Senior Principal Cybersecurity Engineer job at GM Financial in Arlington, TX, Irving, TX

Remote Full-time
Title:Senior Principal Cybersecurity Engineer, Incident ResponseLocations: Arlington, TX, United States/ Irving, TX,Job type: HybridTime Type: Full TimeJob id: 494Job Category: TechnologyJob Description:Hybrid work environment: 4 days onsite and 1 day remoteWhy GM Financial Cybersecurity? Innovation isn't just a talking point at GM Financial, it's how we operate. By joining our team, you'll work in a mission-focused environment with specialized teams, including Engineering, Threat Intelligence, Vulnerability Management, Incident Response, Firewall, Governance, Risk, Architecture and Offensive Security.These teams collaborate to identify, manage and respond to threats, all while driving innovation across the environment. Cybersecurity is central to our strategic vision, so you'll benefit from exceptional leadership visibility, with direct reporting lines to the CEO. This structure ensures your work is recognized and supported at the highest levels, while also enabling bold innovation and the adoption of cutting-edge technologies. Shape the future of Cybersecurity at GM Financial, with the freedom to explore, the tools to build and the support to thrive.About theRole:GM Financial is seeking aSenior Principal Cybersecurity Engineer to join our Incident Response team! As a technical leader and subject matter expert for assigned business unit, theSenior Principal will be a key influencer in the achievement of strategic alignment and provide a positive impact on business value. TheSenior Principal will work with leaders in the business unit to identify initiatives with high impact which drive the business strategy forward. The person in this role is also expected to be an energetic, dynamic and innovative leader and influencer, acting as an avid promoter of process improvement to enhance productivity and performance of assigned business area.TheSenior Principal is an established and recognized figure both internally and externally. This person will represent GM Financial in the broader community and serve as a de-facto ambassador for the organization. It will be important for theSenior Principal to maintain a strong network in the community and represent GM Financial well. In this role, you will:Actively participate in incident investigations, covering detection, containment, eradication, recovery, and post-incident reviewsDevelop and enhance incident response tools, scripts, and frameworks to improve efficiency, accuracy, and scalability of detection, response and investigationsConduct and enhance memory/network/host/cloud forensics, malware reverse-engineering, and automated triageCreate customized tactical and strategic remediation plans related to alerts and incidents identified inside the GMF landscape as well as identified in the wildConvey analytical findings through finished technical reports post incidentIdentify and codify attacker TTPs and IOCs, feeding them into detection pipelines and IR playbooksGather and analyze cybersecurity data, technology tools and risk systems to identify security exposuresLead or participate in tabletop exercises, Purple Team sessions, and threat fencing simulationPerform analysis of various log sources, SIEM alerts, IDS/IPS alerts, host activity, and network traffic to identify suspicious or anomalous activityStay proactively ahead of the threat landscape-monitor zero-days, vulnerabilities, and advanced persistent threatsReporting Structure:This role reports to: VP Cybersecurity Strategy and OperationsWhat makes you a dream candidate?Experience with leading cross-functional and/or global initiatives from start to finishAdvanced knowledge of business acumen and a deep understanding of business implications of decisionsIn-depth understanding of company values, mission, vision and strategic directionComprehensive knowledge of GM Financial's business operationsRecognized as an expert across the business unitExperience building detection rules and associatedExperience with threat intelligence techniques and detection rules, and a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromiseStrong experience conducting or managing incident response investigations for organizations, investigating targeted threats such as theAdvanced Persistent Threat, Organized Crime, and HacktivistsStrong ability to independently develop and implement risk hunting methodologiesSkilled in network, endpoint, memory, disk, and cloud forensics-with documented lead roles in complex investigationsWorking knowledge of global cyber threats, threat actors, adversary tactics, techniques and proceduresExperience with TTPs, IOCs, and the MITRE ATT&CK and RE&ACT frameworkStrong understanding of cloud incident response on platforms like Azure or AWS including working knowledge of how to implement logging and monitoring within themConsistent experience on case management, following workflows, communicating incidents, and retrieving necessary dataVerifiably skilled in scripting to build or improve incident responseDemonstrated experience constructing and testing APIsExperienced in NIST incident response roles and capabilitiesAdvanced knowledge of TCP/IP networking, OSI model and IP subnettingAdvanced knowledge of bolthires/CD and Detection as CodeKnowledge of analysis tools like Bro/Zeek or Suricata, Splunk SPL and ability to perform analysis of associated network logsStrong understanding of secure network architecture and strong background in performing network operationsStrong technical understanding of application layer protocols including HTTP, SSH, SSL, and DNS and how they relate to cybersecurityTechnical knowledge of common network protocols and design patterns including TCP/IP/ HTTPS/ FTP, SFTP, SSH, RDP, CIFS/SMB, NFSAdvanced experience within Python, PowerShell, Bash, Jupyter and Anaconda, capable of writing modular code that can be installed on a remote systemDemonstrated capabilities in core data science principlesIn-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systemsUnderstanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logsProficient with Yara and writing rules to detect similar malware samplesKnowledgeable of current malware techniques to evade detection and obstruct analysisUnderstanding of the capabilities of static and dynamic malware analysis, and practical experience with static, dynamic, and automated malware analysis techniquesExperience writing malware reportsExperience with reverse engineering various file formats and analysis of complex malware samplesExperience:Bachelor's Degree or Associate Degree plus 2 years of relevant experience required12 years minimum experience in related functions5-7 years experience leading through mentorship in a related field5-7 years experience driving thought leadership and innovation across productsRelevant certifications or licenses preferredWhat We Offer: Generous benefits package available on day one to include: 401K matching, bonding leave for new parents (12 weeks, 100% paid), training, GM employee auto discount, community service pay and nine company holidays.Our Culture:Our team members define and shape our culture. We have an environment that welcomes new ideas, fosters integrity, and creates a sense of community and belonging. Here we do more than work - we thrive. Compensation: Competitive salary and bonus eligibility; this role is eligible for company vehicle programWork Life Balance: Flexible hybrid work environment, 4-days a week in office#LI-Hybrid Apply tot his job
Apply Now →
← Back to Home