Skip to main contentA logo with &quat;the muse&quat; in dark blue text.

Distinguished Principal Cybersecurity Engineer, Incident Response

AT GM Financial
GM Financial

Distinguished Principal Cybersecurity Engineer, Incident Response

Arlington, TX

JOB DESCRIPTION

Hybrid work environment; 4 days onsite and 1 day remote

Why GM Financial Cybersecurity?

The GMF Cybersecurity team is tasked with the security engineering, regulatory response, third party risk, and incident response capabilities necessary to secure GM Financial, the captive auto finance subsidiary of General Motors. Reporting directly to the CEO, our Cybersecurity team enjoys unprecedented support to deliver the highest level of security capabilities using cutting edge technologies and automating mundane tasks, allowing our teams to focus on interesting and rewarding security work. As a part of GM, you'll have the opportunity to work on Cybersecurity projects across financial services, automotive, manufacturing, high-tech, and military industries. We are looking for team players who want the freedom to innovate leading edge capabilities to join our growing Cybersecurity team.

Want more jobs like this?

Get jobs in Arlington, TX delivered to your inbox every week.

By signing up, you agree to our Terms of Service & Privacy Policy.


RESPONSIBILITIES

About the Role:

GM Financial is hiring a Distinguished Principal Cybersecuirty Engineer to join our Incident Response team! The Distinguished Principal is recognized organization wide as a master and supreme subject matter expert in specific discipline and will be a key influencer in the achievement of strategic alignment and direction. The Distinguished Principal will work with senior leaders across the business to identify initiatives with high impact which drive the organization forward. The person in this role is also expected to be an energetic, dynamic and innovative leader and influencer, acting as an avid promoter of process improvement to enhance productivity and performance of the organization. The Distinguished Principal is a high-level technical individual contributor recognized as an expert both internally and externally. This person will represent GM Financial in the broader community and serve as a de-facto ambassador for the organization. It will be important for the Distinguished Principal to maintain a strong network in the community and represent GM Financial well.

In this role, you will:

  • Lead full incident investigations, covering detection, containment, eradication, recovery, and post-incident reviews
  • Develop and enhance incident response tools, scripts, and frameworks to improve efficiency, accuracy, and scalability of detection, response and investigations
  • Conduct and enhance memory/network/host/cloud forensics, malware reverse-engineering, and automated triage
  • Deliver technical reports post incident-clear, and contextual
  • Identify and codify attacker TTPs and IOCs, feeding them into detection pipelines and IR playbooks
  • Drive cross-functional solutions, anticipating and addressing exposures
  • Lead or participate in tabletop exercises, Purple Team sessions, and threat fencing simulation
  • Perform analysis of various log sources, SIEM alerts, IDS/IPS alerts, host activity, and network traffic to identify suspicious or anomalous activity
  • Stay ahead of the threat landscape-monitor zero-days, vulnerabilities, and advanced persistent threats

Reporting Structure:

  • This role reports to: VP Cybersecurity Strategy and Operations


QUALIFICATIONS

What makes you a dream candidate?

