Senior Analyst, Advanced Practices, Mandiant
- Full Time
- Cyber Security
- Remote-US
- $150K - $200K
Remote Job Description
In this role, you will track all impactful adversaries by collecting, modeling, and investigate data originating from thousands of investigations conducted by Mandiant, third-party telemetry, as well as novel sources and methods. Mandiant’s recently released campaigns feature in the Mandiant Advantage SaaS platform provides security professions with a quick way to stay updated on active campaigns affecting their industries and regions.
Google Cloud accelerates organizations’ ability to digitally transform their business with the best infrastructure, platform, industry solutions and expertise. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology – all on the cleanest cloud in the industry. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.
Salary Range Info:
Salary Range Info:
The US base salary range for this full-time position is $126,000-$189,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
- Be the expert in tracking and assessing impactful adversaries by detangling complicated investigative efforts using all-source data
- Investigate technical data to extrapolate adversary methodologies and identifiable characteristics worthy of modeling and highlighting within tracked campaigns
- Provide a comprehensive understanding of the adversary’s tactics, techniques and procedures in a holistic sense while combining different datasets for maximum impact
- Work with multiple expert teams simultaneously in stressful and fast-breaking environments to assess, cluster, and attribute seemingly disparate activity into related intrusions and campaigns
- Communicate investigative findings through curating and modeling data, providing customer-facing attribution intelligence, and publishing tracked campaigns along with key context and analysis
Qualifications
Minimum qualifications:
- 5 years of experience in an investigative role either network forensics, cyber threat analysis, or Incident Response
- 5 years of experience in direct delivery of technical information to clients or the public in reports or presentations
- Experience with graph theory, static/dynamic malware analysis, encoding, decoding, network flow, traffic analysis, log and email analysis
Preferred qualifications:
- Experience in commercial data sources (internet scan data, passive DNS, domain registry, malware repositories)
- Experience working in fast-paced and continuously changing environments coupled with the ability to present written or verbal information to technical and non-technical audiences
- Experience in Windows, MacOS, Linux operating system and memory forensics
- Ability to manage expectations with executive stakeholders and team members
- Strong problem solving, troubleshooting, and analysis skills related to Incident Response, Enterprise security controls and Intrusion Operations
- Current, active US Government Top Secret/ Sensitive Compartmentalized Information Clearance
Note: Google’s hybrid workplace includes remote roles.
Remote location: United States.
Remote location: United States.