Security Engineer Consulting Associate, STS, Cyber Defense, Mandiant

GoogleApplyPublished 13 hours agoFirst seen 13 hours ago
Apply
In this role, you will be responsible for enabling the technology and tools required to effectively automate and orchestrate daily tasks within a cyber defense center (CDC). You will collaborate with multiple cross-functional teams like Mandiant Architects, Mandiant Analysts, Client information technology (IT) resources, and other business resource owners, to define requirements and deliver recommendations focused on technologies, processes, scripting, and improvements required to support automation tasks within a CDC. You will work as a member of a highly technical team in a rapidly changing environment, administer a variety of information security technologies, learn new emerging technologies, and be passionate about protecting customer data and corporate assets from the various threats facing multiple industries.

Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.

The US base salary range for this full-time position is $85,500-$123,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.

Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.

Responsibilities

  • Identify issues in customer cyber defense centers and formulate strategies for improvement, identify candidates for automation, plan implementation of improvements, and execute/oversee plans to completion.
  • Advise on technologies relied upon by the client CDC, CSIRT, and SOC.
  • Provide expertise for SOAR and other SOC technologies that assist in incident response.
  • Create and modify security orchestration, automation and response (SOAR) playbooks written in Python.
  • Engage and collaborate with client stakeholders and other groups within customer environment to drive resolution for security issues.

Minimum qualifications:

  • Bachelor's degree in Computer Science, Information Systems, Cybersecurity or related technical field or equivalent practical experience.
  • Experience working with SOC/CSIRT or other incident response related teams.
  • Experience scripting (e.g., Python).
  • Experience with security information and event management (SIEM) solutions (e.g., writing queries, searches, alerts, dashboards).
  • Experience in data analytics to include metrics and reporting or business intelligence.

Preferred qualifications:

  • Certification with CompTIA Security+, CompTIA Network+; CISCO (CCNA); ISC2 (CISSP); SANS (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN).
  • Knowledge of scripting languages (e.g., Python) and data science tools and technologies.
  • Understanding of cyber defense operations to include the incident response, containment, and remediation process, cyber threat intelligence, or security architecture.
  • Understanding of security controls for common platforms and devices, including Windows, Linux and network equipment.