Associate Red Team Security Consultant @ Google
Your Application Journey
Email Hiring Manager
Job Details
About the Associate Red Team Security Consultant Role
This role involves providing cybersecurity consulting services with a focus on red and purple team assessments. You will emulate adversarial cyber attacks, perform penetration tests, conduct wireless, web application, mobile, and social engineering assessments, and develop tools and documentation.
Responsibilities
Perform red team, purple team, and assumed breach assessments, including ransomware readiness reviews. Conduct external and internal wireless assessments, web and mobile application testing, and embedded system assessments. Recognize and safely utilize attacker tools, tactics, and procedures. Collaborate with internal teams to deliver further client value.
Minimum Qualifications
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent.
- Experience in penetration testing and red teaming functions.
- Experience with wireless, web application, and network security tools.
- Ability to travel up to 30% of the time.
Preferred Qualifications
- Offensive security certifications (OSCE, OSCP, etc.).
- Experience assessing and implementing security controls.
- Excellent written and verbal communication skills.
About the Team
Part of Google Cloud, Mandiant is a recognized leader in cyber defense, threat intelligence, and incident response services. You will work with a team that expands its capabilities through tool creation, research on offensive techniques, threat actor intelligence incorporation, internal presentations, and knowledge sharing.
Key skills/competency
- Red teaming
- Penetration testing
- Cybersecurity
- Adversarial simulation
- Tactical assessment
- Social engineering
- Tool development
- Threat intelligence
- Documentation
- Collaboration
How to Get Hired at Google
🎯 Tips for Getting Hired
- Customize your resume: Highlight relevant red teaming experiences.
- Research Google: Understand Google Cloud and Mandiant backgrounds.
- Prepare for technical: Practice penetration testing scenarios.
- Show certifications: Emphasize offensive security credentials.