In this role, you will understand existing and emerging threat actors, and identify rapidly changing tools, tactics, and procedures of attackers. You will understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and mentor other security consultants.
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.
The US base salary range for this full-time position is $103,000-$151,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Work through client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
Collaborate with internal and customer teams to investigate and contain incidents.
Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
Build scripts, tools, or methodologies to enhance Mandiant’s incident investigation processes.
Develop and present comprehensive and accurate reports, trainings, and presentations for technical and executive audiences.
Note: Google’s hybrid workplace includes remote roles. By applying to this position you will have an opportunity to share your preferred working location from the following:
Remote locations: Virginia, USA; Alabama, USA; Florida, USA; Georgia, USA; North Carolina, USA; South Carolina, USA; Tennessee, USA.
Bachelor's degree in Computer Science, Information Systems, related technical field, or equivalent practical experience.
2 years of experience leading incident response investigations, analysis, and containment actions.
2 years of investigative experience with network forensics, malware triage analysis, and disk and memory forensics in one or more of the following: Windows, macOS, or Linux.
Cloud incident response or forensic experience.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.