Minimum qualifications:
- 6 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
- 6 years of experience working end-to-end incident response investigations, analysis, or containment actions.
- Ability to communicate in English fluently to work with internal partners and customer teams.
- Experience working in fast-paced and continuously changing environments.
- Knowledge of tools used in pen testing, security event analysis, incident response, computer forensics, network and endpoint architecture, or other security operational areas.
- Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Want more jobs like this?
Get Project Management jobs delivered to your inbox every week.
About the job
As a Principal Incident Response Security Consultant, you will provide industry-leading incident response, assessment, transformation, managed detection and response, and training services with in-depth tactical support. You will help organizations effectively detect and respond to threats and reduce the overall impact of business risk before, during, and after an incident. You'll be able to resolve security incidents quickly, effectively and at scale with complete incident response including investigation, containment, remediation, and crisis management. In this role, you will work on engagements including assisting clients in navigating technically complex and high-profile incidents, performing forensic analysis, threat hunting, and malware triage.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats.
The US base salary range for this full-time position is $161,000-$241,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
Responsibilities
- Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
- Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.
- Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
- Collaborate with internal and customer teams to investigate and contain incidents.
- Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.