Minimum qualifications:
* Bachelor's degree or equivalent practical experience.
* 1 year of experience with security assessments, security design reviews, or threat modeling.
* Experience with security engineering, computer and network security, and security protocols.
Preferred qualifications:
* Certification in Security or similar Cyber Security/Incident Response.
* Experience analyzing, triaging, and remediating common information security incidents.
* Experience with automation via coding.
* Understanding of common attacker tactics, tools, and techniques.
* Ability to work independently, prioritize, and multitask.
* Excellent problem-solving, investigative, and written and verbal communication skills.
About the job
In this role, you will develop and maintain the signals, tools, and infrastructure that are used constantly to help Google evolve to match sophisticated attackers. You will conduct and lead others in security analysis, threat hunting, as well as malware and indicator analysis. You will be responsible for handling all malicious activity on Google's networks and performing deep analysis of threats in enterprise, production, and cloud environments.
The Core team builds the technical foundation behind Google's flagship products. We are owners and advocates for the underlying design elements, developer platforms, product components, and infrastructure at Google. These are the essential building blocks for excellent, safe, and coherent experiences for our users and drive the pace of innovation for every developer. We look across Google's products to build central solutions, break down technical barriers, and strengthen existing systems. As the Core team, we have a mandate and a unique opportunity to impact important technical decisions across the company.
Responsibilities
* Identify security issues and implement and design security controls, tools, and services to improve security systems and processes.
* Analyze security alerts in Security Information and Event Management (SIEM) and other external alert sources.
* Search for anomalous activity via manual hunting.
* Escalate complex/unusual incidents to Detection and Response teams and lead response efforts to low severity incidents.
#J-18808-Ljbffr