Principal Threat Analyst, GTIG Intelligence Delivery, Mandiant
Principal Threat Analyst, GTIG Intelligence Delivery, Mandiant
- linkCopy link
- emailEmail a friend
Remote location: Virginia, USA.
Minimum qualifications:
- Bachelor's degree or equivalent practical experience.
- 8 years of experience in a customer-facing analytical role in cyber security (e.g., Network Forensics Analyst, Threat Intelligence Analyst).
- Experience engaging with, and presenting to, technical stakeholders and executive leaders.
- Experience with project management.
- Active US Government Top Secret/Sensitive Compartmentalized Information (TS/SCI) security clearance.
Preferred qualifications:
- 8 years of experience in an analytical role (e.g., network forensics analyst, intelligence threat analyst, or security engineer/consultant) in a customer facing environment, or 6 years of experience with an advanced degree.
- Experience in using tools for analysis such as intrusion operations, enterprise security controls, log analysis, network flow and traffic analysis, incident response processes, cyber attack lifecycles and models.
- Experience in the consumption, processing, and analysis of tactical (technical) CTI within an operational environment.
- Ability to service strategic, operational, and tactical audiences.
- Excellent Cyber Threat Intelligence (CTI) research, analysis, and report writing skills.
About the job
Mandiant is a recognized leader in cyber security expertise and has earned the trust of security professionals and company executives around the world. Our unique combination of experience, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats better than anyone.
Responsibilities
- Evaluate tools and best practices for tracking advanced threats, tools, techniques, and procedures (TTPs) of attacker’s motivations, and industry and attacker trends.
- Perform strategic, tactical, and operational research and analysis of adversarial cyber threats.
- Correlate intelligence to develop an in-depth understanding of tracked threat activity.
- Present tactical and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity and convey the importance of findings to a variety of audiences.
- Work with customers to determine their intelligence needs and requirements and prepare and deliver briefings and reports to the customers' executives, security team, and fellow analysts.
Information collected and processed as part of your Google Careers profile, and any job applications you choose to submit is subject to Google's Applicant and Candidate Privacy Policy.
Google is proud to be an equal opportunity and affirmative action employer. We are committed to building a workforce that is representative of the users we serve, creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See also Google's EEO Policy, Know your rights: workplace discrimination is illegal, Belonging at Google, and How we hire.
If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form.
Google is a global company and, in order to facilitate efficient collaboration and communication globally, English proficiency is a requirement for all roles unless stated otherwise in the job posting.
To all recruitment agencies: Google does not accept agency resumes. Please do not forward resumes to our jobs alias, Google employees, or any other organization location. Google is not responsible for any fees related to unsolicited resumes.