Senior Intelligence Analyst, Google Threat Intelligence Delivery
Role details
Job location
Tech stack
Job description
In this role, being onsite 3-4 days per week and embedded with a customer several days per week, you will leverage Google's cyber threat intelligence to enable network defenders and customer Cyber Threat Intelligence (CTI) teams to defend against the threats they face. You will be supported and enabled by a network of colleagues and specialists right across Google Threat Intelligence and will contribute to Google's wealth of technical skills and CTI knowledge. You will have access to industry leading tooling and data and will work towards delivering on customer priority intelligence requirements. This role is focused on supporting the customer's CTI defensive mission, helping their SOC, threat hunters, detection engineers, and CTI analysts counter threats and enable the safe and secure running of their networks and operations., * Serve as the Advanced Intelligence Access (AIA) integrator for a customer.
- Build understanding of the customers Cyber Threat Intelligence (CTI) requirements. Identify their needs and opportunities for deployment of CTI within their operations to have the greatest defensive impact.
- Track, research and contribute CTI analysis within Google Threat Intelligence, of customer's priority threat concerns.
- Support the integration of CTI into customer's security processes and technologies, including SIEM and Threat Intelligence Platform (TIP) systems.
- Generate CTI, and perform analysis of customer data, taking their bespoke sources to identify threat activity, or to build and automate investigative workflows.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form.
Requirements
Do you have a Bachelor's degree?, * Bachelor's degree or equivalent practical experience.
- 5 years of experience in a customer-facing role in cyber intelligence and cyber operations.
- Experience working with security operations functions such as SOC tier 1/2, Hunt teams, executive managers, CISO.
- Experience working in a government or military environment, developing cyber threat intelligence for network, host and log analysis, to enable the detection and response to cyber threats.
- Experience analyzing Indicators of Compromise (IOCs) including sandbox output., * Experience in leveraging CTI to describe, track and develop new intelligence on advanced persistent threats.
- Experience of network IDS monitoring, EDR solutions, SIEM and Security Orchestration, Automation and Response (SOAR) integration, and managing and contributing CTI into a Threat Intelligence platform.
- Experience of conducting or supporting incident response and investigations within enterprise environments.
- Experience in SOC operations, threat hunting, detection engineering and SOC workflow optimization.
- Understanding of core cyber security concepts, common enterprise IT infrastructure components, operating system internals and networking., Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.