Watch this video to learn more about Google Inc.
Job Type
Job Details
Note: By applying to this position you will have an opportunity to share your preferred working location from the following: Boulder, CO, USA; San Francisco, CA, USA. Minimum qualifications:
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
- 2 years of experience with penetration testing and red teaming functions, including network, web application, mobile, cloud, social engineering, scripting, or tool development.
- Experience with tools used for wireless, web application, and network security testing.
Preferred qualifications:
- Certifications related to offensive security including OSCE, OSEP, OSEE, OSCP, CCSAS, CCT, INF, or relevant SANS courses.
- Experience in Hack the Box, Proving Grounds, CRTO, BOF, Aggressor, Windows Internals, Cobalt Strike, Active Directory, Hacking, Metasploit, Sliver, Rubeus, Kerberos, AD CS, SCCM, EDR, Malware Dev, CTF, AppSec, CCDC, CPTC, OSWE, OSED, Bsides, Defcon, Blackhat, Vulnhub.
- Experience implementing or assessing information security implementation or assessment of security controls.
- Knowledge of tools used for wireless, web application, and network security testing.
- Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
In this role, you will be responsible for assessing and advising clients on both technical and process-based controls for all manner of environments. You will perform Red and Purple Team assessments, including adversarial emulation of cyber attacks against customer organizations, and other technical cyber assessments including external pen testing, web application, mobile, and wireless security testing. You will expand the team’s capabilities through tool creation, research on offensive techniques, incorporation of threat actor intelligence, internal presentations, and knowledge sharing.
- Perform red and purple team assessments, penetration tests, ransomware readiness reviews (e.g., assessing susceptibility to modern ransomware threats), threat analysis, and social engineering assessments.
- Conduct external and internal penetration tests, wireless assessments, web, cloud, mobile applications, and embedded system assessments.
- Develop comprehensive and accurate reports and presentations for both technical and executive audiences.
- Recognize and safely utilize attacker tools, tactics, and procedures.
- Communicate findings, strategy, and remediation guidance to client stakeholders including technical staff, executive leadership, and legal counsel.
![](https://assets.powertofly.com/thumbnail/5abb73c7116b4bd5bac02be7491efa47.jpeg)
Build for everyone Since our founding in 1998, Google has grown by leaps and bounds. Starting from two computer science students in a university... Read more