Security Engineer Consultant, SOAR, Mandiant, Google Cloud

GoogleApplyPublished 18 hours agoFirst seen 18 hours ago
Apply

As a Security Engineer Consultant for SOAR, you will be responsible for enabling the technology and tools required to effectively automate and orchestrate daily tasks within a cyber defense center (CDC). You'll collaborate with multiple cross-functional teams like Mandiant Architects, Mandiant Analysts, Client Information Technology (IT) resources, and other business resource owners to define requirements and deliver recommendations focused on technologies, processes, scripting, and improvements required to support automation tasks within a CDC. In addition, you may be responsible for maintaining the operational readiness of client SOAR, creating new automations, identifying areas for improvement, and setting appropriate configurations of the SOAR or related automation and response technologies required for a client's SOC to maintain effective incident detection and response capabilities.

Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.

The US base salary range for this full-time position is $108,000-$155,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.

Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.

Responsibilities

  • Identify challenges in customer cyber defense centers and formulate strategies for improvement, identify candidates for automation, plan implementation of improvements, and execute/oversee plans to completion.
  • Advise on technologies relied upon by the client CDC, CSIRT, and SOC.
  • Provide expertise for SOAR and other SOC technologies that assist in incident response.
  • Create and modify SOAR playbooks written in Python.
  • Engage and collaborate with client stakeholders and other groups within customer environment to drive resolution for security issues.

Minimum qualifications:

  • Bachelor's degree in Computer Science, Information Systems, Cybersecurity or related technical field or equivalent practical experience.
  • 3 years of experience configuring and maintaining security orchestration, automation, and response (SOAR) technologies as part of security engineering, system administration, or a similar role.
  • 3 years of experience working with SOC/CSIRT or other incident response related teams.
  • Experience with security information and event management (SIEM) solutions (e.g., writing queries, searches, alerts, dashboards).
  • Experience with scripting (e.g., Python).

Preferred qualifications:

  • One or more of the following certifications or similar: CompTIA Security+, CompTIA Network+; CISCO (CCNA); ISC2 (CISSP); SANS (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN).
  • Experience managing and maintaining SOAR platforms and their dependencies, and working with/integrating APIs into automation playbooks.
  • Experience with commercial SIEM technologies (e.g., Google SecOps, Splunk, Helix, Devo, Sentinel).
  • Understanding of security controls for platforms/devices (e.g., Windows, Linux, network equipment), web-based APIs/RESTful programming (e.g., Python libraries), and data manipulation/analysis libraries (e.g., Pandas).
  • Understanding of the incident response, containment, and remediation process.