Cybersecurity Manager

Security, Manager, IT, Web, Systems, Management, VM, Application, SSL, Database, UML, TCP, IP, HTTP, ISO, Network, Engineering, Development, Access, Risk Management, Software, Cryptography, Architecture, Disaster Recovery, Environmental
Full Time

Job Description


GM Financial (GMF) is the wholly owned captive finance subsidiary of General Motors and is headquartered in Texas. We are a global provider of auto finance solutions, with operations in North America, South America and Asia. Through our long-standing relationships with auto dealers, we offer attractive retail financing and lease programs to meet the needs of each customer. We also offer commercial lending products to dealers to help them finance and grow their businesses.

At GMF our Cybersecurity organization is a global team consisting of architecture, engineering, operations, governance, and risk functions under the Chief Information Security Officer reporting directly to the CEO.

The Cybersecurity Manager is responsible for the implementation and utilization of threat intelligence related to cyber- threats; developing, deploying, monitoring, tuning, evaluating, reporting on and maintaining systems and procedures; and identifying and mitigating threats to the corporate network, corporate assets and corporate users to ensure the security of the company systems and information assets. The team member is responsible for leading both technical implementations of controls, detection and prevention capabilities, and communication of security requirements to management and security leadership. Additionally this team member will be responsible , as necessary, with leading investigations into security threats, working with internal and external group to ensure the Cybersecurity program is operating effectively and efficiently and developing strong partnerships across the enterprise to ensure information assets are protected at eh appropriate level.



  • Identify threat intelligence sources and utilize resulting information for security posture enhancement
  • Monitor threat intelligence sources, including open source sources, for new threat and vulnerabilities
  • Devise new and enhance existing means of indicators of compromise consumption
  • Utilize available tools and their capabilities to implement threat detection and mitigation, either directly or by engagement with other teams
  • Develop threat detection signatures such as Sigma, YARA, SNORT, Suricata, etc.
  • Engage with security vendors to improve product capabilities
  • Coordinates with senior IT Security leaders to set direction and operation of the group
  • Prepares roadmaps, guidelines and direction for the department
  • Prepares technical requirements and standards
  • Manages project assignment and delegate tasks as needed
  • Provides conflict resolution and disciplinary actions for the department
  • Identifies, engineers, designs or evaluates security technologies that may include, but not be limited to: Security Incident and Event Managers (SIEM) and threat intelligence solutions, Web filtering (proxy, network AV), Intrusion Detection and Prevention Systems (IDS/IPS), Endpoint security solutions, Data Loss Prevention (DLP), Vulnerability Management (VM), Threat Intelligence and Threat Detection, Web Application Firewalls (WAF), Email Gateways, Breach Mitigation, Certificate Management, SSL encryption and decryption, Identity Management, Cloud Security, Database Security, Web Gateways, VPNs and Firewalls
  • Communicates critical threats and remediation efforts for the enterprise
  • Performs analysis of system logs to identify unauthorized use or access
  • Creates, analyzes and communicates security metrics to senior leadership
  • Designs and monitors secure access to the network infrastructure, including routers, switches and access points
  • Participates in emergency response team activities for responding to various security incidents
  • Provides in-depth support for information security incidents including internal violations, hacker attacks, virus and system outages
  • Prepares and update information procedures, standards and/or other technical requirement documents
  • Acts as a technical resource to department management and others within the company who are seeking more information about security
  • Participates in periodic information systems risk assessments
  • Develops detailed proposals and plans for new information security systems that would enhance or enable new capabilities for network or host systems
  • Recommends and evaluates security tools to identify more efficient and effective security measures
  • Perform other duties as assigned
  • Conform with all company policies and procedures



