Cyber Threat Analyst, Strategic Intelligence and Government, Mandiant

Virginia, USA; District of Columbia, USA

Google

Google’s mission is to organize the world's information and make it universally accessible and useful.

View all jobs at Google


Minimum qualifications:

  • Bachelor's degree or equivalent practical experience.
  • 4 years of experience in a customer-facing analytical role in cyber security (e.g., Network Forensics Analyst, Threat Intelligence Analyst).
  • Experience engaging with, and presenting to, technical stakeholders and executive leaders.
  • Experience with project management.

Preferred qualifications:

  • 4 years of experience evaluating forensic reports of electronic media, packet capture, log data, malware triage, or enterprise-level information security operations.
  • Experience with CTI methodologies and application within cyber security organizations.
  • Experience with standard network logging formats, network management systems and network security monitoring systems, and security information and event management.
  • Experience in the analysis of CTI, support monitoring, detection, and response capabilities.
  • Experience in deploying and analyzing data from technical security controls (e.g., web proxy, firewalls, IPS, IDS, enterprise antivirus solutions, network analyzers).

About the job

Mandiant is a recognized leader in cyber security expertise and has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.

Strategic Intelligence & Government (SIG) drives the strategic direction and public sector growth of Mandiant Threat Intelligence through proactive intelligence delivery, analytic innovation, and trusted mission support that exposes and defeats adversaries.

As an analyst, you will be the primary Mandiant representative supporting a government customer with the goal of developing, supporting, maintaining, and driving the Mandiant Threat Intelligence portfolio.

You will be an expert at balancing priorities, work directly with clients to understand their threat concerns, and to set expectations for deliverables. This is an onsite client-facing position.

Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats.

The US base salary range for this full-time position is $108,000-$158,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.

Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.

Strategic Intelligence & Government (SIG) drives the strategic direction and public sector growth of Mandiant Threat Intelligence through proactive intelligence delivery, analytic innovation, and trusted mission support that exposes and defeats adversaries.

As an analyst, you will be the primary Mandiant representative supporting a government customer with the goal of developing, supporting, maintaining, and driving the Mandiant Threat Intelligence portfolio.

You will be an expert at balancing priorities, work directly with clients to understand their threat concerns, and to set expectations for deliverables. This is an onsite client-facing position.

Responsibilities

  • Evaluate tools and best practices for tracking advanced threats, Tools, Techniques, and Procedures (TTPs) of attacker’s motivations, and industry and attacker trends.
  • Perform strategic, tactical, and operational research and analysis of adversarial cyber threats.
  • Correlate intelligence to develop deeper understandings of tracked threat activity.
  • Present tactical and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity and convey the importance of findings to a variety of audiences.
  • Work with customers to determine their intelligence needs, requirements, and prepare and deliver briefings and reports to the customers' executives, security team, and fellow analysts.
Job stats:  5  0  0

Tags: Antivirus Cloud Cyber defense Firewalls Forensics GCP IDS Incident response IPS Malware Monitoring Network security Threat intelligence TTPs

Perks/benefits: Equity / stock options Salary bonus

Regions: Africa North America
Country: United States

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.