  • Has extensive history of distinguished work and thought leadership achievements including experience leading cross-functional and/or global initiatives
  • Expert-level knowledge of business acumen and a deep understanding of business implications of decisions
  • Complete understanding of company values, mission, vision, strategic direction and business operations
  • Recognized organization-wide as a master in discipline
  • Significant experience with building detection rules and associated playbooks
  • Consistent application of threat intelligence techniques and detection rules, and a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise
  • Extensive experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threats, Organized Crime, and Hacktivists
  • Distinguished ability to independently develop and implement risk hunting methodologies
  • Extensive expertise in network, endpoint, memory, disk, and cloud forensics-with documented lead roles in complex investigations
  • Demonstrated knowledge of global cyber threats, threat actors, adversary tactics, techniques and procedures
  • Deep familiarity with TTPs, IOCs, and the MITRE ATT&CK and RE&ACT framework
  • Strong understanding of cloud incident response on platforms like Azure or AWS including implementing logging and monitoring within them
  • Demonstrated expertise on case management, following workflows, communicating incidents, and independently retrieving necessary data
  • Extremely skilled in scripting to build or improve incident response
  • Expertise in constructing and testing APIs
  • Advanced knowledge of NIST incident response roles and capabilities
  • Advanced knowledge of TCP/IP, OSI model and IP subnetting
  • Advanced knowledge of CI/CD and Detection as Code
  • Demonstrated knowledge of analysis tools like Bro/Zeek or Suricata, Splunk SPL and ability to perform analysis of associated network logs
  • Strong understanding of secure network architecture and strong background in performing network operations
  • Strong technical understanding of application layer protocols including HTTP, SSH, SSL, and DNS and how they relate to cybersecurity
  • Technical knowledge of common network protocols and design patterns including TCP/IP/ HTTPS/ FTP, SFTP, SSH, RDP, CIFS/SMB, NFS
  • Extensive experience in Python, PowerShell, Bash, Jupyter and Anaconda, with advanced capabilities of writing modular code that can be installed on a remote system
  • Distinguished capabilities in core data science principles
  • In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems
  • Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs
  • Proficient with Yara and writing rules to detect similar malware samples
  • Knowledgeable of current malware techniques to evade detection and obstruct analysis
  • Understanding of the capabilities of static and dynamic malware analysis, and practical experience with static, dynamic, and automated malware analysis techniques
  • Experience writing malware reports
  • Experience with reverse engineering various file formats and analysis of complex malware samples

Experience:

  • Master's Degree or Bachelor's Degree plus 2 additional years of related experience required
  • 14 years minimum experience in related functions required
  • 7-10 years experience leading through mentorship in related field required
  • 7-10 years experience driving thought leadership and innovation across products required
  • Advanced certifications and/or licenses preferred
  • Member of accredited association in related field preferred

What We Offer: Generous benefits package available on day one to include: 401K matching, bonding leave for new parents (12 weeks, 100% paid), training, GM employee auto discount, community service pay and nine company holidays.

Our Culture: Our team members define and shape our culture. We have an environment that welcomes new ideas, fosters integrity, and creates a sense of community and belonging. Here we do more than work - we thrive.

Compensation: Competitive salary and bonus eligibility; this role is eligible for company vehicle program

Work Life Balance: Flexible hybrid work environment, 4-days a week in office

I-JI1

#LI-Hybrid

#GMFjobs

Client-provided location(s): Arlington, TX, USA
Job ID: GM_Financial-495
Employment Type: Full Time

Perks and Benefits

  • Health and Wellness

    • Health Insurance
    • Dental Insurance
    • Vision Insurance
    • Life Insurance
    • Short-Term Disability
    • Long-Term Disability
    • FSA
    • FSA With Employer Contribution
    • HSA
    • HSA With Employer Contribution
    • Mental Health Benefits
    • Fitness Subsidies
  • Parental Benefits

    • Birth Parent or Maternity Leave
    • Non-Birth Parent or Paternity Leave
    • Adoption Leave
  • Work Flexibility

    • Remote Work Opportunities
    • Hybrid Work Opportunities
  • Office Life and Perks

    • Happy Hours
    • Company Outings
    • On-Site Cafeteria
    • Holiday Events
  • Vacation and Time Off

    • Paid Vacation
    • Paid Holidays
    • Personal/Sick Days
    • Leave of Absence
    • Volunteer Time Off
  • Financial and Retirement

    • 401(K) With Company Matching
    • Performance Bonus
    • Profit Sharing
  • Professional Development

    • Tuition Reimbursement
    • Promote From Within
    • Mentor Program
    • Shadowing Opportunities
    • Access to Online Courses
    • Lunch and Learns
    • Internship Program
    • Leadership Training Program
  • Diversity and Inclusion

    • Unconscious Bias Training
    • Employee Resource Groups (ERG)

Company Videos

Hear directly from employees about what it is like to work at GM Financial.