×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Principal Cybersecurity Engineer, Incident Response

Job in Arlington, Tarrant County, Texas, 76000, USA
Listing for: GM Financial
Full Time position
Listed on 2025-12-02
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below

Principal Cybersecurity Engineer, Incident Response

Join to apply for the Principal Cybersecurity Engineer, Incident Response role at GM Financial.

Job Overview

Hybrid work environment: 4 days onsite and 1 day remote.

Innovation isn’t just a talking point at GM Financial, it’s how we operate. By joining our team, you’ll work in a mission‑focused environment with specialized teams, including Engineering, Threat Intelligence, Vulnerability Management, Incident Response, Firewall, Governance, Risk, Architecture and Offensive Security. These teams collaborate to identify, manage and respond to threats, all while driving innovation across the environment.

Cybersecurity is central to our strategic vision, so you’ll benefit from exceptional leadership visibility, with direct reporting lines to the CEO. This structure ensures your work is recognized and supported at the highest levels, while also enabling bold innovation and the adoption of cutting‑edge technologies.

Shape the future of Cybersecurity at GM Financial, with the freedom to explore, the tools to build and the support to thrive.

Responsibilities
  • Participate in incident investigations, covering detection, containment, eradication, recovery, and post‑incident reviews.
  • Enhance incident response tools, scripts, and frameworks to improve efficiency, accuracy, and scalability of detection, response and investigations.
  • Conduct memory/network/host/cloud forensics, malware reverse‑engineering, and automated triage.
  • Create customized tactical and strategic remediation plans related to alerts and incidents identified inside the GMF landscape as well as identified in the wild.
  • Produce analytical findings through technical reports post‑incident.
  • Identify and codify attacker TTPs and IOCs, feeding them into detection pipelines and IR playbooks.
  • Gather and analyze cybersecurity data, technology tools and risk systems to identify security exposures.
  • Participate in tabletop exercises, Purple Team sessions, and threat fencing simulations.
  • Perform analysis of various log sources, SIEM alerts, IDS/IPS alerts, host activity, and network traffic to identify suspicious or anomalous activity.
  • Stay ahead of the threat landscape—monitor zero‑days, vulnerabilities, and advanced persistent Threats.
Qualifications
  • Experience with threat intelligence techniques, detection rules, and a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Experience conducting or managing incident response investigations for organizations, investigating targeted threats such as Advanced Persistent Threats, Organized Crime, and Hacktivists.
  • Proven ability to develop and implement risk hunting methodologies.
  • Experience with network, endpoint, memory, disk, and cloud forensics.
  • Knowledge of global cyber threats, threat actors, adversary tactics, techniques and procedures.
  • Familiarity with TTPs, IOCs, and the MITRE ATT&CK and RE&ACT framework.
  • Understanding of cloud incident response on platforms like Azure or AWS, including knowledge on how to implement logging and monitoring in them.
  • Experience on case management, following workflows, communicating incidents, and retrieving necessary data.
  • Skilled in scripting to build or improve incident response.
  • Ability to construct and test APIs.
  • Knowledge of NIST incident response roles and capabilities.
  • Demonstrated knowledge of TCP/IP networking, OSI model and IP subnetting.
  • Demonstrated knowledge of CI/CD and Detection as Code.
  • Knowledge of analysis tools like Bro/Zeek or Suricata, Splunk SPL and ability to perform analysis of associated network logs.
  • Understanding of secure network architecture and strong background in performing network operations.
  • Technical understanding of application layer protocols including HTTP, SSH, SSL, and DNS and how they relate to cybersecurity.
  • Technical knowledge of common network protocols and design patterns including TCP/IP/HTTPS/FTP, SFTP, SSH, RDP, CIFS/SMB, NFS.
  • Experience with Python, Power Shell, Bash, Jupyter and Anaconda, capable of writing modular code that can be installed on a remote system.
  • Capabilities in core data science principles.
  • In‑depth understanding of Windows…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary