Senior ThreatSpace Instructor, Mandiant
- Full Time
- Cyber Security
- Remote-US
- $100K - $200K
Remote Job Description
ThreatSpace is a technology enabled service that allows an organization to assess and develop its security team’s ability to respond to real-world threats in a consequence-free environment. Using a virtual environment that simulates typical IT infrastructure with network segments, workstations, and servers, teams use ThreatSpace to assess their technical capabilities, processes and procedures as they investigate simulated attack scenarios over a three-day engagement.
In this role, you will work in some of the most exciting areas of security consulting on educational projects that have a meaningful impact across industries.You will understand concepts including computer networking, web and native application functionality, operating system functionality, cloud services, corporate network environments and operations. You will learn advanced concepts such as endpoint protection evasion, covert operations and tailored exploit development.
You will quickly assimilate new information as you will face new client environments on a weekly or monthly basis. You will understand all the threat vectors to each environment and properly assess them. You will get to work with some of the best consultants in the industry, allowing you to develop new skills as you progress.
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.
Additional Information:
The US base salary range for this full-time position is $128,000-$192,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
- Deliver classroom and virtual cyber range training to a variety of technical audiences.
- Provide support for cyber range security course curriculum and range development efforts, including product research, providing subject matter expertise, and training content review.
- Assist with updates for course descriptions, syllabus, and other collateral pertaining to external education.
- Interface with clients to address concerns, issues or escalations.
- Develop comprehensive and accurate reports and presentations for both technical and executive audiences.
Note: Google’s hybrid workplace includes remote roles. By applying to this position you will have an opportunity to share your preferred working location from the following:
Remote locations: Colorado, USA; United States.
Minimum qualifications:
- 5 years of experience as a technical trainer, sales engineer, professional services consultant or similar.
- 2 years of experience delivering instructor led training and virtual instructor led training courses in cyber security related topics (e.g., digital forensics, intrusion detection, incident response) to technical audiences.
- Ability to travel internationally up to 50% of the time.
Preferred qualifications:
- Experience presenting findings to various levels of stakeholders.
- Ability to build effective relationships and work collaboratively within all levels of an organization.
- Ability to quickly grasp technical concepts and clearly communicate these technical concepts in live presentations.
- Ability to coach students and assess their technical capabilities, processes, and procedures as they investigate simulated attack scenarios.