Watch this video to learn more about Google Inc.
Job Type
Job Details
Remote location: Belgium. Minimum qualifications:
- Bachelor's degree or equivalent practical experience.
- 7 years of experience in a consulting or customer-facing role.
- Experience in threat intelligence analysis, application, and reporting outcomes to executive audiences.
- Experience with an operating system (e.g., Linux, Windows) and scripting capabilities in Python or Bash.
- Active NATO Secret or NATO Member State equivalent security clearance to work with Government clients.
Preferred qualifications:
- Experience in the consumption, processing, and analysis of tactical Cyber Threat Intelligence (CTI) within an operational environment, supporting monitoring, detection, and response capabilities.
- Experience engaging with, and presenting to, technical stakeholders and executive leaders both verbally and in report writing.
- Experience with CTI methodologies and application within cyber security organizations.
This role supports Mandiant’s Advanced Intelligence Access (AIA) program. The AIA program enables customers, via an onsite Cyber Analyst, access to the totality of Mandiant’s Threat Intelligence, including raw data. Each Cyber Analyst ensures the delivery of actionable intelligence to each customer’s security or operational environments in order to drive decision making and action. The Cyber Analyst also acts as a conduit to Mandiant’s extensive network of cyber security, threat intelligence, and information operations professionals. Position requires onsite client facing work four - five days a week in either Brussels or Mons, Belgium.
- Evaluate tools and best practices for tracking advanced threats, tools, techniques, and procedures (TTPs) of attacker’s motivations, and industry and attacker trends.
- Perform strategic, tactical, and operational research and analysis of adversarial cyber threats.
- Correlate intelligence to develop deeper understandings of tracked threat activity.
- Present tactical and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity and convey the importance of findings to a variety of audiences.
- Work with customers to determine their intelligence needs and requirements and prepare and deliver briefings and reports to the customers' executives, security team, and fellow analysts.
Build for everyone Since our founding in 1998, Google has grown by leaps and bounds. Starting from two computer science students in a university... Read more