Be unstoppable with us!
T-Mobile is synonymous with innovation-and you could be part of the team that disrupted an entire industry! We reinvented customer service, brought real 5G to the nation, and now we're shaping the future of technology in wireless and beyond. Our work is as exciting as it is rewarding, so consider the career opportunity below as your invitation to grow with us, make big things happen with us, above all, #BEYOU with us. Together, we won't stop!
Job Description
The Sr Cybersecurity Engineer, Threat Hunting will identify previously unknown Cybersecurity threats and incidents faced by T-Mobile by hypothesis-based hunting. They will work closely with other Cybersecurity operations teams including incident response, detection engineering, vuln management, bug bounty, and threat intelligence. Additionally, the candidate must have some knowledge of system security design and network security standard processes. Analytical and organizational skills, and the ability to effectively communicate and work independently and as part of a team are required.
Job Responsibilities
Identify previously unknown Cybersecurity incidents and threats by hypothesis-based hunting
Assist with Incident Response as necessary
Develop content to improve detective capabilities in Security Information and Event Management (SIEM) tool
Analyze disparate data sources for security incidents
A champion for process, recommending tool, software development, or infrastructure changes to improve or enhance security
Lead small to medium sized projects as directed
Develop and deliver metrics as requested
Participate in on call rotation that may involve non-traditional working hour
Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies.
Qualifications
Highly Desired
In-depth knowledge of security technologies such as, but not limited to:
Telecommunication and mobile network technologies, specifically VoIP, SIP, IOS, Android, mobile device hardware, and 4G/5G security.
Intrusion Detection systems (I.E. Checkpoint, McAfee, ISS, Snort, etc.)
Security Information and Event Management (SIEM)
Network Windows/Linux forensics techniques
Vulnerability scanning tools (WebInspect, Nessus, etc.)
In-depth knowledge of networking and OS technologies such as, but not limited to:
Diagnostic tools such as packet capture/decode and WAN probes
Operating Systems: Windows & UNIX - Solaris, HP/UX, or Linux operating systems administration
Networking components including routers, hubs, switches, etc.
TCP/IP protocols
OSI Seven Layer Model
Education
Bachelor's Degree Computer Science or Information Technology or equivalent work experience
Skills and Experience
4-7 years experience with threat hunting, incident response, or other relatable cybersecurity operations functions
Strong verbal and written communication skills
High-level network problem solving ability
Ability to plan, organize and prioritize tasks to complete independently and within time frame established
Knowledge and experience with current cyber threats and landscape to Enterprise environments.
In-depth knowledge of security standard processes in large-scale environments
Medium to advance knowledge of programming tools (Python/Java/Perl/Shell/HTML/PHP)
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
Familiarity with load balancers (ex - A10, F5), firewalls (ex - CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex - CyberArk), SIEM (ex - ArcSight), Log & Event (ex - Splunk), Intrusion IDS/IPS (ex - Symantec) , Cloud Platform (ex - PCF, Docker), Scanning (ex - Qualys), AppSec (ex - Veracode)
Strong verbal and communication skill