The application window will be open until at least January 30, 2024. This opportunity will remain online based on business needs which may be before or after the specified date.
Minimum qualifications:
3 years of experience in SOC analyst, malware research, threat hunting, or similar roles, working with EDR and SIEM technologies.
2 years of experience with networking, including TCP/IP protocols and network topology.
1 year of experience with Windows Server, Active Directory, O365, etc.
1 year of experience leading incident response activities.
Preferred qualifications:
Certification in one or more of the following: CompTIA Security+; CompTIA Network+; ISC2 (CISSP); SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT); CISCO (CCNA); EC-Council (CEH, LPT).
Knowledge of scripting languages (i.e., PowerShell and Python).
Understanding of operating systems, including Windows and Linux.
Understanding of security controls for common platforms and devices, including Windows, Linux and network equipment.
Ability to simplify and communicate complex ideas.
Excellent written and verbal communication skills.
As a Cyber Defense Analyst, you will be responsible for enabling efficient and accurate incident response activities and daily tasks within a Cyber Defense Center (CDC). You will collaborate with multiple cross-functional teams like Mandiant Architects, Mandiant Engineers, Client Information Technology (IT) resources, and other business resource owners, to define requirements and deliver recommendations focused on incident response activities to support the client's CDC. In addition, you may be responsible for the analysis, response, containment, remediation, and long-term improvement of a client's Security Operation Center (SOC) in order to maintain and transform incident detection and response capabilities.
In this role, you will work as a member of a highly technical team in a rapidly changing environment, administer a variety of information security technologies, learn new emerging technologies, and be passionate about protecting customer data and corporate assets from the diverse threats facing multiple industries.
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.
The US base salary range for this full-time position is $103,000-$151,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google (https://careers.google.com/benefits/) .
Identify challenges in customer Cyber Defense Centers and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion.
Conduct real-time analysis using SIEM, Endpoint, and Network based technologies with a focus on identifying security events and false positives.
Advise on CDC, CSIRT, and SOC Management activities.
Research and leverage cybersecurity intelligence sources, attacker techniques, containment methodologies, and remediation processes to improve Security Operation Center (SOC) incident detection and response capabilities.
Engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also https://careers.google.com/eeo/ and https://careers.google.com/jobs/dist/legal/OFCCPEEOPost.pdf If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form: https://goo.gl/forms/aBt6Pu71i1kzpLHe2.