Watch this video to learn more about Google Inc.
Job Type
Job Details
Google welcomes people with disabilities.
Minimum qualifications:- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
- 4 years of experience with pen testing and red teaming functions, including network, web application, mobile, cloud, social engineering, scripting, or tool development.
- Experience with tools used for wireless, web application, and network security testing.
- Ability to communicate in English and Japanese fluently, as this role involves external and internal-facing engagement in both languages.
Preferred qualifications:
- Certifications related to offensive security including OSCE, OSEP, OSEE, OSCP, CCSAS, CCT, INF, or relevant SANS courses.
- Experience implementing or assessing information security implementation or assessment of security controls.
- Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
As a Mandiant Red Team Consulting team member, you will be responsible for assessing and advising clients on both technical and process-based controls for all manner of environments. You will perform Red and Purple Team assessments, including adversarial emulation of cyber attacks against customer organizations, and other technical cyber assessments including external pen testing, web application, mobile, and wireless security testing. You will expand the team’s capabilities through tool creation, research on offensive techniques, incorporation of threat actor intelligence, internal presentations, and knowledge sharing. This role involves external and internal-facing engagement in both Japanese and English.
- Perform red and purple team assessments, assumed breach assessments (e.g., red team engagements with a pre-deployed implant), ransomware readiness reviews (e.g., assessing susceptibility to modern ransomware threats), threat analysis, and social engineering assessments.
- Conduct external and internal wireless assessments, web and mobile applications testing, and embedded system assessments.
- Recognize and safely utilize attacker tools, tactics, and procedures.
- Advise clients on security best practices for remediating discovered issues.
Build for everyone Since our founding in 1998, Google has grown by leaps and bounds. Starting from two computer science students in a university... Read more