Logo
Kansas Action for Children, Inc

Sr Engineer, Cybersecurity Threat Hunting

Kansas Action for Children, Inc, Topeka, Kansas, United States,


at T-Mobile USA, Inc. in Overland Park, Kansas, United StatesJob Description

Be unstoppable with us!T-Mobile is synonymous with innovation-and you could be part of the team that disrupted an entire industry! We reinvented customer service, brought real 5G to the nation, and now we're shaping the future of technology in wireless and beyond. Our work is as exciting as it is rewarding, so consider the career opportunity below as your invitation to grow with us, make big things happen with us, above all, #BEYOU with us. Together, we won't stop!Position Overview

The Sr Cybersecurity Engineer, Threat Hunting will identify previously unknown Cybersecurity threats and incidents faced by T-Mobile by hypothesis-based hunting. They will work closely with other Cybersecurity operations teams including incident response, detection engineering, vuln management, bug bounty, and threat intelligence. Additionally, the candidate must have some knowledge of system security design and network security standard processes. Analytical and organizational skills, and the ability to effectively communicate and work independently and as part of a team are required.Job Responsibilities

Identify previously unknown Cybersecurity incidents and threats by hypothesis-based huntingAssist with Incident Response as necessaryDevelop content to improve detective capabilities in Security Information and Event Management (SIEM) toolAnalyze disparate data sources for security incidentsA champion for process, recommending tool, software development, or infrastructure changes to improve or enhance securityLead small to medium sized projects as directedDevelop and deliver metrics as requestedParticipate in on call rotation that may involve non-traditional working hoursImprove process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies.Qualifications

Highly Desired

In-depth knowledge of security technologies such as, but not limited to:Telecommunication and mobile network technologies, specifically VoIP, SIP, IOS, Android, mobile device hardware, and 4G/5G security.Intrusion Detection systems (I.E. Checkpoint, McAfee, ISS, Snort, etc.)Security Information and Event Management (SIEM)Network Windows/Linux forensics techniquesVulnerability scanning tools (WebInspect, Nessus, etc.)In-depth knowledge of networking and OS technologies such as, but not limited to:Diagnostic tools such as packet capture/decode and WAN probesOperating Systems: Windows & UNIX - Solaris, HP/UX, or Linux operating systems administrationNetworking components including routers, hubs, switches, etc.TCP/IP protocolsOSI Seven Layer ModelEducation

Bachelor's Degree in Computer Science or Information Technology or equivalent work experienceSkills and Experience

4-7 years experience with threat hunting, incident response, or other relatable cybersecurity operations functionsStrong verbal and written communication skillsHigh-level network problem solving abilityAbility to plan, organize and prioritize tasks to complete independently and within time frame establishedKnowledge and experience with current cyber threats and landscape to Enterprise environments.In-depth knowledge of security standard processes in large-scale environmentsMedium to advanced knowledge of programming tools (Python/Java/Perl/Shell/HTML/PHP)Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNIFamiliarity with load balancers (ex - A10, F5), firewalls (ex - CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex - CyberArk), SIEM (ex - ArcSight), Log & Event (ex - Splunk), Intrusion IDS/IPS (ex - Symantec), Cloud Platform (ex - PCF, Docker), Scanning (ex - Qualys), AppSec (ex - Veracode)Strong verbal and communication skills with diverse multi-functional groups & the ability to communicate effectively to small & large groupsProven knowledge of current technological trends and developments in the area of info securityAbility to plan, organize and prioritize tasks to complete independentlyLicenses and Certifications Preferred

GCIH, GCFA, GCIA, CMON, GCDAEOE Statement

We Take Equal Opportunity Seriously - By ChoiceT-Mobile USA, Inc. is an Equal Opportunity Employer. All decisions concerning the employment relationship will be made without regard to age, race, color, religion, creed, sex, sexual orientation, gender identity or expression, national origin, marital status, veteran status, the presence of any physical or mental disability, or any other status or characteristic protected by federal, state, or local law. Discrimination or harassment based upon any of these factors is wholly inconsistent with our Company values and will not be tolerated. Furthermore, such discrimination or harassment may violate federal, state, or local law.

#J-18808-Ljbffr