Principal Network Cybersecurity Engineer
Southlake, Tarrant County, Texas, 76092, USA
Listed on 2026-02-07
-
IT/Tech
Cybersecurity, Systems Engineer
Overview
You want more out of a career. A place to share your ideas freely - even if they're daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love - driving innovation, creativity, and impact in the world.
Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together - lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife.
What you ll be doing…
The GN&T Network Security team is looking for a highly motivated and experienced Cybersecurity Engineer to join the Network Security Defense team. The Defense teams are responsible for owning the security lifecycle and effectiveness across the Core, Edge, and Access networks, as well as all systems and network functions within GN&T.
In this role, you will be critical in advancing our security posture through real-time Threat Monitoring & Detection using SIEM tools like Splunk, leading Incident Response efforts during a breach, and managing the continuous Vulnerability Management lifecycle across networks and applications. The position also requires expertise in defining and implementing robust Security Architecture, including firewalls, encryption, centralized Identity and Access Management, and Multi-Factor Authentication (MFA).
A strong candidate will also possess advanced Threat Hunting skills, including Advanced Networking & Protocol Analysis, Endpoint & Memory Forensics, Data Science & Querying, and demonstrable experience in Automation & Scripting to enhance our Cybersecurity tooling.
- Identifying technology gaps to lead in the design, architecture, and implementation of appropriate security solutions.
- Creating formal guidelines, policies, and procedures to ensure smooth and error-free operations.
- Driving and leading relevant, strategic solutions in a highly scalable environment, and leading the implementation of said solutions.
- Partner across the Operations, Engineering, and Planning organizations to ensure secure design patterns are embedded into new deployments and major changes
- Working independently on strategic technical challenges.
- Identifying opportunities to mentor, guide, and delegate technical documentation/tasks to support the team and broader organization.
- Communicating clearly and effectively, articulating complex technical concepts to diverse internal and external audiences.
- Lead network security incident response activities, including triage, containment, eradication, and recovery for disruptive threats
- Build and refine incident playbooks and response runbooks, ensuring repeatable workflows for high-impact scenarios (ransomware, phishing, insider threat, DDoS, etc.)
- Serve as escalation support for security-related investigations, providing expert-level analysis and guidance during active incidents
- Execute root cause analysis and produce clear incident reports outlining timeline, impact, evidence, and remediation recommendations
- Conduct proactive threat hunting across the identity, endpoint, network telemetry to uncover adversary behavior and reduce dwell time
- Create and tune threat detections using SIEM (Security Information and Event Management) to improve alert fidelity and reduce false positives
- Drive continuous improvement of network visibility and telemetry collection to strengthen detection and response capabilities
- Perform regular security control assessments validating configuration effectiveness and closing gaps discovered during incidents or hunts
In this hybrid role, you ll have a defined work location that includes work from home and assigned office days in one of the offices listed for this position. In order to be eligible to apply for this position, you must be within commuting distance of one of those locations.
What we re looking forYou ll need to have:
- Bachelor s degree or four or more years of work experience.
- Six or more years of relevant experience required, demonstrated through one or a combination of work and/or military experience, or specialized training.
- Expert-level ability to write complex, optimized Splunk SPL (Search Processing Language) searches, including macros, data models, and lookups for efficient threat hunting and investigation.
- Strong foundational knowledge of incident response life cycles (NIST or SANS) with experience designing, testing, and maintaining automation playbooks using SOAR platforms to automate triage and response actions.
- In-depth experience with risk-based alerting, managing notable events, asset/identity correlation, and defining/tuning correlation searches.
- Expert in conflict resolution and negotiation to ensure that design, strategy, and decisions consistently support security requirements.
- Strong analytical skills and attention to detail with a proven track record of managing and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).