9,014 Mandiant jobs in the United States

Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

Connecticut, Connecticut Google

Posted today

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

04332 Augusta, Maine Google

Posted today

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

02940 Providence, Rhode Island Google

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

03302 Silver Lake, New Hampshire Google

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

New Jersey, New Jersey Google

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

Ma, Kentucky Google

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

05633 Montpelier, Vermont Google

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now
Be The First To Know

About the latest Mandiant Jobs in United States !

Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

Pennsylvania, Pennsylvania Google

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

Mandiant Incident Response Practice Leader, Mandiant Consulting (English)

10165 New York, New York Google

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
+ 12 years of experience working on incident response investigations, analysis, or containment actions.
+ 12 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
+ 4 years of people management experience.
+ Ability to travel up to 30% as needed.
+ Ability to communicate in English fluently to work with internal partners and customer teams.
**Preferred qualifications:**
+ 8 years of experience leading incident response investigations, analysis, and containment actions.
+ Experience in Security Competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
+ Experience with cyber-security and programming.
+ Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
+ Ability to quickly assimilate new information with technical acumen.
+ Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
We are seeking a highly technical, self-driven, and motivated Incident Response Leader. In this role, you will use your deep understanding of both existing and emerging threat actors, experience identifying rapidly changing tools, tactics and procedures of attackers, and strong computer forensics response knowledge and skills. You will be able to see the big picture, understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and lead other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $211,000-$297,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Lead large, client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
+ Collaborate with internal and customer teams to investigate and contain incidents.
+ Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
+ Oversee host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Enhance Mandiant's incident response methodologies, processes, and capabilities.
+ Communicate and discuss findings and strategy with internal and external stakeholders including leadership, technical team members, client executives, boards of directors, and legal counsel.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

Senior Security Engineer, Mandiant & Proofpoint

99302 Pasco, Washington UltraViolet Cyber

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Make a difference here.

UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.

By creating continuously optimized identification, detection, and resilience from today's dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India.

We are seeking a Senior Security Engineer to implement and manage advanced security solutions with a focus on Mandiant and Proofpoint technologies within federal government environments. This role will be responsible for security architecture, threat detection, incident response, and email security operations across critical government infrastructure.

Work Environment

Hybrid work model with 2 day/week on-site presence near National Harbor, Maryland

Must maintain required EOD clearance, US Citizenship required

Participation in on-call rotation for security incident response

What You'll Do:
    • Design, implement, and maintain Proofpoint email security solutions - including email protection, targeted attack protection, and leveraging intelligence-driven defense strategies.
    • Utilize Mandiant Threat Intelligence to enhance threat detection and response capabilities
    • Lead incident response efforts using Mandiant tools and methodologies
    • Integrate Proofpoint with SIEM/SOAR platforms for automated detection and response.
    • Configure and tune security rules and policies in Proofpoint to protect against advanced threats
    • Responsible for comprehensive threat assessment reports and trend analysis.
    • Analyze security logs and alerts from Proofpoint and Mandiant solutions to identify potential security incidents
    • Conduct regular security assessments and vulnerability scans using Mandiant Security Validation
    • Develop, recommend, and enforce security processes and procedures
    • Document and map the architecture of current scanning and monitoring tools and environment
    • Support the development of a Security Engineering Tool roadmap
    • Collaborate with cross-functional teams to enhance overall security posture through automation
    • Stay current with emerging security technologies and industry trends to recommend improvements or additions.
What You've Done:
    • Ability to attain DHS EOD
    • ITIL V4 Foundations certification (or obtain in first 6 months)
    • MA/MS or equivalent +10 years of experience (BA/BS + 13yrs or AA/AS +15yrs)
    • Significant experience in information security, with strong hands-on experience in email security and threat intelligence
    • Strong knowledge of Proofpoint and Mandiant platforms, including incident response and forensic analysis
    • Strong understanding of email-based threats, including phishing, malware, and VEC
    • Background in vulnerability management, patch compliance, and endpoint detection
    • Experience with an endpoint security and management tool such as Tanium
    • 4 or more years of hands-on experience in enterprise IT support
    • Experience working with and guiding technicians with varying skill levels and supporting end users remotely
    • Strong analytical and problem-solving skills, particularly in optimizing security workflows
    • Professional, customer-oriented, and even-keeled under pressure
    • Effective communicator at all levels, both written and verbal
Preferred Qualifications:
    • Experience securing federal agency networks and systems
    • Prior work with federal agency security operations
    • Security certifications (CISSP, GIAC, CEH, Security+)
    • Experience with SIEM platforms and security orchestration tools
    • Background in cloud security for government environments (FedRAMP)
    • Knowledge of Zero Trust implementation per federal guidelines
    • Experience with supply chain security requirements (EO 14028)
Work Environment:
    • Hybrid work model with 2 day/week on-site presence near National Harbor, Maryland
    • Must be able to pass a Federal background investigation - US Citizenship required
    • Participation in on-call rotation for security incident response
What We Offer:
    • 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
    • Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
    • Group Term Life, Short-Term Disability, Long-Term Disability
    • Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness
    • Participation in the Discretionary Time Off (DTO) Program
    • 11 Paid Holidays Annually


$140,000 - $165,000 a year

UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors.

We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.

UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status.

If you want to make an impact, UltraViolet Cyber is the place for you!
View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Mandiant Jobs