Be unstoppable with us!T-Mobile is synonymous with innovation-and you could be part of the team that disrupted an entire industry! We reinvented customer service, brought real 5G to the nation, and now we're shaping the future of technology in wireless and beyond. Our work is as exciting as it is rewarding, so consider the career opportunity below as your invitation to grow with us, make big things happen with us, above all, #BEYOU with us. Together, we won't stop!The PKI Cybersecurity Engineer plays a crucial role in maintaining the security and trustworthiness of digital communications within an organization and with external entities. They will help ensure that our software, systems, and infrastructure are designed and implemented to the highest security standards. Perform technical security assessments, code reviews and vulnerability testing to highlight risk and re-mediate associated findings while helping T-Mobile teams and partners improve security. They will work closely with other T-Mobile Engineers to design and build proactive methods to enhance our security posture.This position is responsible for auditing, analyzing, coordinating, and implementing security measures to enhance security posture and for planning, coordinating, and implementing security measures for information systems to regulate access to data files and prevent unauthorized modification, destruction, or disclosure of information.Job Responsibilities:Performs security, compliance, and risk assessments on projects throughout project lifecycle.Participates on information security review of new technologies, designs, and remediation planning effortsCollaborates and participates on identification of security needs & recommends plans/resolutions. Implements, tests & monitors info security improvements.Maintains transparency inside & outside of info security at an Engineering professional level. Work with groups such as application support, engineering ops, finance, privacy, risk management, etc.Helps to generate and implement information security policy life-cycle throughout, including intake, creation, review, approval, implementation, publishing, communication & maintenanceHelp implement security projects driven by groups both internal and external to info securityFamiliarity with the analysis of underlying technologies that form the solution necessary for the application of threat identification, analysis, and thread model design. The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary to protect person, asset, data, and T-Mobile brand.PKI Design and Implementation:Design, implement, and maintain the organization's PKI infrastructure.Develop and implement policies and procedures related to key management, certificate issuance, and revocation.Certificate Lifecycle Management:Manage the lifecycle of digital certificates, including issuance, renewal, and revocation.Ensure the proper functioning of certificate authorities (CAs) and registration authorities (RAs).Security and Compliance:Ensure that the PKI infrastructure aligns with security policies, industry standards, and regulatory requirements.Conduct regular security assessments and audits to identify and address vulnerabilitiesTroubleshooting and Support:Provide technical support for PKI-related issues and incidents.Investigate and resolve problems related to certificates, keys, and cryptographic operations.Integration with Systems and Applications:Collaborate with system administrators and developers to integrate PKI into various systems and applications.Ensure seamless integration with authentication, authorization, and encryption mechanisms.Key Management:Manage cryptographic keys used for encryption, digital signatures, and other security mechanisms.Implement and carry out key management s