7 days ago

Associate Security Analyst, Mandiant Threat Defense

Google

On Site
Full Time
$130,000
Reston, VA

Job Overview

Job TitleAssociate Security Analyst, Mandiant Threat Defense
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary$130,000
LocationReston, VA

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

About the Role: Associate Security Analyst, Mandiant Threat Defense

As an Associate Security Analyst within Google Cloud's Mandiant Threat Defense team, you will be on the front lines of dynamic cyber defense. Mandiant is a recognized leader in threat intelligence and incident response, leveraging unparalleled frontline experience and nation-state grade intelligence to combat advanced threats. This role offers the opportunity to contribute to a critical mission, utilizing cutting-edge tools and a deep understanding of the evolving threat landscape.

Minimum Qualifications

  • Bachelor's degree in Cybersecurity, Information Technology, a related technical field, or equivalent practical experience.
  • 2 years of experience in a SOC environment or information security role.
  • Experience with one or more EDR tools (e.g., Trellix HX) or NDR tools (e.g., Trellix NX).
  • Experience in log analysis to investigate and scope security incidents.

Preferred Qualifications

  • Master's degree in Cybersecurity, Information Technology or relevant experience.
  • Understanding of the stages of the attack life-cycle.

Responsibilities

  • Analyze real-time security events across endpoint, network, and cloud environments using a centralized analyst console and SIEM/Google SecOps platform.
  • Execute basic static and dynamic analysis of suspicious files to determine capabilities.
  • Perform host and network forensic analysis to support incident response efforts, understand attacker activity, and assess customer impact.
  • Determine the severity, impact, and scope of security incidents and compromises.
  • Isolate compromised hosts and stop lateral movement or ransomware propagation.
  • Identify benign patterns (e.g., breach simulations, authorized admin activity) and write logic to suppress them, freeing up the team to focus on threats.
  • Contribute to the improvement of YARA-L rules and detection logic based on the changing Threat Landscape.

Key skills/competency

  • Security Operations Center (SOC)
  • Endpoint Detection and Response (EDR)
  • Network Detection and Response (NDR)
  • Log Analysis
  • Security Incident Response
  • Host Forensics
  • Network Forensics
  • SIEM (Security Information and Event Management)
  • Threat Intelligence
  • YARA-L Rules

Tags:

Associate Security Analyst
SOC Environment
Information Security
EDR Tools
NDR Tools
Log Analysis
Security Incidents
Forensic Analysis
Threat Detection
SIEM
Google SecOps
YARA-L Rules
Trellix HX
Trellix NX
Endpoint Security
Network Security
Cloud Security
Attack Life-cycle
Incident Response
Cybersecurity

Share Job:

How to Get Hired at Google

  • Research Google's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
  • Tailor your resume: Customize your resume to highlight experience in SOC environments, EDR/NDR tools, and log analysis for the Associate Security Analyst role.
  • Showcase incident response skills: Emphasize your ability to perform host/network forensics and analyze security events effectively.
  • Prepare for technical assessments: Practice your knowledge of attack life-cycles, SIEM platforms like Google SecOps, and YARA-L rule creation.
  • Demonstrate problem-solving: Be ready to discuss how you've identified, scoped, and responded to security incidents in past roles.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background