Watch this video to learn more about Google Inc.
Job Type
Job Details
- Bachelor's degree or equivalent practical experience.
- 5 years of experience with security assessments or security design reviews or threat modeling.
- 5 years of experience with security engineering, computer and network security and security protocols.
- 5 years of coding experience in one or more general purpose languages.
Preferred qualifications:
- Certification in CISSP or similar Cyber Security/Incident Response.
- Experience analyzing, triaging, and remediating common information security incidents.
- Experience with automation via coding or scripting.
- Understanding of common attacker tactics, tools, and techniques.
- Ability to work separately, prioritize, and multitask.
- Excellent problem-solving, investigative, and written and verbal communication skills.
Our Security team works to create and maintain the safest operating environment for Google's users and developers. Security Engineers work with network equipment and actively monitor our systems for attacks and intrusions. In this role, you will also work with software engineers to proactively identify and fix security flaws and vulnerabilities.
Our Security team works to create and maintain the safest operating environment for Google's users and developers. As a Security Engineer, you will monitor our systems for threats, attacks and intrusions. In this role, you will work with teams across Google to proactively identify, triage and fix security flaws and vulnerabilities, ensuring threats posed by software and infrastructure vulnerabilities are resolved.
- Establish and mature cross-company processes around vulnerability management including operating models, maturity models, Service Level Agreement (SLA)/Service Level Objectives (SLOs), discovery, managing and reporting processes, roles/responsibilities, etc.
- Coordinate resolution of issues cross-company that arise from vulnerabilities, working with internal and industry stakeholders to comprehensively remediate security risk.
- Work with industry partners in the vulnerability coordination space, including working groups, standards bodies, Common Vulnerabilities and Exposures issuance, etc.
- Ensure compliance with legal mandates and internal Security and Privacy policies.
- Automate security workflows and develop appropriate tooling and processes.
Build for everyone Since our founding in 1998, Google has grown by leaps and bounds. Starting from two computer science students in a university... Read more