This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Cybersecurity Engineer will help ensure that our software, systems and infrastructure are designed and implemented to the highest security standards. Performs technical security assessments, code reviews and vulnerability testing to highlight risk and remediate associated findings while helping T-Mobile teams and partners improve security. Works closely with other T-Mobile Engineers to design and build proactive methods to enhance our security posture, , with a focus on building these methods through automation and AI.Collaborate with Engineering & Operations Teams to address security vulnerabilities found via PSIRTs, scans or breaches. Also, drive and support network security best practices. Implements and operates the data-layer controls that make AI adoption safe at enterprise scale. Owns Need-to-Know enforcement and access design for AI tools/workflows (SSO/MFA, SCIM, RBAC), drives classification/tagging and lineage, and turns data security policies into enforceable guardrails for AI datasets. Builds automation and policy-as-code to keep approvals audit-ready and fast, integrates telemetry with SIEM/SOAR and ITSM/CMDB, and partners daily with Data Protection, the Cybersecurity Architects, Legal/Privacy, Procurement/Vendor Risk, and engineering teams. Supports PoV→purchase→implementation for new AI Security tools and aligns with AI-SPM discovery signals to close shadow-AI gaps.
Job Responsibility:
Participates AI use‑case intake & security reviews
document decisions, compensating controls, and audit evidence
Designs and implements Need-to-Know (NTK) data policies for AI datasets and tools
translate business/legal requirements into solution rules and RBAC models
Engineer SSO/MFA, SCIM, and RBAC for AI SaaS and internal AI services
ensure least-privilege, purpose-binding, and auditable approvals
Drives data classification/tagging and lineage
define classification rules, labels, and inheritance for AI training/inference data flows
Integrates AI-SPM discovery findings with data controls to identify shadow-AI use and enforce gating/exception workflows
Participates in secure design reviews and threat modeling for data-centric AI use cases
document controls and compensating measures
Maintains high-quality documentation (policies, standards, runbooks) and coach teams on using guardrail patterns correctly
Leads security, compliance, and risk assessments on projects throughout project lifecycle
Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies
Leads the identification of security needs & recommends plans/resolutions
Implements, tests & monitors info security improvements
Collaborate with groups such as application support, engineering ops, finance, privacy, risk management, etc
Leads information security policy lifecycle throughout, including intake, creation, review, approval, implementation, publishing, communication & maintenance
Executes security projects driven by groups both internal and external to info security
Mentors, peers and junior team members in security technologies, enterprise solution design and facilitation and effective customer interaction
Experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram
Experience with the analysis of underlying technologies that form the solution necessary for the application of threat identification, analysis, and thread model design
The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary to protect person, asset, data, and T-Mobile brand
Also responsible for other Duties/Projects as assigned by business management as needed
Subject matter expertise in LLM, Generative AI, and cloud-native practices
Requirements:
Bachelor's Degree, Computer Science, or Information Technology (required)
4-7 years’ Experience in info security technology or related field
2+ years of experience working with Generative AI models, AI APIs (such as OpenAI, Hugging Face, or similar), and AI / ML integration in software development
Implemented SSO/MFA, SCIM, RBAC and Need‑to‑Know models for AI workflows
partnered with Data Protection on Varonis classification and lineage
2+ years operating DSPM/SSPM or AI-SPM controls, including policy design, tuning, and exception handling
Built classification/tagging and lineage for sensitive datasets used in AI training/inference
integrated data controls with pipelines and storage services
Experience with incident handling for Security breaches
2-4 years’ Technical Project Management
Experience with high level design architecture, security technologies, Networking, web services and SOA
Understanding of encryption, obfuscation, tokenization technologies
Working knowledge of LLM/GenAI data risks (prompt leakage, training data contamination, unintended memorization) and mitigations at the data layer
Ability to design and tune policies with FP/FN analysis
drive measurable improvements in coverage and enforcement with clear KPIs
Deep understanding of LLM/GenAI risk: prompt injection/jailbreaks, data leakage via prompts/outputs, model misuse, privacy impacts, and data contamination
Automation mindset: build control‑as‑code, integrate with pipelines, and prove effectiveness with measurable outcomes
Medium to advance knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
Strong presentation skills to large and small audiences
In-depth knowledge of security best practices in large-scale environments
Strong problem solving / troubleshooting skills
Self-motivated and able to work under tight timelines
Always act with tact and integrity, and collaborate with a variety of individuals in a positive and productive manner
Strong verbal and communication skills with diverse cross functional groups & the ability to present effectively to small & large groups
Knowledge of information security policies and regulatory controls (per team function)
Demonstrable knowledge of current technological trends and developments in info security
Ability to plan, organize and prioritize tasks to complete independently
Ability to work under pressure and meet tight timelines
Subject matter expert in many facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned
At least 18 years of age
Legally authorized to work in the United States
Nice to have:
Privacy/AI Governance: IAPP AIGP, CIPT or CIPP/US
NIST AI RMF practitioner training/certificate
Cloud/AI: AWS Certified Machine Learning – Specialty, Microsoft Azure AI Engineer Associate, Google Cloud GenAI or Professional ML Engineer (or equivalent)
CISSP and/or CCSK and/or CCSP and/or CISA/CISM certification a plus