Minimum qualifications:
- Bachelor's degree or equivalent practical experience.
- 2 years of experience in data analysis, including identifying trends, generating summary statistics, and drawing insights from data.
- 2 years of experience managing projects and defining project scope, goals, and deliverables.
- Ability to communicate in English and Spanish fluently to support client relationship management in this region.
- Ability to work non-standard hours and work rotations/shifts, including night shifts as required.
- Certification in Security+ or similar Cyber Security/Incident Response.
- Experience with automation via coding or scripting.
Want more jobs like this?
Get jobs in Mexico City, Mexico delivered to your inbox every week.
Ability to work separately, prioritize, and multitask.
About the job
In this role, you will create and maintain the safest operating environment for Google's users and developers. You will defend network boundaries, keep computer systems and network devices hardened against attacks and provide security services to protect sensitive data (e.g., passwords and customer information). You will monitor our systems for attacks and intrusions and work to proactively identify flaws and vulnerabilities.
The Core team builds the technical foundation behind Google's flagship products. We are owners and advocates for the underlying design elements, developer platforms, product components, and infrastructure at Google. These are the essential building blocks for excellent, safe, and coherent experiences for our users and drive the pace of innovation for every developer. We look across Google's products to build central solutions, break down technical barriers and strengthen existing systems. As the Core team, we have a mandate and a unique opportunity to impact important technical decisions across the company.
Responsibilities
- Search for anomalous activity via manual hunting at Alphabet scale.
- Escalate unusual incidents to Detection and Response teams.
- Lead response efforts to low severity incidents.
- Support the response to high and medium severity security incidents as directed.
- Analyze security alerts in Security Information and Event Management (SIEM) and other external alert sources.