groups & the ability to communicate effectively to small & large groups
Proven knowledge of current technological trends and developments in the area of info security
Ability to plan, organize and prioritize tasks to complete independently
Licenses and Certifications Preferred
GCIH, GCFA, GCIA, CMON, GCDA
Certified Information Systems Security Professional (CISSP) CISSP and/or CCSK and/or CCSP and/or CISA/CISM certification a plus
* At least 18 years of age* Legally authorized to work in the United States
TravelTravel Required: Yes
Base Pay Range$103,400 - $186,400. Corporate Bonus Target: 15%
The pay range above is the general base pay range for a successful candidate in the role. The successful candidate's actual pay will be based on various factors, such as work location, qualifications, and experience, so the actual starting pay will vary within this range.
At T-Mobile, our benefits exemplify the spirit of One Team, Together! A big part of how we care for one another is working to ensure our benefits evolve to meet the needs of our team members. Full and part-time employees have access to the same benefits when eligible. We cover all of the bases, offering medical, dental and vision insurance, a flexible spending account, 401(k), employee stock grants, employee stock purchase plan, paid time off and up to 12 paid holidays - which total about 4 weeks for new full-time employees and about 2.5 weeks for new part-time employees annually - paid parental and family leave, family building benefits, back-up care, enhanced family support, childcare subsidy, tuition assistance, college coaching, short- and long-term disability, voluntary AD&D coverage, voluntary accident coverage, voluntary life insurance, voluntary disability insurance, and voluntary long-term care insurance. We don't stop there - eligible employees can also receive mobile service & home internet discounts, pet insurance, and access to commuter and transit programs!
T-Mobile USA, Inc. is an Equal Opportunity Employer. All decisions concerning the employment relationship will be made without regard to age, race, ethnicity, color, religion, creed, sex, sexual orientation, gender identity or expression, national origin, religious affiliation, marital status, citizenship status, veteran status, the presence of any physical or mental disability, or any other status or characteristic protected by federal, state, or local law. Discrimination, retaliation or harassment based upon any of these factors is wholly inconsistent with how we do business and will not be tolerated.
#J-18808-Ljbffr