Time zones: EST (UTC -5), MST (UTC -7), ART (UTC -3), UTC -4, UTC -4:30, UTC -3, UTC -2
- Bachelor’s stage in Pc Science, Knowledge Methods, Cybersecurity, a similar technical box, or identical sensible enjoy.
- 5 years of enjoy running in incident reaction investigations, research, and containment movements.
- 5 years of enjoy with community forensics, malware triage research, cloud forensics, and disk and reminiscence forensics.
- Talent to shuttle as much as 30% of the time as required.
Most well-liked {qualifications}:
- Certification in GCFA, GCFE, GNFA, GCIA, GREM, GCIH, GX-FA or identical.
- Enjoy managing inside and exterior information breach intrusions, complex power threats, anti-forensic tactics utilized by risk actors, and complicated virtual forensic instances.
- Enjoy in cloud virtual forensics.
- Superb written and verbal communique abilities, having the ability to broaden documentation and provide an explanation for technical main points in a concise method.
- Superb time and challenge control abilities.
As a Safety Guide, you’re going to be accountable for serving to purchasers successfully get ready for, proactively mitigate, and come across and reply to cyber safety threats. Safety Experts have an figuring out of laptop science, running gadget capability and networking, cloud services and products, company community environments and how you can observe this data to cyber safety threats.
As a Safety Guide, it’s good to paintings on engagements together with aiding purchasers in navigating technically complicated and high-profile incidents, acting forensic research, risk searching, and malware triage. You may additionally check Jstomer networks, packages and units by way of emulating the newest tactics to lend a hand them protect towards threats, and would be the technical recommend for info safety necessities and supply an in-depth figuring out of the guidelines safety area. You are going to additionally articulate and provide complicated ideas to trade stakeholders, govt management, and technical members and effectively lead complicated engagements along pass practical groups.
On this function, you’re going to perceive evolving attacker habits and motivations, set up client-facing tasks, and lend a hand teach/mentor different safety specialists.
A part of Google Cloud, Mandiant is a identified chief in dynamic cyber protection, risk intelligence and incident reaction services and products. By way of scaling a long time of frontline enjoy, Mandiant is helping organizations to be assured of their readiness to protect towards and reply to cyber threats.
- Acknowledge and codify attacker Equipment, Ways, and Procedures (TTPs) and Signs of Compromise (IOCs) that may be carried out to present and long term investigations.
- Increase and provide complete and correct reviews, trainings, and shows for each technical and govt audiences.
- Behavior host forensics, community forensics, log research, and malware triage in toughen of incident reaction investigations.
- Lead client-facing incident reaction engagements, keep in touch and talk about findings and technique with inside stakeholders together with management and technical staff contributors.
- Increase scripts, equipment, or methodologies to give a boost to Mandiant’s incident reaction processes and features.