Cyber Defense Analyst
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
About the Cyber Defense Analyst Role at Google
As a Cyber Defense Analyst at Google, you will play a crucial role in enabling efficient and accurate incident response activities and daily tasks within a Cyber Defense Center (CDC). You will collaborate closely with various cross-functional teams, including Security Architects, Security Engineers, Client Information Technology (IT) resources, and other business resource owners. Your primary objective will be to define requirements and deliver recommendations focused on incident response activities to support the client's CDC. Additionally, you may be responsible for the analysis, response, containment, remediation, and long-term improvement of a client's Security Operation Center (SOC) to maintain and transform their incident detection and response capabilities.
In this dynamic role, you will be part of a highly technical team operating in a rapidly changing environment. You will administer a variety of information security technologies, continuously learn new emerging technologies, and be passionate about protecting customer data and corporate assets from sophisticated threats across multiple industries.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence, and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
Minimum Qualifications
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field or equivalent practical experience.
- 5 years of experience in designing and securing multi-cloud environments, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
- 5 years of experience as an SOC analyst, in malware research, threat hunting or similar roles, working with EDR and SIEM technologies.
- Experience leading incident response activities.
Preferred Qualifications
- Certification in one or more of the following: CompTIA Security+, CompTIA Network+, ISC2 (CISSP), SANS-GIAC (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT), CISCO (CCNA), EC-Council (CEH, LPT).
- Experience securing modern cloud-native architectures, including containerization technologies (e.g., Kubernetes, Docker) and serverless computing.
- Knowledge of scripting languages (e.g., PowerShell and Python).
- Understanding of security controls for common platforms and devices, including Linux and network equipment.
- Ability to engage and collaborate with client stakeholders and other groups within the customer environment to manage resolution for security issues.
Responsibilities
- Identify challenges in customer Cyber Defense Centers and formulate strategies for improvement, plan implementation of improvements and execute/oversee plans to completion.
- Conduct real-time analysis using SIEM, endpoint, and network-based technologies with a focus on identifying security events and false positives.
- Advise on CDC, CSIRT, and SOC management activities.
- Research and leverage cybersecurity intelligence sources, attacker techniques, containment methodologies, and remediation processes to improve Security Operation Center (SOC) incident detection and response capabilities.
- Engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.
- Provide consultation and support for deployment and operations of Google SecOps in client environments.
- Act as a Subject Matter Expert (SME) for Cloud Forensics and Incident Response, advising client Security Operations Centers (SOC) on methodologies and techniques.
Key skills/competency
- Cybersecurity
- Incident Response
- SIEM
- EDR
- Threat Hunting
- Cloud Security
- Malware Analysis
- Forensics
- Scripting
- SOC Operations
How to Get Hired at Google
- Research Google's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
- Tailor your resume for Cyber Defense Analyst roles: Highlight your experience in incident response, cloud security, SIEM/EDR, and threat analysis for Google.
- Prepare for technical depth: Showcase expertise in multi-cloud security, containerization, scripting, and forensics relevant to Google.
- Master behavioral questions: Practice STAR method responses demonstrating collaboration, problem-solving, and adaptability.
- Network effectively: Connect with current Google employees and Mandiant experts on LinkedIn for insights into the team.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background