Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
6 years of experience in SOC analyst, malware research, threat hunting, or similar roles, working with EDR and SIEM technologies.
Experience using multiple operating systems, directory service software, and document, spreadsheet, and presentation software.
Experience leading incident response activities.
Nice to haves:
Certification in one or more of the following: CompTIA Security+, CompTIA Network+, ISC2 (CISSP), SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT), CISCO (CCNA), EC-Council (CEH, LPT).
Knowledge of scripting languages (i.e., PowerShell and Python).
Understanding of operating systems, including Windows and Linux.
Understanding of security controls for common platforms and devices, including Windows, Linux, and network equipment.
Ability to engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.
Excellent written and verbal communication skills.
What you'll be doing:
Identify challenges in customer Cyber Defense Centers and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion.
Conduct real-time analysis using SIEM, endpoint, and network-based technologies with a focus on identifying security events and false positives.
Advise on CDC, CSIRT, and SOC management activities.
Research and leverage cybersecurity intelligence sources, attacker techniques, containment methodologies, and remediation processes to improve Security Operation Center (SOC) incident detection and response capabilities.
Engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.
Perks and benefits:
Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services.