7 days ago

Cyber Defense Analyst

Google

Hybrid
Full Time
€150,000
Hybrid

Job Overview

Job TitleCyber Defense Analyst
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary€150,000
LocationHybrid

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

About the Cyber Defense Analyst Role at Google

As a Cyber Defense Analyst at Google, you will play a crucial role in enabling efficient and accurate incident response activities and daily tasks within a Cyber Defense Center (CDC). You will collaborate closely with various cross-functional teams, including Security Architects, Security Engineers, Client Information Technology (IT) resources, and other business resource owners. Your primary objective will be to define requirements and deliver recommendations focused on incident response activities to support the client's CDC. Additionally, you may be responsible for the analysis, response, containment, remediation, and long-term improvement of a client's Security Operation Center (SOC) to maintain and transform their incident detection and response capabilities.

In this dynamic role, you will be part of a highly technical team operating in a rapidly changing environment. You will administer a variety of information security technologies, continuously learn new emerging technologies, and be passionate about protecting customer data and corporate assets from sophisticated threats across multiple industries.

Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence, and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.

Minimum Qualifications

  • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field or equivalent practical experience.
  • 5 years of experience in designing and securing multi-cloud environments, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
  • 5 years of experience as an SOC analyst, in malware research, threat hunting or similar roles, working with EDR and SIEM technologies.
  • Experience leading incident response activities.

Preferred Qualifications

  • Certification in one or more of the following: CompTIA Security+, CompTIA Network+, ISC2 (CISSP), SANS-GIAC (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT), CISCO (CCNA), EC-Council (CEH, LPT).
  • Experience securing modern cloud-native architectures, including containerization technologies (e.g., Kubernetes, Docker) and serverless computing.
  • Knowledge of scripting languages (e.g., PowerShell and Python).
  • Understanding of security controls for common platforms and devices, including Linux and network equipment.
  • Ability to engage and collaborate with client stakeholders and other groups within the customer environment to manage resolution for security issues.

Responsibilities

  • Identify challenges in customer Cyber Defense Centers and formulate strategies for improvement, plan implementation of improvements and execute/oversee plans to completion.
  • Conduct real-time analysis using SIEM, endpoint, and network-based technologies with a focus on identifying security events and false positives.
  • Advise on CDC, CSIRT, and SOC management activities.
  • Research and leverage cybersecurity intelligence sources, attacker techniques, containment methodologies, and remediation processes to improve Security Operation Center (SOC) incident detection and response capabilities.
  • Engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.
  • Provide consultation and support for deployment and operations of Google SecOps in client environments.
  • Act as a Subject Matter Expert (SME) for Cloud Forensics and Incident Response, advising client Security Operations Centers (SOC) on methodologies and techniques.

Key skills/competency

  • Cybersecurity
  • Incident Response
  • SIEM
  • EDR
  • Threat Hunting
  • Cloud Security
  • Malware Analysis
  • Forensics
  • Scripting
  • SOC Operations

Tags:

Cyber Defense Analyst
incident response
threat hunting
SOC analysis
cloud security
malware research
SIEM
EDR
forensics
client consultation
cyber defense
Kubernetes
Docker
serverless
Linux
network equipment
PowerShell
Python
Google SecOps
IaaS
PaaS

Share Job:

How to Get Hired at Google

  • Research Google's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
  • Tailor your resume for Cyber Defense Analyst roles: Highlight your experience in incident response, cloud security, SIEM/EDR, and threat analysis for Google.
  • Prepare for technical depth: Showcase expertise in multi-cloud security, containerization, scripting, and forensics relevant to Google.
  • Master behavioral questions: Practice STAR method responses demonstrating collaboration, problem-solving, and adaptability.
  • Network effectively: Connect with current Google employees and Mandiant experts on LinkedIn for insights into the team.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background