  • Local and wide area networking concepts, principles and protocols
  • Advanced knowledge in Infrastructure design and management
  • Working knowledge of management processes such as personnel administration, planning and budgeting
  • Strong working knowledge of Intel platforms, iSeries and pSeries servers
  • Advanced understanding of IT Service Management (ITSM) best practices and processes
  • Experience with UML Design Tools
  • Advanced knowledge of TCP/IP, OSI model and imp subnetting
  • High level understanding of technology infrastructure, security concepts and platforms
  • Demonstrated success in project management
  • Advanced knowledge of the OSI model and security that is associated with each layer
  • Understanding of routing and switching protocols as they relate to load balancing
  • Strong understanding of application layer protocols including HTTP, SSH, SSL and DNS
  • Knowledge and stay abreast on the latest security and privacy legislation, regulations, advisories, alerts and vulnerabilities
  • Knowledge of IT security processes and controls as well as IT infrastructure and networking technical knowledge
  • Practical experience and knowledge of the latest Cybersecurity legislations, regulations, advisories, alerts, vulnerabilities and Cybersecurity frameworks


  • Ability to think strategically and make collaborative decisions
  • Ability to apply structured analysis methods to various types of data to establish trends, determine variability and business impact
  • Communicates quickly, clearly, concisely, appropriately and intelligently
  • Foster open communication, speaks with impact, listens to others and writes effectively
  • Experience with alternate management methods using SSH, serial connections and the command-line interface TMSH
  • Ability to effectively negotiate with vendors on upgrades and acquisitions
  • Effective planning, time management, negotiation, and delegation skills
  • Expert level IT security processes and controls knowledge as well as IT infrastructure and networking technical knowledge
  • Ability to approach problems with an open-mind and create new and innovative ideas and methods
  • Advanced technical writing
  • Experience in documentation tools such as Visio and Microsoft Office products
  • Advanced information security standards/frameworks (ie, NIST Cybersecurity Framework, ISO 27001) skills
  • Advanced experience with Network and VLAN segmentation
  • Strong analytical skills
  • Ability to approach problems with an open-mind, use existing information and resources
  • Creative, Innovative, problem-solving and maximizing your potential to solve problems and improve methods
  • Think positively when faced with obstacles, build on others ideas, think logically and intuitively
  • Detailed oriented


  • High School Diploma required
  • Bachelor's Degree in related field or equivalent work experience preferred


  • Minimum of 4 years of experience in one or more of the following domains: Cybersecurity, Information Security, Network Engineering or Operations, Information Technology, Application Development, Access Control, Security Governance, Risk Management, Software Development Security, Cryptography, Security Architecture and Design, Operational Security, Business Continuity & Disaster Recovery, Legal Regulations, Investigations and Compliance, Physical (Environmental) Security, IT or Security Audit, IT or Security Compliance required
  • 7-10 years of experience in large and complex business environments with a successful track record working directly with senior level management preferred


  • Information Security Certifications strongly preferred

Working Conditions

  • Normal office environment subject to stressful situations
  • Possibility of working long hours including weekends/holidays or split shifts may be required
  • Limited travel may be required to support business needs

Dice Id : 10120555
Position Id : 2021-39969
Originally Posted : 4 months ago
Have a Job? Post it

Similar Positions

AVP Cybersecurity
  • GM Financial
  • Arlington, TX, USA
Cybersecurity Manager -SOC
  • GM Financial
  • Arlington, TX, USA
Cybersecurity Analyst
  • GM Financial
  • Arlington, TX, USA
Sr Cybersecurity Analyst - Business Continuity
  • GM Financial
  • Arlington, TX, USA
Cybersecurity Engineer
  • GM Financial
  • Arlington, TX, USA
Cybersecurity Engineer
  • GM Financial
  • Arlington, TX, USA
Cybersecurity Engineer
  • GM Financial
  • Arlington, TX, USA
Sr Cybersecurity Engineer
  • GM Financial
  • Arlington, TX, USA
Virtualization & Cloud Engineer
  • GM Financial
  • Arlington, TX, USA
`Associate Cybersecurity Engineer
  • GM Financial
  • Arlington, TX, USA