×
Register Here to Apply for Jobs or Post Jobs. X

Senior Cybersecurity Engineer - AI

Job in Frisco, Collin County, Texas, 75034, USA
Listing for: T-Mobile
Full Time position
Listed on 2025-12-22
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security, Systems Engineer, AI Engineer
Salary/Wage Range or Industry Benchmark: 103400 - 186400 USD Yearly USD 103400.00 186400.00 YEAR
Job Description & How to Apply Below

At T-Mobile, we invest in YOU! Our Total Rewards Package ensures that employees get the same big love we give our customers. All team members receive a competitive base salary and compensation package - this is Total Rewards. Employees enjoy multiple wealth-building opportunities through our annual stock grant, employee stock purchase plan, 401(k), and access to free, year-round money coaches. That’s how we’re UNSTOPPABLE for our employees!

Job

Overview

The Cybersecurity Engineer will help ensure that our software, systems and infrastructure are designed and implemented to the highest security standards. Performs technical security assessments, code reviews and vulnerability testing to highlight risk and remediate associated findings while helping T‑Mobile teams and partners improve security. Works closely with other T‑Mobile Engineers to design and build proactive methods to enhance our security posture, , with a focus on building these methods through automation and AI.Collaborate

with Engineering & Operations Teams to address security vulnerabilities found via PSIRTs, scans or breaches. Also, drive and support network security best practices.

Leads the technical implementation of the AI Security program and serves as the engineering point for secure‑by‑design AI adoption across the enterprise. Owns the AI intake/security review process, threat modeling, and translation of policy into enforceable controls for SaaS AI, GenAI/LLM, and internal AI services. Converts Proof‑of‑Value outcomes for AI and Data Security solutions into production controls; integrates telemetry with SIEM/SOAR and ITSM/CMDB for operations and auditability.

Partners with Data Protection, the Cybersecurity Syndicate, Legal/Privacy, Procurement/Vendor Risk, and platform/application teams. Mentors engineers, publishes standards/guardrails (logging, purpose‑binding, kill‑switch, secrets handling), and drives measurable outcomes (coverage, enforcement, MTTR, approval SLA, false‑positive rates).

Job Responsibilities
  • Lead AI use‑case intake & security reviews; document decisions, compensating controls, and audit evidence.
  • Perform and guide threat modeling for AI/data/agent workflows; translate findings into technical requirements for gateways, guardrails, and NTK enforcement.
  • Define, publish, and maintain AI security standards/guardrails (prompt/log retention, purpose‑binding, kill‑switch, secrets handling, retention/expiration).
  • Engineer identity & access controls (SSO/MFA, SCIM, RBAC) that enforce Need‑to‑Know; coordinate with Data Protection on Data Security Posture Management and permission awareness
  • Operationalize runtime protections: deploy/monitor AI and Data Security frameworks, AI discovery & policy enforcement; integrate Prompt Security and cloud and SaaS posture signals (e.g., Wiz).
  • Leads security, compliance, and risk assessments on projects throughout project lifecycle.
  • Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies.
  • Leads the identification of security needs & recommends plans/resolutions.
  • Implements, tests & monitors info security improvements.
  • Interfaces with groups such as application support, engineering ops, finance, privacy, risk management, etc.
  • Leads information security policy lifecycle throughout, including intake, creation, review, approval, implementation, publishing, communication & maintenance.
  • Executes security projects driven by groups both internal and external to info security.
  • Mentors, peers and junior team members in security technologies, enterprise solution design and facilitation and effective customer interaction
  • Experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram.
  • Experience with the analysis of underlying technologies that form the solution necessary for the application of threat identification, analysis, and thread model design.
  • The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary