Senior Security Engineer, Product Security Engi... @ Google
Your Application Journey
Email Hiring Manager
Job Details
About the Senior Security Engineer, Product Security Engineering, Cloud CISO Role
This role involves protecting network boundaries, hardening systems against attacks, and ensuring high security standards for Google Cloud products. You will perform security assessments, detailed code reviews, and vulnerability testing while working directly with software and network engineering teams.
Key Responsibilities
- Perform security reviews and vulnerability research.
- Design and test secure protocols and systems.
- Guide operational practices and secure engineering processes.
- Utilize reverse engineering, fuzzing, and static analysis techniques.
- Respond to and mitigate security vulnerabilities.
Qualifications
Minimum: Bachelor’s degree or equivalent, 5 years experience in security assessments, coding, and security engineering; proficiency in general purpose programming languages; experience in systems security and cloud infrastructure security.
Preferred: Operating systems internals, kernel security, memory protection, and excellent communication skills.
About Google Cloud
Google Cloud powers digital transformation for enterprises worldwide. Join us to help create safe systems while working on cutting-edge technology across multiple locations including Seattle, WA and New York, NY.
Compensation and Benefits
The US base salary range is $166,000-$244,000 plus bonus, equity, and benefits. Additional compensation factors include location, skills, experience, and education.
Key skills/competency
- Security Assessments
- Threat Modeling
- Code Reviews
- Vulnerability Testing
- Protocol Design
- Reverse Engineering
- Cloud Security
- Network Security
- Kernel Security
- Communication
How to Get Hired at Google
🎯 Tips for Getting Hired
- Research Google: Understand their cloud security culture.
- Customize your resume: Highlight security experience and coding skills.
- Prepare examples: Showcase past security incident resolutions.
- Study protocols: Know industry threat modeling techniques.