Watch this video to learn more about Google Inc.
Job Type
Job Details
In-office locations: Chicago, IL, USA.
Remote location(s): Illinois, USA; Indiana, USA; Kansas, USA; Michigan, USA; Minnesota, USA; Missouri, USA. Minimum qualifications:
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
- Internship, co-op, or equivalent experience in cybersecurity in one of the following areas: network security, wireless security, web application assessments, social engineering, scripting, cloud security, reverse engineering, or incident response.
- Experience with incident response investigations, analysis, and containment actions.
Preferred qualifications:
- Certifications in cloud platforms.
- Experience in Cloud incident response or forensic.
- Experience in security competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
- Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
- Excellent time and project management skills.
As an Associate Incident Response Security Consultant, you will provide industry-leading incident response, assessment, transformation, managed detection and response, and training services with in-depth tactical support. You will help organizations effectively detect and respond to threats and reduce the overall impact of business risk before, during, and after an incident. You'll be able to resolve security incidents quickly, effectively and at scale with complete incident response including investigation, containment, remediation, and crisis management. In this role, you will work on engagements including assisting clients in navigating technically complex and high-profile incidents, performing forensic analysis, threat hunting, and malware triage.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
- Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
- Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.
- Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence, and investigate and contain incidents.
- Build scripts, tools, or methodologies to enhance Mandiant’s incident investigation processes and capabilities.
- Develop and present comprehensive and accurate reports, trainings, and presentations for both technical and executive audiences.