Senior Incident Response Consultant, Mandiant, Google Cloud

Mexico; Colombia

Google

Google’s mission is to organize the world's information and make it universally accessible and useful.

View company page


Minimum qualifications:

  • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
  • 5 years of experience working in incident response investigations, analysis, and containment actions.
  • 5 years of experience with network forensics, malware triage analysis, cloud forensics, and disk and memory forensics.
  • Ability to travel up to 30% of the time as required.

Preferred qualifications:

  • Certification in GCFA, GCFE, GNFA, GCIA, GREM, GCIH, GX-FA or equivalent.
  • Experience managing internal and external data breach intrusions, advanced persistent threats, anti-forensic techniques used by threat actors, and complex digital forensic cases.
  • Experience in cloud digital forensics.
  • Excellent written and verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
  • Excellent time and project management skills.

About the job

As a Security Consultant, you will be responsible for helping clients effectively prepare for, proactively mitigate, and detect and respond to cyber security threats. Security Consultants have an understanding of computer science, operating system functionality and networking, cloud services, corporate network environments and how to apply this knowledge to cyber security threats.

As a Security Consultant, you could work on engagements including assisting clients in navigating technically complex and high-profile incidents, performing forensic analysis, threat hunting, and malware triage. You may also test client networks, applications and devices by emulating the latest techniques to help them defend against threats, and will be the technical advocate for information security requirements and provide an in-depth understanding of the information security domain. You will also articulate and present complex concepts to business stakeholders, executive leadership, and technical contributors and successfully lead complex engagements alongside cross functional teams.

In this role, you will understand evolving attacker behavior and motivations, manage client-facing projects, and help train/mentor other security consultants.

Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats.

Responsibilities

  • Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
  • Develop and present comprehensive and accurate reports, trainings, and presentations for both technical and executive audiences.
  • Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.
  • Lead client-facing incident response engagements, communicate and discuss findings and strategy with internal stakeholders including leadership and technical team members.
  • Develop scripts, tools, or methodologies to enhance Mandiant’s incident response processes and capabilities.
Develop scripts, tools, or methodologies to enhance Mandiant’s incident response processes and capabilities.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Cloud Computer Science Cyber defense Forensics GCFA GCFE GCIA GCIH GCP GNFA GREM Incident response Log analysis Malware Strategy Threat intelligence Travel TTPs

Regions: North America South America
Countries: Colombia Mexico
Job stats:  5  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.