• Cybersecurity Solutions Architecture

    Job Locations US-TX-Arlington
    Requisition ID
    Employee Type
    Full Time-Regular
    Information Technology
  • Overview

    GM Financial is the international captive finance company and wholly owned subsidiary of General Motors. With more than 9,000 hard-working team members, we're always looking for new people with diverse talents. GM Financial is a workplace where dedicated people have the opportunity to work together and celebrate our successes. We offer a comprehensive benefit package that is above industry standards as well as offer a great work-life balance. We have built our culture based on respect, integrity, innovation and personal development. To find out more about us and how to start your career at GM Financial visit our website at www.gmfinancial.com/careers.  


    GM Financial encourages our Cybersecurity professionals to transform and revolutionize. Our Cybersecurity professionals are encouraged to break traditional approaches.  GM Financial’ s Cybersecurity program is an agile environment where prudent security controls are implemented and matured, through our forward thinking security organizations, and with support of engaged and industry respected executive leadership.


    The Cybersecurity  Solutions Architecture is responsible for assessing risk, developing, and delivering a comprehensive Cybersecurity program for General Motors Financial. As a Senior Technical Architect, you will be at the forefront of systems architecture definition and implementation including applications, data and emerging technology domains. A successful Senior Technical Architect can translate business requirements into specific systems, applications or process designs for very large, complex IT solutions. This position requires a leader who can identify current and future risks, works well with others, and performs in challenging situations, pragmatic, and motivated by long-term results while addressing short-term needs.



    • The  Solutions Architecture will design, develop automated software test plans to identify and address Cybersecurity concerns, as well as develop testing processes and direct software application testing, leveraging knowledge of computer science, cybersecurity, and software development principles and utilizing AWS, Jenkins, Java, Selenium, and Appium
    • The  Solutions Architecture will develop and execute test scenarios, scripts, and procedures for unit, process, function, system integration, and acceptance testing Review testing documentation, develop testing standards, define criteria for testing, analyze test results, and present results to developers and end users
    • The Solutions Architecture will oversee Cybersecurity testing efforts including process design and standards, effort estimation, resource forecasting, and risk management The AVP Solutions Architecture creates security requirements for applications, solutions, networks, data warehouses, data analytics, automation, cloud and borderless networks, and initiatives that use resources optimally; through extensive knowledge of operational risks
    • The Solutions Architecture participates in requirements gathering; reaching a technical architecture creating validating, and integrating the technical designs as blueprints for secure application, network, and product development supporting business intelligence
    • The Solutions Architecture adapts and transforms established frameworks to aid in the maturing and optimization of security controls and services, or recommends alternatives to increase the security posture while optimizing ROI
    • The Solutions Architecture will engage in complicated problem resolution throughout the SDLC, including overseeing from a security perspective, the build processes, test automation, and system monitoring performed by the Cybersecurity business partners


    AVP Cybersecurity US



    • Comprehensive and detailed understand of DevOps (Puppet, Ansible, Chef, Docker) including the tools or solutions, and techniques to secure the strategy
    • Comprehensive and detailed understanding of information technology, operating systems, protocols, TCP, endpoint security, databases, cloud orchestration and automation solutions
    • Comprehensive and detailed ability to identify risks (present and emerging), the security costs, and the impact on the enterprise business processes
    • Comprehensive analysis of targeted system to identify weaknesses and develop opportunities for improvement
    • Comprehensive understanding and applied due diligence with complex legal requirements and business risks
    • Demonstrate exceptional interpersonal skills, including teamwork, facilitation and communication


    • Verifiable experience with Cloud Infrastructure security industry best practices
    • Verifiable experience with AWS, Borderless Networks, and Identity Awareness
    • Verifiable experience with both virtual and containerized computing environments
    • Verifiable experience in conducting POCs using emerging technologies
    • Verifiable experience with various databases such as Oracle, MSSQL, MongoDB, Spark, HDFS, HIVE, Cloudera, Avro, Parquet or other Hadoop
    • Verifiable experience with modern technology paradigms including serverless computing, Software Defined Networks, container technologies, and security controls to protect them
    • Hands on knowledge of Linux/Unix, container, and virtual solutions
    • Hands on knowledge of Network Architecture and Network Topology including LAN / WAN / wireless, and borderless networks
    • Understanding of embedded, control, and IoT device security
    • Knowledge integrating security requirements with identity stores, relational databases, application servers and physical access management systems, encryption
    • Knowledge applying authentication solutions like SSO, Oauth, 2FA, and IdAM
    • Knowledge with Shell, Expect, Perl, Python and JavaScript
    • Knowledge working with API’s, data modeling, web services, microservices and APK’s
    • Knoledge of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) models
    • Knowledge of data and analytics tools including ETL, data platforms, visualization
    • Excellent analytical and technical skills with expert level architecture and development
    • Excellent personal skills with the ability to interact with executive stakeholders
    • Implemented technical solutions to address business problems while comprehending the functions and capabilities of new technologies
    • Demonstrated leadership in establishing and applying technical guidelines


    • Bachelor’s Degree in Computer Science, Computer Engineering, Information Technology, Information Security, Information Assurance, Information Management or equivalent experience required


    • Greater than 10 years experience in the security or diverse technologies and processing environments required
    • 3-5 years experience as Lead Security Architect, Network Architect, Solutions Architect or similar role required
    • 3-5 years experience working with a geographically dispersed teams required

    Licenses and Certifications

    • CISSP, CISM, CISA, SANS, GIAC, CGEIT, CRISC, GSEC, ITL, PMP or Agile upon hire preferred

    Work Conditions

    • Normal office environment subject to stressful situations


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed

    Need help finding the right job?

    We can recommend jobs specifically for you! Click here to get started.