Threat Analyst, Google Threat Intelligence Group

GoogleReston, VA
1d$166,000 - $244,000

About The Position

Our Security team works to create and maintain the safest operating environment for Google's users and developers. Security Engineers work with network equipment and actively monitor our systems for attacks and intrusions. In this role, you will also work with software engineers to proactively identify and fix security flaws and vulnerabilities. Google's Threat Intelligence Group (GTIG) is looking for a threat intelligence analyst covering our Middle East APT mission. In this role, you will focus on serious threats to Google, our products, and our users which are consumed by hundreds of security and abuse teams across the company, all levels of leadership, and externally to the security research industry. The US base salary range for this full-time position is $166,000-$244,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process. Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google [https://careers.google.com/benefits/].

Requirements

  • Bachelor's degree or equivalent practical experience.
  • 5 years of experience with security engineering, computer and network security and security protocols.
  • 5 years of coding experience in one or more general purpose languages.
  • 5 years of experience in a threat intelligence or a related analyst role.
  • 2 years of experience in detection engineering with YARA, Snort/Suricata, EDR rule creation.
  • Experience with networks, techniques for lateral machine movement, malware persistence mechanisms, covert channels, application security and user authentication, command and control techniques.

Nice To Haves

  • Experience in an incident response or security operations center.
  • Experience in Reverse Engineering.
  • Understanding of dynamic and static malware analysis.

Responsibilities

  • Identify, analyze, and document network signals, malware behaviors, and threat reports related to trends and developments in adversary tactics, techniques, and procedures (TTPs).
  • Provide clear, actionable, and structured intelligence to product and security teams, assist in ensuring corporate and production systems are safeguarded.
  • Own the analysis efforts of multiple threat actors, and serve as a subject matter expert on how those actors might impact Google and our users.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service