Cyber Defence Senior Analyst, Mandiant
Role details
Job location
Tech stack
Job description
As a Cyber Defence Analyst, you will be responsible for enabling efficient and accurate incident response activities and daily tasks within a Cyber Defence Centre (CDC). You will collaborate with multiple cross-functional teams like Security Architects, Security Engineers, Client Information Technology (IT) resources, and other business resource owners, to define requirements and deliver recommendations focused on incident response activities to support the client's CDC. In addition, you may be responsible for the analysis, response, containment, remediation and long-term improvement of a client's Security Operation Centre (SOC) in order to maintain and transform incident detection and response capabilities.
In this role, you will work as a member of a highly technical team in a changing environment, administer a variety of information security technologies, learn new emerging technologies, and be passionate about protecting customer data and corporate assets from the threats facing multiple industries. Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone., * Conduct real-time analysis using SIEM, endpoint, and networking based technologies with a focus on identifying security events and false positives.
- Advise on CDC, Computer Security Incident Response Team (CSIRT), and SOC Management activities.
- Research and leverage cybersecurity intelligence sources, attacker techniques, containment methodologies, and remediation processes to improve Security Operations Centre (SOC) incident detection and response capabilities.
- Engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.
- Identify challenges in customer cyber defence centres and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form.
Requirements
Do you have experience in Windows?, Do you have a Bachelor's degree?, * Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
- 5 years of experience assessing and developing cybersecurity solutions across multiple security domains.
- Experience in SOC analyst, malware research, threat hunting or similar roles, working with EDR and SIEM technologies., * Certification in one or more of the following such as CompTIA Security+, CompTIA Network+, ISC2 (CISSP), SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT) CISCO (CCNA), EC-Council (CEH, LPT).
- Experience leading incident response activities.
- Knowledge of scripting languages (e.g., PowerShell and Python).
- Understanding of operating systems, including Windows and Linux.
- Understanding of security controls for common platforms and devices, including Windows, Linux and network equipment.