Watch this video to learn more about Google Inc.
Job Type
Job Details
Note: Google’s hybrid workplace includes remote roles. By applying to this position you will have an opportunity to share your preferred working location from the following:
Remote locations: Washington, USA; Alaska, USA; Arizona, USA; California, USA; Colorado, USA; Idaho, USA; Montana, USA; New Mexico, USA; Nevada, USA; Oregon, USA; Utah, USA; Wyoming, USA. Minimum qualifications:
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
- 4 years of experience assessing and developing cybersecurity solutions and programs across security domains.
- 4 years of experience with identity and access management (IAM).
- Ability to travel up to 20% of the time.
Preferred qualifications:
- Certifications related to specific Cloud Platforms Industry-standard cloud certifications (e.g., CCSP, CCSK, etc.), or other industry certifications (e.g., CISSP, CISM, CISA, etc.).
- Experience working with IAM platforms such as Ping Identity, Active Directory OpenLDAP, OpenDJ. Experience with emerging trends in IAM, including adaptive authentication, behavioral analytics, and zero trust architectures.
- Experience in data classification and governance frameworks.
- Knowledge of privileged access management (PAM) tools and practices.
- Knowledge of advanced IAM solutions such as SailPoint, Entitle, Saviynt, Authomize, and similar platforms.
- Understanding of AI developments and their implications for IAM.
As a Security Consultant, you will be responsible for helping clients effectively prepare for, proactively mitigate, and detect and respond to cyber security threats. Security Consultants have an understanding of computer science, operating system functionality and networking, cloud services, corporate network environments and how to apply this knowledge to cyber security threats.
As a Security Consultant, you could work on engagements including assisting clients in navigating technically complex and high-profile incidents, performing forensic analysis, threat hunting, and malware triage. You may also test client networks, applications and devices by emulating the latest techniques to help them defend against threats, and will be the technical advocate for information security requirements and provide an in-depth understanding of the information security domain. You will also articulate and present complex concepts to business stakeholders, executive leadership, and technical contributors and successfully lead complex engagements alongside cross functional teams.
- Develop roadmaps and recommendations to drive client enhancements of their cloud security architecture, governance, and standards.
- Lead execution of consulting engagements and development of deliverables from start to finish. Work with other team members to produce prioritized results aligned to client needs and risk profile.
- Develop IAM policies, procedures, and standards in compliance with industry regulations.
- Provide necessary insights and thought leadership to support client acquisition and management of necessary resources to support all IAM functions, including leadership support, financial resources, and key security personnel, to support IT enterprise goals, and reduce overall organizational risk.
- Work with clients to develop an infrastructure business strategy for IAM technologies. Identify opportunities to enhance performance (productivity and efficiency) of client IAM programs (people, process and technology).
Build for everyone Since our founding in 1998, Google has grown by leaps and bounds. Starting from two computer science students in a university... Read more