Job is more than three months old.
Job Details
Posted date: Aug 14, 2024
Location: Seattle, WA
Level: Senior
Description
Collaborate with internal SOC teams and customers to drive effective cloud security monitoring and incident response. Develop and mature incident response protocols tailored for cloud security events, minimizing impact and recovery time. Create and refine operational playbooks for cloud security investigations, threat hunting, and incident triage. Monitor and analyze cloud security telemetry from SIEM, CASB, CSPM, and other security tools to detect and respond to threats. Lead incident response efforts for cloud-related security events, conducting thorough analysis and root cause investigations.Qualifications
Minimum qualifications: Bachelor’s degree or equivalent practical experience.6 years of experience in technical troubleshooting, and managing internal/external partners or customers.
6 years of experience in system design or in one programming language (Java, C++, Python, etc.).
Experience with network forensics, malware triage analysis, cloud forensics, and disk and memory forensics.
Experience working with incident response investigations, analysis, and containment actions.
Secret US Government Security clearance.
Preferred qualifications: Experience in SIEM event analysis, triage, and investigation. Experience providing technical guidance and support to TIER 1 analysts.
Knowledge of security event management, leveraging common support systems (e.g. ServiceNow) to document and manage the lifecycle of an incident.
Proven ability to conduct comprehensive security impact assessments, identify potential risks, and produce detailed, actionable reports, including understanding of industry standards and regulatory compliance requirements.
Expertise in developing technical requirements for Security tooling, ensuring alignment with security objectives and project goals, and familiarity with agile development methodologies and collaboration tools.
Ability to effectively mentor and train team members.
Extended Qualifications
Bachelor’s degree or equivalent practical experience.6 years of experience in technical troubleshooting, and managing internal/external partners or customers.
6 years of experience in system design or in one programming language (Java, C++, Python, etc.).
Experience with network forensics, malware triage analysis, cloud forensics, and disk and memory forensics.
Experience working with incident response investigations, analysis, and containment actions.
Secret US Government Security clearance.
Check out other jobs at Google.