Senior Principal Cybersecurity Engineer, Incident Response

GM Financial

3.5

(2)

Multiple Locations

Why you should apply for a job to GM Financial:

  • We offer 12 weeks of paid parental leave for our team members to care for and bond with their new family member.
  • Our Women's Inspiration Network (WIN) supports the recruitment, retention and professional development of women across our organization.
  • Our programs provide the support, flexibility and resources for women returning to their careers after a break.
  • #494

    Position summary

    our growing Cybersecurity team.

    RESPONSIBILITIES

    About the Role:

    GM Financial is seeking a Senior Principal Cybersecurity Engineer to join our Incident Response team! As a technical leader and subject matter expert for assigned business unit, the Senior Principal will be a key influencer in the achievement of strategic alignment and provide a positive impact on business value. The Senior Principal will work with leaders in the business unit to identify initiatives with high impact which drive the business strategy forward. The person in this role is also expected to be an energetic, dynamic and innovative leader and influencer, acting as an avid promoter of process improvement to enhance productivity and performance of assigned business area. The Senior Principal is an established and recognized figure both internally and externally. This person will represent GM Financial in the broader community and serve as a de-facto ambassador for the organization. It will be important for the Senior Principal to maintain a strong network in the community and represent GM Financial well.

    In this role, you will:

    • Actively participate in incident investigations, covering detection, containment, eradication, recovery, and post-incident reviews

    • Develop and enhance incident response tools, scripts, and frameworks to improve efficiency, accuracy, and scalability of detection, response and investigations

    • Conduct and enhance memory/network/host/cloud forensics, malware reverse-engineering, and automated triage

    • Create customized tactical and strategic remediation plans related to alerts and incidents identified inside the GMF landscape as well as identified in the wild

    • Convey analytical findings through finished technical reports post incident

    • Identify and codify attacker TTPs and IOCs, feeding them into detection pipelines and IR playbooks

    • Gather and analyze cybersecurity data, technology tools and risk systems to identify security exposures

    • Lead or participate in tabletop exercises, Purple Team sessions, and threat fencing simulation

    • Perform analysis of various log sources, SIEM alerts, IDS/IPS alerts, host activity, and network traffic to identify suspicious or anomalous activity

    • Stay proactively ahead of the threat landscape-monitor zero-days, vulnerabilities, and advanced persistent threats

    Reporting Structure:

    • This role reports to: VP Cybersecurity Strategy and Operations

    QUALIFICATIONS

    What makes you a dream candidate?

    • Experience with leading cross-functional and/or global initiatives from start to finish

    • Advanced knowledge of business acumen and a deep understanding of business implications of decisions

    • In-depth understanding of company values, mission, vision and strategic direction

    • Comprehensive knowledge of GM Financial's business operations

    • Recognized as an expert across the business unit

    • Experience building detection rules and associated

    • Experience with threat intelligence techniques and detection rules, and a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise

    • Strong experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists

    • Strong ability to independently develop and implement risk hunting methodologies

    • Skilled in network, endpoint, memory, disk, and cloud forensics-with documented lead roles in complex investigations

    • Working knowledge of global cyber threats, threat actors, adversary tactics, techniques and procedures

    • Experience with TTPs, IOCs, and the MITRE ATT&CK and RE&ACT framework

    • Strong understanding of cloud incident response on platforms like Azure or AWS including working knowledge of how to implement logging and monitoring within them

    • Consistent experience on case management, following workflows, communicating incidents, and retrieving necessary data

    • Verifiably skilled in scripting to build or improve incident response

    • Demonstrated experience constructing and testing APIs

    • Experienced in NIST incident response roles and capabilities

    • Advanced knowledge of TCP/IP networking, OSI model and IP subnetting

    • Advanced knowledge of CI/CD and Detection as Code

    • Knowledge of analysis tools like Bro/Zeek or Suricata, Splunk SPL and ability to perform analysis of associated network logs

    • Strong understanding of secure network architecture and strong background in performing network operations

    • Strong technical understanding of application layer protocols including HTTP, SSH, SSL, and DNS and how they relate to cybersecurity

    • Technical knowledge of common network protocols and design patterns including TCP/IP/ HTTPS/ FTP, SFTP, SSH, RDP, CIFS/SMB, NFS

    • Advanced experience within Python, PowerShell, Bash, Jupyter and Anaconda, capable of writing modular code that can be installed on a remote system

    • Demonstrated capabilities in core data science principles

    • In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems

    • Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs

    • Proficient with Yara and writing rules to detect similar malware samples

    • Knowledgeable of current malware techniques to evade detection and obstruct analysis

    • Understanding of the capabilities of static and dynamic malware analysis, and practical experience with static, dynamic, and automated malware analysis techniques

    • Experience writing malware reports

    • Experience with reverse engineering various file formats and analysis of complex malware samples

    Experience:

    • Bachelor's Degree or Associate Degree plus 2 years of relevant experience required

    • 12 years minimum experience in related functions

    • 5-7 years experience leading through mentorship in a related field

    • 5-7 years experience driving thought leadership and innovation across products

    • Relevant certifications or licenses preferred

    What We Offer: Generous benefits package available on day one to include: 401K matching, bonding leave for new parents (12 weeks, 100% paid), training, GM employee auto discount, community service pay and nine company holidays.

    Our Culture: Our team members define and shape our culture. We have an environment that welcomes new ideas, fosters integrity, and creates a sense of community and belonging. Here we do more than work - we thrive.

    Compensation: Competitive salary and bonus eligibility; this role is eligible for company vehicle program

    Work Life Balance: Flexible hybrid work environment, 4-days a week in office

    I-JI1

    #LI-Hybrid

    #GMFjobs

    Why you should apply for a job to GM Financial:

  • We offer 12 weeks of paid parental leave for our team members to care for and bond with their new family member.
  • Our Women's Inspiration Network (WIN) supports the recruitment, retention and professional development of women across our organization.
  • Our programs provide the support, flexibility and resources for women returning to their careers after a break.