GM Financial

Cybersecurity Engineer

Arlington, TX (Hybrid)

The Cybersecurity Engineer is responsible for performing and evaluating vulnerability scanning, reporting detection results, maintaining scanning systems and procedures; and to identify and mitigate threats to the corporate network, corporate assets, and corporate users. This team member will identify core requirements, design and implement security technologies, and work with stakeholders to perform ongoing tuning and alerting on those technologies. Security technologies may include, but are not limited to: vulnerability scanners, Data Loss Prevention (DLP), Security Incident Event Management (SIEM), User Behavior Analytics, Host Intrusion Prevention (HIPS), Web Application Firewall (WAF), DevSecOps Pipelines, and Web/Email Gateway. This team member will be responsible for both technical implementation of systems and communication of security requirements to management and security leadership. Additionally, this team member will be responsible, as necessary, with assisting in investigations into security threats.
 Job Duties

  • ¬†Perform software vulnerability scanning and source code analysis using security testing tools and processes used to expose known and undocumented vulnerabilities in various information systems¬†
  • ¬†Conduct source code reviews and software penetration tests to confirm existence of vulnerabilities and communicate findings to support teams for resolution¬†
  • ¬†Using strong interpersonal skills to articulate vulnerabilities to technical and non-technical audiences¬†
  • ¬†Provide technical understanding of vulnerabilities and exploits using knowledge of coding frameworks and web and cloud application infrastructure (Application Servers, Web Servers, APIs, etc)¬†
  • ¬†Provide knowledge and support for software and web application migration devices (WAF, API gateways, etc.)¬†
  • ¬†Using creative thought, technical understanding of exploits, and attacker behaviors provide additional details on how software is at risk of penetration¬†
  • ¬†Creation of vulnerability reports and metrics to disseminate to groups based on operational hierarchies¬†


  • ¬†Prior coding experience in web development, php, python, node.js¬†
  • ¬†Prior experience in cloud development, CICD, or DevSecOps¬†


  • ¬†Strong technical skills and hands on experience in information security as it relates to server security, client security, user security, network communications, and data storage¬†
  • ¬†Practical experience implementing security solutions and performing initial tuning and monitoring in the environment¬†
  • ¬†Proven expertise developing custom rule sets for tools to identify specific attacks and exploits based on feedback and requirements from business stakeholders including Compliance and Legal Counsel¬†
  • ¬†Practical experience scaling vulnerability detection solutions to meet enterprise sizing requirements and performing tuning to manage the amount of alerting that occurs¬†
  • ¬†Strong knowledge of core Information Technology concepts such as TCP/IP networking, Windows & Active Directory, Unix/Linux, Mainframe, Cloud Service Providers, Relational Databases, Data Warehouses, and filesystems¬†
  • ¬†Strong knowledge of IT and cloud technologies and methods to secure them, specifically for applications databases, storage area networking, cloud-based storage, and data warehouses¬†
  • ¬†Practical experience with data loss, data privacy, regulatory requirements¬†
  • ¬†Strong knowledge of the OSI model and security that is associated with each layer¬†


  • ¬†Experience in setting appropriate priorities for tasks to be accomplished based on project plans and management priorities are required¬†
  • ¬†Proven ability to communicate across multiple levels of stakeholders¬†
  • ¬†Ability to interpret and document business and technical requirements¬†
  • ¬†Good interpersonal, verbal and written communication skills.¬†
  • ¬†Detail oriented with good time and analytical skills.¬†
  • ¬†Ability to read source code from various languages and understand program logic.¬†
  • ¬†Ability to exercise prudent judgment and offer knowledgeable advice.¬†
  • ¬†Ability to work both independently and in a team environment.¬†
  • ¬†Ability to manage multiple projects and tasks.¬†
  • ¬†Ability to manage production sensitive situations¬†
  • ¬†Be a reputable representative of the department¬†


  • ¬†Bachelor‚Äôs Degree in related field or equivalent work experience strongly preferred¬†


  • ¬†A minimum of 1-5 years of experience in large and complex business environments with a successful track record working directly with senior level management with at least 1 year of experience in one or more of the following domains: Cybersecurity, Information Security, Network Engineering, or Network Operations, Information Technology, Application Development¬†
  • ¬†Hands on experience supporting security requirements of a large, global enterprise environment¬†
  • ¬†Bachelor's Degree or equivalent experience strongly preferred¬†
  • ¬†Cybersecurity related certifications strongly preferred¬†


  • ¬†Cybersecurity related certifications strongly preferred¬†

Working Conditions

  • ¬†Normal office environment. Subject to stressful situations and requires many hours per day working on a computer workstation¬†
  • ¬†Flexible schedule with possibility of working long hours including weekends/holidays, occasional overtime or split shifts may be required¬†
  • ¬†Some after-hours work and periodic 24x7 on call support will be required.¬†
  • ¬†Limited travel may be required to support business needs, including international travel

Get new jobs update?

© 2022 P2PSEC. All rights reserved.