Principal Cybersecurity Engineer, Incident Response jobs in United States
cer-icon
Apply on Employer Site
company-logo

GM Financial · 2 weeks ago

Principal Cybersecurity Engineer, Incident Response

GM Financial is focused on driving innovation in cybersecurity, providing a mission-driven environment for its specialized teams. The Principal Cybersecurity Engineer will serve as a technical thought leader, influencing business strategy and enhancing incident response capabilities while representing the organization in the broader community.

Finance
check
Comp. & Benefits
check
H1B Sponsor Likelynote

Responsibilities

Participate in incident investigations, covering detection, containment, eradication, recovery, and post-incident reviews
Enhance incident response tools, scripts, and frameworks to improve efficiency, accuracy, and scalability of detection, response and investigations
Conduct memory/network/host/cloud forensics, malware reverse-engineering, and automated triage
Create customized tactical and strategic remediation plans related to alerts and incidents identified inside the GMF landscape as well as identified in the wild
Produce analytical findings through technical reports post incident
Identify and codify attacker TTPs and IOCs, feeding them into detection pipelines and IR playbooks
Gather and analyze cybersecurity data, technology tools and risk systems to identify security exposures
Participate in tabletop exercises, Purple Team sessions, and threat fencing simulation
Perform analysis of various log sources, SIEM alerts, IDS/IPS alerts, host activity, and network traffic to identify suspicious or anomalous activity
Perform analysis of various log sources, SIEM alerts, IDS/IPS alerts, host activity, and network traffic to identify suspicious activity
Stay ahead of the threat landscape—monitor zero-days, vulnerabilities, and advanced persistent Threats

Qualification

Incident response investigationsForensic analysis toolsThreat intelligence techniquesCloud incident responseScripting skillsTCP/IP networkingMalware analysisDetection as CodeSoft skills

Required

Experience with threat intelligence techniques, detection rules, and a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise
Experience conducting or managing incident response investigations for organizations, investigating targeted threats such as Advanced Persistent Threats, Organized Crime, and Hacktivists
Proven ability to develop and implement risk hunting methodologies
Experience with network, endpoint, memory, disk, and cloud forensics
Knowledge of global cyber threats, threat actors, adversary tactics, techniques and procedures
Familiarity with TTPs, IOCs, and the MITRE ATT&CK and RE&ACT framework
Understanding of cloud incident response on platforms like Azure or AWS, including knowledge on how to implement logging and monitoring in them
Experience on case management, following workflows, communicating incidents, and retrieving necessary data
Skilled in scripting to build or improve incident response
Ability to construct and test APIs
Knowledge of NIST incident response roles and capabilities
Demonstrated knowledge of TCP/IP networking, OSI model and IP subnetting
Demonstrated knowledge of CI/CD and Detection as Code
Knowledge of analysis tools like Bro/Zeek or Suricata, Splunk SPL and ability to perform analysis of associated network logs
Understanding of secure network architecture and strong background in performing network operations
Technical understanding of application layer protocols including HTTP, SSH, SSL, and DNS and how they relate to cybersecurity
Technical knowledge of common network protocols and design patterns including TCP/IP/ HTTPS/ FTP, SFTP, SSH, RDP, CIFS/SMB, NFS
Experience with Python, PowerShell, Bash, Jupyter and Anaconda, capable of writing modular code that can be installed on a remote system
Capabilities in core data science principles
In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems
Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs
Proficient with Yara and writing rules to detect similar malware samples
Knowledgeable of current malware techniques to evade detection and obstruct analysis
Understanding of the capabilities of static and dynamic malware analysis, and practical experience with static, dynamic, and automated malware analysis techniques
Experience writing malware reports
Experience with reverse engineering various file formats and analysis of complex malware samples
Related certifications and/or licenses required
Greater than 10 years in related function required
3-5 years leading through mentorship in related field required
3-5 years leading projects and initiatives through influence required
High School Diploma or equivalent required
Associate Degree or High School Equivalent plus 2 additional years of related experience required

Preferred

Member of and recommendation by accredited association in related field preferred

Benefits

401K matching
Bonding leave for new parents (12 weeks, 100% paid)
Training
GM employee auto discount
Community service pay
Nine company holidays

Company

GM Financial

company-logo
GM Financial is the captive finance company and a wholly-owned subsidiary of General Motors Company.

H1B Sponsorship

GM Financial has a track record of offering H1B sponsorships. Please note that this does not guarantee sponsorship for this specific role. Below presents additional info for your reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2025 (101)
2024 (91)
2023 (86)
2022 (81)
2021 (55)
2020 (50)

Funding

Current Stage
Late Stage
Total Funding
unknown
2010-09-29Acquired

Leadership Team

leader-logo
Katie DeGraaf
Senior Vice President, OnStar Insurance, Product & Telematics
linkedin
leader-logo
Ross Reichardt
Chief of Staff; General Motors Insurance
linkedin
Company data provided by crunchbase