صاحب العمل نشط
حالة تأهب وظيفة
سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكترونيحالة تأهب وظيفة
سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكترونيTime zones: EST (UTC -5), MST (UTC -7), ART (UTC -3), UTC -4, UTC -4:30, UTC -3, UTC -2 Minimum qualifications: • Bachelor’s degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience. • 5 years of experience working in incident response investigations, ysis, and containment actions. • 5 years of experience with network forensics, malware triage ysis, cloud forensics, and disk and memory forensics. • Ability to travel up to 30% of the time as required. Preferred qualifications: • Certification in GCFA, GCFE, GNFA, GCIA, GREM, GCIH, GX-FA or equivalent. • Experience managing internal and external data breach intrusions, advanced persistent threats, anti-forensic techniques used by threat actors, and complex digital forensic cases. • Experience in cloud digital forensics. • Excellent written and verbal communication ss, with the ability to develop doentation and explain technical details in a concise manner. • Excellent time and project management ss. About the job As a Security Consultant, you will be responsible for helping clients effectively prepare for, proactively mitigate, and detect and respond to cyber security threats. Security Consultants have an understanding of computer science, operating system functionality and networking, cloud services, corporate network environments and how to apply this knowledge to cyber security threats. As a Security Consultant, you could work on engagements including isting clients in navigating technically complex and high-profile incidents, performing forensic ysis, threat hunting, and malware triage. You may also test client networks, applications and devices by emulating the latest techniques to help them defend against threats, and will be the technical advocate for information security requirements and provide an in-depth understanding of the information security domain. You will also articulate and present complex concepts to business stakeholders, executive leadership, and technical contributors and successfully lead complex engagements alongside cross functional teams. In this role, you will understand evolving attacker behavior and motivations, manage client-facing projects, and help train/mentor other security consultants. Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Responsibilities • Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations. • Develop and present comprehensive and accurate reports, trainings, and presentations for both technical and executive audiences. • Conduct host forensics, network forensics, log ysis, and malware triage in support of incident response investigations. • Lead client-facing incident response engagements, communicate and discuss findings and strategy with internal stakeholders including leadership and technical team members.
دوام كامل