|
Principal Engineer, Cyber Security - Bellevue Washington
Company: T-Mobile Location: Bellevue, Washington
Posted On: 01/26/2025
At T-Mobile, we invest in YOU! Our Total Rewards Package ensures that employees get the same big love we give our customers. All team members receive a competitive base salary and compensation package - this is Total Rewards. Employees enjoy multiple wealth-building opportunities through our annual stock grant, employee stock purchase plan, 401(k), and access to free, year-round money coaches. That's how we're UNSTOPPABLE for our employees!Job Overview The Principal Cybersecurity Engineer ensures the design, implementation, and management of robust security systems and practices across diverse software, systems, and infrastructure. This role involves securing critical telecommunications technologies, including 3GPP standards, IMS, packet core, messaging, e911, and 5G networks, while leveraging modern practices like zero-trust architecture, containerization, and advanced threat detection. The engineer collaborates with cross-functional teams to assess and mitigate risks, ensuring a secure environment for enterprise applications, IoT, mobile devices, and next-generation networks. As a subject matter expert, this role drives cybersecurity strategies across cloud, big data, carrier network technologies, and other emerging areas, providing technical leadership and enhancing the organization's security posture.Job Responsibilities: - Telecom Security:
- Ensures the security of 3GPP-compliant systems, including LTE, 5G, and IMS core networks.
- Develops and implements cybersecurity solutions for packet core infrastructure, including EPC, UPF, and related network elements.
- Leads security design and implementation for critical services like e911, VoLTE, RCS messaging, and SMS/MMS platforms.
- Secures signaling protocols (e.g., Diameter, SIP, HTTP/2) and mitigate risks such as signaling fraud, DoS attacks, and SS7 vulnerabilities.
- Advanced Threat Management:
- Develops and executes threat modeling approaches (e.g., STRIDE, ATT&CK, Cyber Kill Chain) for telecom technologies and services.
- Designs and deploys advanced EDR/XDR solutions to protect against sophisticated threats targeting telecom infrastructure.
- Next-Generation Networks and Cloud:
- Secures 5G standalone and non-standalone architectures, ensuring integrity and confidentiality across gNBs, MEC, and NFs.
- Improves cloud-native security in 5G core and IMS environments leveraging red Hat Openshift, Kubernetes, service meshes (Istio), and microservices.
- Collaborates with teams on the implementation of secure MEC (Multi-access Edge Computing) environments and 5G slicing security.
- Expertise on cloud native security technologies in AWS, Azure, GCP etc.
- Proficiency in Cloud security architecture and deployment
- Software defined network architecture and deployment in large scale enterprise using Cisco ACI and terraform
- Modern authentication stack experience on Microsoft Entra ID, CyberArk, Hashicorp, Keyfactor, certificate management etc.
- Experience on firewalls (Checkpoint, PAN), load balancers (A10, F5, Avi), micro-segmentation tools (Illumio), SASE products like Zscaler is desired.
- Incident Response and Risk Management:
- Leads investigations and response efforts for telecom-specific security incidents, ensuring compliance with standards and regulations.
- Proactively identifies security gaps in legacy and modern telecom infrastructure, developing and implementing risk mitigation strategies.
- Cross-Functional Collaboration:
- Acts as a cybersecurity advisor for engineering teams, ensuring secure SDLC practices for telecom and enterprise applications.
- Mentors teams on telecom cybersecurity, fostering expertise in signaling security, secure protocol design, and network hardening.
- Modern Cybersecurity Technologies:
- Implements and manages solutions for zero-trust architecture, AppSec, and DevSecOps within telecom systems.
- Automate threat detection and response pipelines using Python, Bash, or PowerShell integrated with tools like Splunk or Elastic Stack.
- Optimizes cross-functional partnership to successfully address customer requirements. Leads / coordinates large scale analysis efforts spanning multiple departments. Uses internal and external data resources to make strategic business decisions and persuade others. Collaborates and builds long-term relationships with key partners. Anticipates likely customer responses to specific recommendations and can address accordingly.
- Leads information security review of new technologies, designs, and remediation planning efforts.
- Collaborates with Engineering & Operations Teams to address security vulnerabilities found via PSIRTs, scans or breaches.
- Proactively identifies process or technology improvements within existing legacy applications or infrastructure and seeks out remediation.
- Investigates and/or leads identifying security needs & recommends plans/resolutions. Implements, tests & monitors info security improvements.
- Maintains transparency inside & outside of information security at the Executive (Director/Sr Director) level. Collaborates with groups such as application support, engineering ops, finance, privacy, risk management, etc.
- Significant experience with the analysis of underlying technologies that form the solution vital for the application of threat identification, analysis, and thread model design. The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) vital to protect person, asset, data, and T-Mobile brand.
- Proactively identifies areas that need to be developed and seeks out expertise in those areas. Keeps abreast of current developments and trends and can use this knowledge to create a business case to address major issues and build specific action plans to address the gaps that the team controls. Plays a leadership role in the execution of that action plan.
- Leads security projects driven by groups to info security.
- Mentors, peers and junior team members in security technologies, enterprise solution design, SDLC facilitation and effective customer interaction
- Significant experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram.
- Subject matter expert in multiple facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned.
- Advanced understanding of IP/Security solutions & technologies applicable to the Wireless Network Architecture.
- Also responsible for other Duties/Projects as assigned by business management as needed.Qualifications:Education:
- Bachelor's Degree, Computer Science, or Information Technology. Equivalent experience in lieu of degree might be considered.Experience:
- 7-10 years' Experience with growing responsibility with security related software and/or business process design (Required)
- 4-7 years' Experience with the following: project/team lead, formal implementation SDLC, facilitation of cross-functional solution design teams.
- 4-7 years' Technical Project Management
- Previous Leadership experience
- Proven expertise in 3GPP standards, 5G architecture, IMS core, and packet core security.
- Experience securing telecom applications like e911, VoLTE, and messaging systems.
- Solid understanding of cloud security, containerization, and modern DevSecOps practices.Knowledge, Skills, and Abilities:
- Solid understanding of telecom-specific protocols and technologies, including:
- Diameter, SIP, HTTP/2, SS7, SCTP, and GTP security.
- Core network elements (e.g., MME, PGW, SGW, AMF, SMF, UPF).
- IMS core components (e.g., P-CSCF, S-CSCF, I-CSCF).
- Expertise in next-generation telecom security:
- 5G standalone and non-standalone architectures, MEC, and network slicing.
- Threats targeting 5G networks and mitigation strategies.
- Proficiency in scripting and automation for security operations (e.g., Python, Ansible, Terraform).
- Advanced knowledge of security tools and platforms, such as EDR/XDR, SIEM (Splunk, Sentinel), and AppSec tools (e.g.,Gitlab, Azure devops)).
- In-depth knowledge of regulatory compliance standards (e.g., NIST, FCC e911, PCI-DSS).License/Certification (Preferred):
|
|