10 hours ago

Senior Intelligence Analyst, Google Threat Intelligence

Google

On Site
Full Time
$180,000
Tel Aviv-Yafo, Tel Aviv District, Israel

Job Overview

Job TitleSenior Intelligence Analyst, Google Threat Intelligence
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary$180,000
LocationTel Aviv-Yafo, Tel Aviv District, Israel

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

About the Senior Intelligence Analyst Role at Google Threat Intelligence

As a Senior Intelligence Analyst, you will leverage Google's cutting-edge cyber threat intelligence to empower network defenders and customer cyber threat intelligence (CTI) teams. Your primary mission will be to help customers actively defend against the threats they face. This role involves being embedded onsite with a customer for several days per week, providing direct support and drawing upon the vast resources and expertise of Google Threat Intelligence. You'll contribute to Google's extensive technical skills and CTI knowledge base, utilizing industry-leading tools and data to address customer priority intelligence requirements. Your focus will be on strengthening the customer's CTI defensive mission, assisting their SOC, threat hunters, detection engineers, and CTI analysts in countering threats and ensuring the secure operation of their networks.

Mandiant, a part of Google Cloud, is a recognized leader in dynamic cyber defense, threat intelligence, and incident response. Its cybersecurity expertise is trusted globally, built on unique frontline experience responding to complex breaches, nation-state grade threat intelligence, machine intelligence, and top-tier security validation. Mandiant's unparalleled insight into advanced threats will be a key resource in this role.

Minimum Qualifications

  • Bachelor's degree or equivalent practical experience.
  • 5 years of experience in a customer-facing role within cyber Intelligence and cyber operations.
  • Experience working with security operations functions such as SOC tier 1/2, Hunt teams, executive managers, CISO.
  • Experience analyzing indicators of compromise (IOCs), including sandbox output.
  • Experience working in a government or military environment, developing cyber threat intelligence for network, host and log analysis, to enable the detection and response to cyber threats.

Preferred Qualifications

  • Experience in leveraging cyber threat intelligence to describe, track and develop new intelligence on advanced persistent threats.
  • Experience of conducting or supporting incident response and investigations within enterprise environments.
  • Experience in SOC operations, threat hunting, detection engineering and SOC workflow optimization.
  • Experience of network IDS monitoring, EDR solutions, SIEM and SOAR integration, and managing and contributing CTI into a threat intelligence platform.
  • Understanding of core cyber security concepts, common enterprise IT infrastructure components, operating system internals and networking.
  • Eligible to obtain security clearance in Israel as this can be a client requirement.

Responsibilities

  • Build understanding of the customers' cyber threat intelligence (CTI) requirements. Identify their needs and opportunities for deployment of CTI within their operations to have the greatest defensive impact.
  • Track, research and contribute CTI analysis within Google Threat Intelligence, of customer's priority threat concerns.
  • Enable customer SOC analysts and Hunt teams to deploy and leverage Google's CTI.
  • Generate CTI, and performing analysis of customer data, taking their bespoke sources to identify threat activity, or to build and automate investigative workflows.
  • Support the integration of CTI into customer's security processes and technologies, including SIEM and threat intelligence platform (TIP) systems.
  • Write intelligence reporting against customer requirements, appropriate for their intelligence analysts or executive readers.

Key Skills/Competency

  • Cyber Threat Intelligence (CTI)
  • Security Operations Center (SOC)
  • Incident Response & Investigation
  • Threat Hunting & Detection Engineering
  • Network & Host Analysis
  • SIEM, EDR, SOAR Integration
  • Advanced Persistent Threat (APT) Tracking
  • Customer Engagement & Communication
  • Intelligence Reporting
  • Data Analysis & Automation

Tags:

Senior Intelligence Analyst
Cyber Threat Intelligence
Incident Response
Threat Hunting
Security Operations
Network Defense
CTI Analysis
Executive Reporting
SOC Support
Vulnerability Management
Threat Tracking
SIEM
EDR
SOAR
IDS
Threat Intelligence Platform
Sandbox
Google Cloud
Network Protocols
Operating Systems
Log Management

Share Job:

How to Get Hired at Google

  • Research Google's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
  • Tailor your resume strategically: Highlight cyber intelligence, SOC, and incident response experience with quantitative achievements.
  • Prepare for technical assessments: Focus on CTI frameworks, network security, SIEM/EDR, and threat hunting methodologies.
  • Showcase problem-solving skills: Be ready to discuss complex threat analysis scenarios and your mitigation strategies.
  • Demonstrate strong communication: Practice articulating technical concepts clearly to both technical and executive audiences.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background