9,014 Mandiant jobs in the United States
Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

Posted today
Job Viewed
Job Description
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

Posted today
Job Viewed
Job Description
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
Mandiant Incident Response Practice Leader, Mandiant Consulting (English)
Posted 2 days ago
Job Viewed
Job Description
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
Mandiant Incident Response Practice Leader, Mandiant Consulting (English)
Posted 2 days ago
Job Viewed
Job Description
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
Mandiant Incident Response Practice Leader, Mandiant Consulting (English)
Posted 2 days ago
Job Viewed
Job Description
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
Mandiant Incident Response Practice Leader, Mandiant Consulting (English)
Posted 2 days ago
Job Viewed
Job Description
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
Mandiant Incident Response Practice Leader, Mandiant Consulting (English)
Posted 2 days ago
Job Viewed
Job Description
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
Be The First To Know
About the latest Mandiant Jobs in United States !
Mandiant Incident Response Practice Leader, Mandiant Consulting (English)
Posted 2 days ago
Job Viewed
Job Description
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
Mandiant Incident Response Practice Leader, Mandiant Consulting (English)
Posted 2 days ago
Job Viewed
Job Description
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
Senior Security Engineer, Mandiant & Proofpoint
Posted 2 days ago
Job Viewed
Job Description
UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.
By creating continuously optimized identification, detection, and resilience from today's dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India.
We are seeking a Senior Security Engineer to implement and manage advanced security solutions with a focus on Mandiant and Proofpoint technologies within federal government environments. This role will be responsible for security architecture, threat detection, incident response, and email security operations across critical government infrastructure.
Work Environment
Hybrid work model with 2 day/week on-site presence near National Harbor, Maryland
Must maintain required EOD clearance, US Citizenship required
Participation in on-call rotation for security incident response
What You'll Do:
- Design, implement, and maintain Proofpoint email security solutions - including email protection, targeted attack protection, and leveraging intelligence-driven defense strategies.
- Utilize Mandiant Threat Intelligence to enhance threat detection and response capabilities
- Lead incident response efforts using Mandiant tools and methodologies
- Integrate Proofpoint with SIEM/SOAR platforms for automated detection and response.
- Configure and tune security rules and policies in Proofpoint to protect against advanced threats
- Responsible for comprehensive threat assessment reports and trend analysis.
- Analyze security logs and alerts from Proofpoint and Mandiant solutions to identify potential security incidents
- Conduct regular security assessments and vulnerability scans using Mandiant Security Validation
- Develop, recommend, and enforce security processes and procedures
- Document and map the architecture of current scanning and monitoring tools and environment
- Support the development of a Security Engineering Tool roadmap
- Collaborate with cross-functional teams to enhance overall security posture through automation
- Stay current with emerging security technologies and industry trends to recommend improvements or additions.
- Ability to attain DHS EOD
- ITIL V4 Foundations certification (or obtain in first 6 months)
- MA/MS or equivalent +10 years of experience (BA/BS + 13yrs or AA/AS +15yrs)
- Significant experience in information security, with strong hands-on experience in email security and threat intelligence
- Strong knowledge of Proofpoint and Mandiant platforms, including incident response and forensic analysis
- Strong understanding of email-based threats, including phishing, malware, and VEC
- Background in vulnerability management, patch compliance, and endpoint detection
- Experience with an endpoint security and management tool such as Tanium
- 4 or more years of hands-on experience in enterprise IT support
- Experience working with and guiding technicians with varying skill levels and supporting end users remotely
- Strong analytical and problem-solving skills, particularly in optimizing security workflows
- Professional, customer-oriented, and even-keeled under pressure
- Effective communicator at all levels, both written and verbal
- Experience securing federal agency networks and systems
- Prior work with federal agency security operations
- Security certifications (CISSP, GIAC, CEH, Security+)
- Experience with SIEM platforms and security orchestration tools
- Background in cloud security for government environments (FedRAMP)
- Knowledge of Zero Trust implementation per federal guidelines
- Experience with supply chain security requirements (EO 14028)
- Hybrid work model with 2 day/week on-site presence near National Harbor, Maryland
- Must be able to pass a Federal background investigation - US Citizenship required
- Participation in on-call rotation for security incident response
- 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
- Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
- Group Term Life, Short-Term Disability, Long-Term Disability
- Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness
- Participation in the Discretionary Time Off (DTO) Program
- 11 Paid Holidays Annually
$140,000 - $165,000 a year
UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors.
We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.
UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status.
If you want to make an impact, UltraViolet Cyber is the place for you!