Watch this video to learn more about Google Inc.
Job Type
Job Details
In-office locations: New York, NY, USA; Cambridge, MA, USA.
Remote location(s): Connecticut, USA; Massachusetts, USA; Maine, USA; New Hampshire, USA; New Jersey, USA; New York, USA; Pennsylvania, USA; Rhode Island, USA; Vermont, USA. Minimum qualifications:
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
- 5 years of experience with pen testing and red teaming functions, including network, web application, mobile, cloud, social engineering, scripting, or tool development.
- 3 years of experience with techniques and tools used for wireless, web application, and network security testing.
- Experience delivering offensive security testing engagements.
Preferred qualifications:
- Certifications related to offensive security including OSCE, OSEP, OSEE, OSCP, CCSAS, CCT, INF, or relevant SANS courses.
- Experience in four or more of the following: network protocols, threat intelligence analysis, system and network administration, project management, developing applications, technical incident response processes, source code review, reverse developing.
- Experience implementing or assessing information security implementation or assessment of security controls.
- Excellent communication, collaboration, and relationship management skills.
The Mandiant Team delivers bespoke high value assessments, including adversarial emulation engagements and application security testing. This may involve delivering a Threat Intelligence led Red Team for a large enterprise, preparing command and control infrastructure, developing social engineering, attempting to compromise internet-facing systems, conducting privilege escalation and lateral movement within customer networks, exfiltrating data from the network, while avoiding detection from the customer security operations teams, assessing high value web application against modern threats, or advising the client on best practices regarding cyber defense mechanisms.
- Perform Red and Purple team assessments, assumed breach assessments (e.g., Red Team engagements with a pre-deployed implant), ransomware readiness reviews (e.g., assessing susceptibility to modern ransomware threats), threat analysis, and social engineering assessments. Take an active role in web, cloud and mobile application testing.
- Conduct high quality external/internal network assessments.
- Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Recognize and safely utilize attacker tools, tactics, and procedures.
- Recognize and safely utilize attacker tactics, techniques, and procedures. Communicate findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel.
- Travel up to 20% of the time as needed.
Build for everyone Since our founding in 1998, Google has grown by leaps and bounds. Starting from two computer science students in a university... Read more