4 days ago

Senior Threat Intelligence Analyst, Mandiant

Google

Hybrid
Full Time
€130,000
Hybrid

Job Overview

Job TitleSenior Threat Intelligence Analyst, Mandiant
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary€130,000
LocationHybrid

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

Senior Threat Intelligence Analyst, Mandiant

This position requires onsite client-facing work 3-4 days a week in Luxembourg.

Note: Google's hybrid workplace includes remote roles. Remote location: Luxembourg.

About The Job

In this role, you will support Mandiant’s Advanced Intelligence Access (AIA) program. The AIA program enables customers, via dedicated cyber analyst, access to the totality of Mandiant Threat Intelligence, including raw data. You will ensure the delivery of actionable intelligence to each customer’s security or operational environments in order to drive decision making and action. You will also act as a conduit to Mandiant’s extensive network of cybersecurity, threat intelligence, and information operations professionals. This is a client-facing position.

Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.

Responsibilities

  • Embed within and build understanding of customers Cyber Threat Intelligence (CTI) requirements, identifying their needs and opportunities for deployment of CTI within their operations to have defensive impact.
  • Track, research and contribute CTI analysis within Google Threat Intelligence, addressing customer priority threat concerns.
  • Write intelligence reports against customer requirements, appropriate for their intelligence analysts or readers.
  • Generate CTI and perform analysis of customer data, taking their bespoke sources to identify threat activity, or to build and automate problem-solving workflows.
  • Support the integration of CTI into customer's security processes and technologies, including SIEM and Threat Intelligence Platform (TIP) systems, enabling customer SoC analysts and Hunt teams to deploy and leverage Google's CTI.

Minimum qualifications:

  • Bachelor's degree or equivalent practical experience.
  • 5 years of experience in a customer-facing investigative role in cyber security (e.g., network forensics analyst, threat intelligence analyst).
  • Experience with project management.
  • Experience engaging with, and presenting to, technical stakeholders and executive leaders.
  • Experience working in a government or military environment, leveraging and developing CTI for network, host and log analysis, to enable the detection and response to cyber threats.
  • Ability to communicate in English and French fluently in order to work in this client-facing role.

Preferred qualifications:

  • 7 years of experience evaluating forensic reports of electronic media, packet capture, log data, malware triage, or enterprise-level information security operations.
  • Experience with CTI methodologies and application within cyber security organizations.
  • Experience in the consumption, processing, and analysis of tactical Cyber Threat Intelligence (CTI) within an operational environment, supporting monitoring, detection, and response capabilities.
  • Experience with standard network logging formats, network management systems and network security monitoring systems, and security information and event management.

Key skills/competency

  • Threat Intelligence
  • Cybersecurity Analysis
  • Network Forensics
  • Incident Response
  • SIEM (Security Information and Event Management)
  • TIP (Threat Intelligence Platform)
  • Log Analysis
  • Malware Triage
  • Client Engagement
  • Project Management

Tags:

Senior Threat Intelligence Analyst
Threat Intelligence
Cyber Security
Incident Response
Network Forensics
Log Analysis
Client Engagement
Project Management
Report Writing
Data Analysis
Threat Detection
SIEM
TIP
Network Management Systems
Network Security Monitoring
Malware Triage Tools
Packet Capture
Log Data Analysis Tools
Forensic Reports
Cyber Threat Intelligence

Share Job:

How to Get Hired at Google

  • Research Google and Mandiant's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
  • Tailor your resume for Google: Highlight expertise in cybersecurity investigations, CTI, and client-facing roles.
  • Showcase language proficiency: Emphasize fluent English and French for client interaction.
  • Prepare for technical assessments: Expect in-depth questions on network forensics, SIEM, and threat analysis.
  • Demonstrate leadership skills: Illustrate experience managing complex security projects and engaging executives.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background