Principal Threat Analyst, Strategic Intelligence and Government, Mandiant - Google
Not available, MD
About the Job
Note: Google’s hybrid workplace includes remote roles. By applying to this position you will have an opportunity to share your preferred working location from the following:Remote locations: Maryland, USA; District of Columbia, USA.Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form.
Minimum qualifications:
- Bachelor's degree or equivalent practical experience.
- 10 years of experience in a customer-facing analytical role in cyber security (e.g., Network Forensics Analyst, Threat Intelligence Analyst).
- Experience engaging with, and presenting to, technical stakeholders and executive leaders both verbally and in report writing.
- Active US Government Top Secret/Sensitive Compartmentalized Information (TS/SCI) security clearance with polygraph.
Preferred qualifications:
- 10 years of experience evaluating forensic reports of electronic media, packet capture, log data, malware triage, or enterprise-level information security operations.
- Experience with Cyber Threat Intelligence (CTI) methodologies and application within cyber security organizations.
- Experience in deploying and analyzing data from technical security controls (e.g., web proxy, firewalls, IPS, IDS, enterprise antivirus solutions, network analyzers).
- Experience in the analysis of CTI, supporting monitoring, detection, and response capabilities.
- Experience with standard network logging formats, network management systems and network security monitoring systems, and security information and event management.
About the job
This role supports Mandiant’s Advanced Intelligence Access (AIA) program. The AIA program enables customers, via an onsite Cyber Analyst, access to the totality of Mandiant’s Threat Intelligence, including raw data. Each Cyber Analyst ensures the delivery of actionable intelligence to each customer’s security or operational environments in order to drive decision making and action. The Cyber Analyst also acts as a conduit to Mandiant’s extensive network of cyber security, threat intelligence, and information operations professionals. This is an onsite, client-facing position.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.The US base salary range for this full-time position is $156,000-$234,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
- Evaluate tools and best practices for tracking advanced threats, tools, techniques, and procedures (TTPs) of attacker’s motivations, and industry and attacker trends.
- Perform strategic and operational research and analysis of adversarial cyber threats.
- Correlate intelligence to develop deeper understandings of tracked threat activity.
- Present strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity and convey the importance of findings to a variety of audiences.
- Work with customers to determine their intelligence needs and requirements and prepare and deliver briefings and reports to the customers' executives, security team, and fellow analysts.
Source : Google