JOB DESCRIPTION
Hybrid work environment: 4 days onsite and 1 day remote
Why GM Financial Cybersecurity?
The GMF Cybersecurity team is tasked with the security engineering, regulatory response, third party risk, and incident response capabilities necessary to secure GM Financial, the captive auto finance subsidiary of General Motors. Reporting directly to the CEO, our Cybersecurity team enjoys unprecedented support to deliver the highest level of security capabilities using cutting edge technologies and automating mundane tasks, allowing our teams to focus on interesting and rewarding security work. As a part of GM, you'll have the opportunity to work on Cybersecurity projects across financial services, automotive, manufacturing, high-tech, and military industries. We are looking for team players who want the freedom to innovate leading edge capabilities to join our growing Cybersecurity team.
Want more jobs like this?
Get jobs delivered to your inbox every week.
RESPONSIBILITIES
About the Role:
As a technical thought leader and subject matter expert for assigned business area, the Principal will be a key influencer to achieve strategic alignment and deliver business value. The Principal will work with leaders in the business segment to identify initiatives with high impact which drive the business strategy forward. The person in this role will be innovative and an avid promoter of process improvement in specific technical discipline using the appropriate methodologies to enhance productivity and performance of assigned business area.
The Principal tends to be an established and recognized figure both internally and externally. This person will represent GM Financial in the broader community and serve as a de-facto ambassador for the organization. It will be important for the Principal to maintain a strong network in the community and represent GM Financial well.
In this role, you will:
- Participate in incident investigations, covering detection, containment, eradication, recovery, and post-incident reviews
- Enhance incident response tools, scripts, and frameworks to improve efficiency, accuracy, and scalability of detection, response and investigations
- Conduct memory/network/host/cloud forensics, malware reverse-engineering, and automated triage
- Create customized tactical and strategic remediation plans related to alerts and incidents identified inside the GMF landscape as well as identified in the wild
- Produce analytical findings through technical reports post incident
- Identify and codify attacker TTPs and IOCs, feeding them into detection pipelines and IR playbooks
- Gather and analyze cybersecurity data, technology tools and risk systems to identify security exposures
- Participate in tabletop exercises, Purple Team sessions, and threat fencing simulation
- Perform analysis of various log sources, SIEM alerts, IDS/IPS alerts, host activity, and network traffic to identify suspicious or anomalous activity
- Perform analysis of various log sources, SIEM alerts, IDS/IPS alerts, host activity, and network traffic to identify suspicious activity
- Stay ahead of the threat landscape-monitor zero-days, vulnerabilities, and advanced persistent Threats
QUALIFICATIONS
What Makes You A Dream Candidate?
- Experience with threat intelligence techniques, detection rules, and a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise
- Experience conducting or managing incident response investigations for organizations, investigating targeted threats such as Advanced Persistent Threats, Organized Crime, and Hacktivists
- Proven ability to develop and implement risk hunting methodologies
- Experience with network, endpoint, memory, disk, and cloud forensics
- Knowledge of global cyber threats, threat actors, adversary tactics, techniques and procedures
- Familiarity with TTPs, IOCs, and the MITRE ATT&CK and RE&ACT framework
- Understanding of cloud incident response on platforms like Azure or AWS, including knowledge on how to implement logging and monitoring in them
- Experience on case management, following workflows, communicating incidents, and retrieving necessary data
- Skilled in scripting to build or improve incident response
- Ability to construct and test APIs
- Knowledge of NIST incident response roles and capabilities
- Demonstrated knowledge of TCP/IP networking, OSI model and IP subnetting
- Demonstrated knowledge of CI/CD and Detection as Code
- Knowledge of analysis tools like Bro/Zeek or Suricata, Splunk SPL and ability to perform analysis of associated network logs
- Understanding of secure network architecture and strong background in performing network operations
- Technical understanding of application layer protocols including HTTP, SSH, SSL, and DNS and how they relate to cybersecurity
- Technical knowledge of common network protocols and design patterns including TCP/IP/ HTTPS/ FTP, SFTP, SSH, RDP, CIFS/SMB, NFS
- Experience with Python, PowerShell, Bash, Jupyter and Anaconda, capable of writing modular code that can be installed on a remote system
- Capabilities in core data science principles
- In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems
- Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs
- Proficient with Yara and writing rules to detect similar malware samples
- Knowledgeable of current malware techniques to evade detection and obstruct analysis
- Understanding of the capabilities of static and dynamic malware analysis, and practical experience with static, dynamic, and automated malware analysis techniques
- Experience writing malware reports
- Experience with reverse engineering various file formats and analysis of complex malware samples
Experience:
- Related certifications and/or licenses required
- Member of and recommendation by accredited association in related field preferred
- Greater than 10 years in related function required
- 3-5 years leading through mentorship in related field required
- 3-5 years leading projects and initiatives through influence required
- High School Diploma or equivalent required
- Associate Degree or High School Equivalent plus 2 additional years of related experience required
What We Offer: Generous benefits package available on day one to include: 401K matching, bonding leave for new parents (12 weeks, 100% paid), training, GM employee auto discount, community service pay and nine company holidays.
Our Culture: Our team members define and shape our culture. We have an environment that welcomes new ideas, fosters integrity, and creates a sense of community and belonging. Here we do more than work - we thrive.
Compensation: Competitive salary and bonus eligibility; this role is eligible for company vehicle program
Work Life Balance: Flexible hybrid work environment, 4-days a week in office
#LI-hybrd
#GMFjobs
#LI-KC1