Security Operations Center Advisor, Cyber Defense

3 Hours ago • 2 Years + • Cyber Security

About the job

SummaryBy Outscal

Must have:
  • Bachelor's degree in related field or experience
  • 2+ years SOC analyst experience
  • EDR/SIEM experience
  • Incident response leadership
  • Experience with multiple OS and software
Good to have:
  • Understanding of security controls for Linux and network equipment
  • Linux OS knowledge
  • Scripting (PowerShell, Python)
  • Excellent communication and people management skills
Perks:
  • Bonus
  • Equity
  • Benefits
Not hearing back from companies?
Unlock the secrets to a successful job application and accelerate your journey to your next opportunity.

Minimum qualifications:

  • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
  • 2 years of experience working as a SOC analyst in malware research, threat hunting, or similar role working with Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) technologies.
  • Experience using multiple operating systems, directory service software, and document, spreadsheet, and presentation software.
  • Experience leading incident response activities.

Preferred qualifications:

  • Understanding of security controls for common platforms and devices, including Linux and network equipment.
  • Understanding of operating systems, including Linux.
  • Knowledge of scripting languages (e.g., PowerShell and Python).
  • Ability to simplify and communicate complex ideas.
  • Excellent communication and people management skills.

About the job

As a Security Operations Center (SOC) Advisor, you will be responsible for enabling efficient and accurate incident response activities and daily tasks within a Cyber Defense Center (CDC). You will collaborate with multiple cross-functional teams like Mandiant Architects, Mandiant Engineers, client Information Technology (IT) resources, and other business resource owners, to define requirements and deliver recommendations focused on incident response activities to support the client's CDC. In addition, you may be responsible for the analysis, response, containment, remediation, and long-term improvement of a client's SOC in order to maintain and transform incident detection and response capabilities.

In this role, you will be a member of a highly technical team in a rapidly changing environment, be experienced in administering a variety of information security technologies, excited to learn new emerging technologies, and passionate about protecting customer data and corporate assets from the diverse threats facing multiple industries.

Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.

The US base salary range for this full-time position is $105,000-$154,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.

Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about .

Responsibilities

  • Identify challenges in customer CDCs and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion.
  • Conduct real-time analysis using SIEM, Endpoint, and Network based technologies with a focus on identifying security events and false positives.
  • Advise on CDC, CSIRT, and SOC Management activities.
  • Research and leverage cyber security intelligence sources, attacker techniques, containment methodologies, and remediation processes to improve SOC incident detection and response capabilities.
  • Engage and collaborate with client stakeholders and other groups within customer environment to drive resolution for security issues.
View Full Job Description
$105.0K - $154.0K/yr (Outscal est.)
$129.5K/yr avg.
Worldwide

About The Company

A problem isn't truly solved until it's solved for all. Googlers build products that help create opportunities for everyone, whether down the street or across the globe. Bring your insight, imagination and a healthy disregard for the impossible. Bring everything that makes you unique. Together, we can build for everyone.

View All Jobs

Level Up Your Career in Game Development!

Transform Your Passion into Profession with Our Comprehensive Courses for Aspiring Game Developers.

Job Common Plug