Los Angeles, CA, 90006, USA
13 days ago
Cyber Defense Senior Detection Engineer, Mandiant, Google Cloud
The application window will be open until at least May 1, 2025. This opportunity will remain online based on business needs which may be before or after the specified date. Applicants in the County of Los Angeles: Qualified applications with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. Minimum qualifications: + Bachelor's degree in Computer Science, Information Systems, Cyber Security, related technical field, or equivalent practical experience. + 6 years of experience in a Detection Engineering or related role, working with Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) technologies. + Experience using multiple operating systems, directory service software, and document, spreadsheet, and presentation software. + Experience with detection tuning and creation leveraging various security tools including SIEM, EDR, or NDR tools. Preferred qualifications: + Experience with content engineering inside SIEM platforms (e.g., rule creation, advanced correlation searching, etc.). + Experience with SPL, KQL, YARA-L, Kusto or similar SIEM query languages, with an understanding of SIEM log flow, aggregation, and forwarding. + Knowledge of scripting languages (e.g., PowerShell and Python). + Understanding of logging for common platforms and devices, including Windows, Linux and network equipment. + Ability to engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues. + Excellent written and verbal communication skills. In this role, you will be responsible for enabling the technology and tools required to accomplish daily tasks within a Cyber Defense Center (CDC). You will collaborate with multiple cross-functional teams such as Security Architects, Security Analysts, Client Information Technology (IT) resources, and other business resource owners, to define requirements and deliver recommendations focused on technologies required to support the client's CDC. In addition, you will be responsible for maintaining the operational readiness of client SIEM, creating detection content, identifying areas for improvement, and setting appropriate configurations of the SIEM or related response technologies required for a client's security operations center (SOC) to maintain effective incident detection and response capabilities. You will also work as a member of a highly technical team in a rapidly changing environment, administer a variety of information security technologies, learn new emerging technologies, and be passionate about protecting customer data and corporate assets from the threats facing multiple industries. Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone. The US base salary range for this full-time position is $132,000-$194,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process. Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google (https://careers.google.com/benefits/) . + Identify challenges in customer Cyber Defense Centers and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion. + Create and modify SIEM use cases and detection logic, leveraging cyber threat intelligence, written in technology-specific query language or Sigma open signature format. + Provide expertise for SIEM and other SOC technologies that assist in incident response. + Measure and improve alert fidelity through metrics creation, tracking, responding to tuning requests, implementing incident-specific detection logic, etc. + Engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues. Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also https://careers.google.com/eeo/ and https://careers.google.com/jobs/dist/legal/OFCCP_EEO_Post.pdf If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form: https://goo.gl/forms/aBt6Pu71i1kzpLHe2.
Por favor confirme su dirección de correo electrónico: Send Email