Cyber Defense Senior Analyst, SOC
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
Cyber Defense Senior Analyst, SOC at Google
The application window will be open until at least February 27, 2026. This opportunity will remain online based on business needs which may be before or after the specified date.
Note: Google's hybrid workplace includes remote roles. By applying to this position you will have an opportunity to share your preferred working location from the following:
Remote locations: Illinois, USA; United States.
About the Role
In this role, you will be responsible for enabling efficient and accurate incident response activities and daily tasks within a Cyber Defense Center (CDC). You will collaborate with multiple cross-functional teams like Mandiant Architects, Mandiant Engineers, Client Information Technology (IT) resources, and other business resource owners, to define requirements and deliver recommendations focused on incident response activities to support the client's CDC. In addition, you may be responsible for the analysis, response, containment, remediation, and long-term improvement of a client's SOC in order to maintain and transform incident detection and response capabilities. You will enjoy working as a member of a highly technical team in a changing environment, and will be experienced in administering a variety of information security technologies, excited to learn new emerging technologies, and passionate about protecting customer data and corporate assets from the threats facing multiple industries. Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
Responsibilities
- Identify issues in customer Cyber Defense Centers and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion.
- Conduct real-time analysis using Security Information and Event Management (SIEM), Endpoint, and Network based technologies with a focus on identifying security events and false positives.
- Advise on CDC, CSIRT, and SOC Management activities.
- Research and leverage cybersecurity intelligence sources, attacker techniques, containment methodologies, and remediation processes to improve Security Operation Center (SOC) incident detection and response capabilities.
- Engage and collaborate with client stakeholders and other groups within customer environment to drive resolution for security issues.
Minimum Qualifications
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
- 5 years of experience working in an SOC analyst, malware research, threat hunting, or similar role working with EDR and SIEM technologies.
- Experience with networking, including TCP/IP protocols and network topology.
- Experience leading incident response activities.
- Experience with windows server, active directory, and O365.
Preferred Qualifications
- Certification in one or more of the following: CompTIA Security+, CompTIA Network+, ISC2 (CISSP), SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT), CISCO (CCNA), EC-Council (CEH, LPT).
- Knowledge of scripting languages (e.g., PowerShell and Python).
- Understanding of operating systems and security controls for common platforms and devices, including Windows, Linux and network equipment.
- Ability to simplify and communicate ideas.
- Excellent people management, verbal and written communication skills.
Key skills/competency
- SOC Analysis
- Incident Response
- SIEM
- EDR
- Threat Hunting
- Networking
- TCP/IP Protocols
- Windows Server
- Active Directory
- O365
How to Get Hired at Google
- Research Google's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
- Tailor your resume: Highlight extensive experience in SOC analysis, incident response, SIEM, and EDR technologies.
- Master technical skills: Showcase expertise in networking, Windows Server, Active Directory, O365, and scripting with PowerShell or Python.
- Prepare for behavioral interviews: Practice articulating problem-solving, collaboration, and adaptability in fast-paced security environments.
- Network effectively: Connect with Google employees and Mandiant team members on LinkedIn for insights and potential referrals.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background