This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Cybersecurity Engineer will help ensure that our software, systems and infrastructure are designed and implemented to the highest security standards. Performs technical security assessments, code reviews and vulnerability testing to highlight risk and remediate associated findings while helping T-Mobile teams and partners improve security. Works closely with other T-Mobile Engineers to design and build proactive methods to enhance our security posture, , with a focus on building these methods through automation and AI.Collaborate with Engineering & Operations Teams to address security vulnerabilities found via PSIRTs, scans or breaches. Also, drive and support network security best practices. Leads the technical implementation of the AI Security program and serves as the engineering point for secure-by-design AI adoption across the enterprise. Owns the AI intake/security review process, threat modeling, and translation of policy into enforceable controls for SaaS AI, GenAI/LLM, and internal AI services. Converts Proof‑of‑Value outcomes for AI and Data Security solutions into production controls; integrates telemetry with SIEM/SOAR and ITSM/CMDB for operations and auditability. Partners with Data Protection, the Cybersecurity Syndicate, Legal/Privacy, Procurement/Vendor Risk, and platform/application teams. Mentors engineers, publishes standards/guardrails (logging, purpose‑binding, kill‑switch, secrets handling), and drives measurable outcomes (coverage, enforcement, MTTR, approval SLA, false‑positive rates).
Job Responsibility:
Lead AI use‑case intake & security reviews
document decisions, compensating controls, and audit evidence
Perform and guide threat modeling for AI/data/agent workflows
translate findings into technical requirements for gateways, guardrails, and NTK enforcement
Define, publish, and maintain AI security standards/guardrails (prompt/log retention, purpose‑binding, kill‑switch, secrets handling, retention/expiration)
coordinate with Data Protection on Data Security Posture Management and permission awareness
Operationalize runtime protections: deploy/monitor AI and Data Security frameworks, AI discovery & policy enforcement
integrate Prompt Security and cloud and SaaS posture signals (e.g., Wiz)
Leads security, compliance, and risk assessments on projects throughout project lifecycle
Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies
Leads the identification of security needs & recommends plans/resolutions
Implements, tests & monitors info security improvements
Interfaces with groups such as application support, engineering ops, finance, privacy, risk management, etc
Leads information security policy lifecycle throughout, including intake, creation, review, approval, implementation, publishing, communication & maintenance
Executes security projects driven by groups both internal and external to info security
Mentors, peers and junior team members in security technologies, enterprise solution design and facilitation and effective customer interaction
Experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram
Experience with the analysis of underlying technologies that form the solution necessary for the application of threat identification, analysis, and thread model design
The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary to protect person, asset, data, and T-Mobile brand
Also responsible for other Duties/Projects as assigned by business management as needed
Subject matter expertise in LLM, Generative AI, and cloud-native practices
Requirements:
Bachelor's Degree, Computer Science, or Information Technology (required)
4-7 years’ Experience in info security technology or related field
2+ years of experience working with Generative AI models, AI APIs ( such as OpenAI, Hugging Face, or similar), and AI / ML integration in software development
Led rollouts and production hardening for AI Security platforms such as Reco (AI‑SPM/SaaS discovery), Knostic (NTK policies), S1/Prompt Security (endpoint guardrails), or equivalent tools
Implemented SSO/MFA, SCIM, RBAC and Need‑to‑Know models for AI workflows
partnered with Data Protection on Varonis classification and lineage
Experience with incident handling for Security breaches
2-4 years’ Technical Project Management
Experience with high level design architecture, security technologies, Networking, web services and SOA
Understanding of encryption, obfuscation, tokenization technologies
Deep understanding of LLM/GenAI risk: prompt injection/jailbreaks, data leakage via prompts/outputs, model misuse, privacy impacts, and data contamination
Ability to design guardrails and evaluations (FP/FN analysis, block/allow tuning) and to operationalize them with dashboards/KPIs
Automation mindset: build control‑as‑code, integrate with pipelines, and prove effectiveness with measurable outcomes
Medium to advance knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
Strong presentation skills to large and small audiences
In-depth knowledge of security standard methodologies in large-scale environments
Strong problem solving / troubleshooting skills
Self-motivated and able to work under tight timelines
Always act with tact and integrity, and collaborate with a variety of individuals in a positive and productive manner
Strong verbal and communication skills with diverse cross functional groups & the ability to present effectively to small & large groups
Knowledge of information security policies and regulatory controls (per team function)
Demonstrable knowledge of current technological trends and developments in info security
Ability to plan, organize and prioritize tasks to complete independently
Ability to work under pressure and meet tight timelines
Subject matter expert in many facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned
At least 18 years of age
Legally authorized to work in the United States
Nice to have:
AI‑focused/Governance: IAPP AIGP (AI Governance Professional) or equivalent NIST AI RMF practitioner training/certificate
Cloud/AI: AWS Certified Machine Learning – Specialty, Microsoft Azure AI Engineer Associate, Google Cloud GenAI or Professional ML Engineer (or equivalent)
CISSP and/or CCSK and/or CCSP and/or CISA/CISM certification a plus