
STS Cyber Defense Security Engineer, Mandiant, Google Cloud
- Wyoming
- $108,000-155,000 per year
- Permanent
- Full-time
Note: Google's hybrid workplace includes remote roles. By applying to this position you will have an opportunity to share your preferred working location from the following:Remote locations: Alaska, USA; Alabama, USA; Arkansas, USA; Arizona, USA; California, USA; Colorado, USA; Connecticut, USA; District of Columbia, USA; Delaware, USA; Florida, USA; Georgia, USA; Hawaii, USA; Iowa, USA; Idaho, USA; Illinois, USA; Indiana, USA; Kansas, USA; Kentucky, USA; Louisiana, USA; Massachusetts, USA; Maryland, USA; Maine, USA; Michigan, USA; Minnesota, USA; Missouri, USA; Mississippi, USA; Montana, USA; North Carolina, USA; North Dakota, USA; Nebraska, USA; New Hampshire, USA; New Jersey, USA; New Mexico, USA; Nevada, USA; New York, USA; Ohio, USA; Oklahoma, USA; Oregon, USA; Pennsylvania, USA; Rhode Island, USA; South Carolina, USA; South Dakota, USA; Tennessee, USA; Texas, USA; Virginia, USA; Vermont, USA; Washington, USA; Wisconsin, USA; West Virginia, USA; Wyoming, USA.Minimum qualifications:
- Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
- 3 years of experience in a Detection Engineering or related role.
- Experience with detection tuning and creation leveraging various security tools (e.g., SIEM, EDR, or NDR tools).
- One or more of the following certifications or similar: CompTIA Security+, CompTIA Network+; CISCO (CCNA); ISC2 (CISSP); SANS (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN).
- Experience administering or implementing any other security platform (WAF, MFA, Privilege Access Management, TVM scanner, SIEM).
- Knowledge of scripting languages (e.g., PowerShell and Python).
- Understanding of cyber defense operations to include the incident response, containment, and remediation process, cyber threat intelligence, or security architecture.
- Understanding of logging for common platforms and devices, including operating systems, Linux, and network equipment.
- Excellent written and verbal communication skills.
- Identify challenges in customer Cyber Defense Centers and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion.
- Create and modify EDR and SIEM use cases and detection logic, leveraging cyber threat intelligence, written in technology-specific query language or Sigma open signature format.
- Provide expertise for EDR, SIEM and other SOC technologies that assist in incident response. Advise on technologies relied upon by the client CDC, CSIRT, and SOC.
- Measure and improve alert fidelity through metrics creation, tracking, responding to tuning requests, implementing incident-specific detection logic, etc.
- Engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.