Senior Analyst, Cyber Threat Intelligence, Mandiant, Google Cloud
at Google
Location
California, USA
Compensation
$138k–$200k USD
Type
full time
Posted
1 weeks ago
Remote
Yes
Tailor your résumé to this role in 30 seconds.
Free account · ATS keyword check · per-job bullet rewrite by Claude.
Job description
As a Security Consultant focused on the Americas Public Sector, you serve as a strategic bridge between threat intelligence and mission-critical government defense. You act as a technical linchpin for the Mandiant and Google Cloud Security service lines, translating complex global intelligence into actionable security transformations and optimized strategic readiness for high-stakes public sector clients. By managing high-level relationships with key stakeholders, you ensure that frontline intelligence is seamlessly integrated into product deployments and cyber defense architectures, moving beyond reactive posture to proactive resilience. You are the "go-to" specialist for navigating the intersection of evolving threat landscapes and government infrastructure, driving business results through high-quality project delivery.
Responsibilities
- Identify security patterns and scale proactive solutions to anticipate future issues while applying industry trends to transform cyber defenses and business strategies.
- Leverage a strong understanding of the global threat landscape and actor Tactics, Techniques, and Procedures (TTPs) to solve complex forensics and network security problems.
- Translate complex threat data into actionable insights during client briefings and create repeatable intelligence content like tutorials, blogs, and scoping recommendations.
- Apply systems thinking and high-level analytical capability to evaluate ambiguous problems, using logic and critical thinking to pinpoint interrelating root causes over time.
- Act as a technical specialist advising manager-level stakeholders on intelligence-driven solutions while mentoring junior team members on effective analytical methodologies and problem-solving.
Minimum qualifications:
- Bachelor's degree or equivalent practical experience.
- 5 years of experience in a customer-facing analytical role in cyber security (e.g., Network Forensics Analyst, Threat Intelligence Analyst).
- Experience engaging with, and presenting to, technical stakeholders and executive leaders.
- Experience with project management.
- Active US Government Security clearance.
Preferred qualifications:
- 7 years of experience evaluating forensic reports of electronic media, packet capture, log data, malware triage, or enterprise-level information security operations.
- Experience with CTI methodologies and application within cyber security organizations.
- Experience in the analysis of CTI, supporting monitoring, detection, and response capabilities.
- Experience in deploying and analyzing data from technical security controls (e.g., web proxy, firewalls, IPS, IDS, enterprise antivirus solutions, network analyzers).
- Experience with standard network logging formats, network management systems and network security monitoring systems, and security information and event management.
Remote location: California, USA.