This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Senior Cybersecurity Engineer, you will be at the forefront of driving security initiatives within our Cybersecurity Operations - Process & Analytics (P&A) team! Using your extensive expertise in cybersecurity operations, you will lead the charge in ensuring our Threat Response team has the processes and training they need to respond to threats while also leading efforts to apply data analysis to improve security protections, detections, and processes. In this pivotal role, you will serve as a trusted domain expert, guiding our vision and driving tangible results to fortify our security posture across various domains, including mobile devices, IoT devices, enterprise applications, cloud infrastructure, big data environments, core and carrier network technologies, and other critical business units as necessary. As a senior security advisor, you will collaborate closely with and at times lead multi-functional teams to ensure the successful delivery of projects and services to our enterprise customers, providing invaluable insights and guidance to uphold the highest standards of security. Join us in shaping the future of cybersecurity and safeguarding our digital assets against current and emerging threats.
Job Responsibility:
Leads security, compliance, and risk assessments on projects throughout project lifecycle
Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies
Leads the identification of security needs & recommends plans/resolutions
Implements, tests & monitors info security improvements
Maintains transparency inside & outside of information security at the People management level
Communicate with groups such as application support, engineering ops, finance, privacy, risk management, etc
Leads information security policy lifecycle throughout, including intake, creation, review, approval, implementation, publishing, communication & maintenance
Implements security projects driven by groups both internal and external to info security
Mentors peers and junior team members in security technologies, enterprise solution design and facilitation and effective customer interaction
Experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram
Authority in multiple facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned
Sophisticated understanding of IP/Security solutions & technologies applicable to the Wireless Network Architecture
Experience with the analysis of underlying technologies that form the solution vital for the application of threat identification, analysis, and thread model design
The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary to protect person, asset, data, and T-Mobile brand
Also responsible for other Duties/Projects as assigned by business management as needed
Requirements:
Bachelor's Degree Computer Science or Information Technology or equivalent work experience
4-7 years Experience in info security technology or related field
Experience with incident handling for Security breaches
Expert in security subject areas
2-4 years Technical Project Management
Experience with high level design architecture, security technologies, Networking, web services and SOA
Understanding of encryption, obfuscation, tokenization technologies
Medium to advance knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
Familiarity with load balancers (ex – A10, F5), firewalls (ex – CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex – CyberArk), SIEM (ex – ArcSight), Log & Event (ex – Splunk), Intrusion IDS/IPS (ex – Symantec) , Cloud Platform (ex – PCF, Docker), Scanning (ex – Qualys), AppSec (ex - Veracode)
Solid understanding of T-Mobile’s network elements and how they work together (EIT, Engineering & 3rd Party)
Strong presentation skills to large and small audiences
In-depth knowledge of security standard processes in large-scale environments
Strong problem solving / troubleshooting skills
Dedicated and able to work under timelines
Always act with tact and integrity, and collaborate with a variety of individuals in a positive and productive manner
Strong verbal and communication skills with diverse multi-functional groups & the ability to communicate effectively to small & large groups
Knowledge of information security policies and regulatory controls (per team function)
Demonstrable knowledge of current technological trends and developments in the area of info security
Ability to plan, organize and prioritize tasks to complete independently
Ability to work under stress and meet tight timelines
Authority in many facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned
Certified Information Systems Security Professional (CISSP) CISSP and/or CCSK and/or CCSP and/or CISA/CISM certification a plus (Preferred)
Certified Information Security Manager (CISM) (Preferred)
Certified Information Systems Auditor (CISA) (Preferred)
At least 18 years of age
Legally authorized to work in the United States
Nice to have:
Certified Information Systems Security Professional (CISSP) CISSP and/or CCSK and/or CCSP and/or CISA/CISM certification a plus
Welcome to
CrawlJobs.com
– Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.
We use cookies to enhance your experience, analyze traffic, and serve personalized content. By clicking “Accept”, you agree to the use of cookies.