Note: Google’s hybrid workplace includes remote roles.
Remote location: Netherlands.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form.
.
Remote location: Netherlands.
Minimum qualifications:
- Experience in an analytical role (e.g., network forensics analyst, intelligence threat analyst, or security engineer/consultant)
- Experience working in a customer-facing environment
Preferred qualifications:
- Experience conducting analysis of firewall technologies, proxy technologies, anti-virus, or spam and spyware solutions (e.g., Gateway and SaaS)
- Experience evaluating host and network forensic reports of electronic media, packet capture, log data analysis, malware triage, and network devices in support of intrusion analysis or enterprise level information security operations
- Experience working with threat modeling systems and utilizing open-source tools for analysis
- Knowledge of security solutions and technologies, including Windows, Linux, Network architecture/implementation/configuration
- Excellent presentation skills with the ability to present to a variety of internal audiences including executives
- Exceptional verbal and written communication skills
About the job
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.
Responsibilities
- Perform strategic, tactical, and operational research and analysis of adversarial cyber threats.
- Correlate intelligence, to develop a deeper understanding of tracked threat activity.
- Work with customers to determine their cyber threat intelligence (CTI) needs and requirements.
- Collaborate with the client’s Security Operations Center (SOC) team to support tactical requirements.
- Evaluate current and emerging tools and best practices for tracking advanced persistent threats, tools, techniques, and procedures (TTPs) of attacker’s motivations, industry, and attacker trends.