Job Description
The application window will be open until at least April 6, 2026. This opportunity will remain online based on business needs which may be before or after the specified date.
Note: Google's hybrid workplace includes remote roles. By applying to this position you will have an opportunity to share your preferred working location from the following:
Remote locations: Kansas, USA; United States.
Minimum qualifications:
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
- 3 years of experience working in end-to-end enterprise incident response investigations, including forensic analysis or containment activities.
- 3 years of investigative experience with digital forensics and incident response, with a technical specialization in two of the following: operating system internals, Linux/UNIX operating system internals, MacOS operating system internals, network forensics, cloud forensics, or memory forensics.
- Ability to travel up to 30% of the time as required.
Preferred qualifications:
- Experience in security competitions, Capture the Flags (CTFs) or testing platforms such as hack the box, tryhackme, overthewire, etc.
- Working knowledge of network security architecture, network protocols, network devices, computer security devices, secure architecture and system administration in support of computer forensics and network security operations.
- Ability to manage project timelines, follow methodologies and create deliverables.
- Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
About the job
As a Digital Forensics and Incident Response Consultant, you will provide industry leading incident response, assessment, transformation, managed detection and response, and training services with in-depth tactical support. You will help organizations effectively detect and respond to threats and reduce the overall impact of business risk before, during, and after an incident. You will resolve security incidents quickly, effectively and at scale with complete incident response including investigation, containment, remediation, and crisis management. In this role, you will work on engagements including assisting clients in navigating technically high-profile incidents, performing forensic analysis, threat hunting, and malware triage. You will understand existing and emerging threat actors, and identify rapidly changing tools, tactics, and procedures of attackers. You will understand evolving attacker behavior and motivations, participate and manage large client-facing projects, and train and mentor other security consultants.
Responsibilities
- Conduct host forensics, live response analysis, log analysis, network traffic analysis, and enterprise searches in support of incident response investigations. Complete system analysis reports and contribute to investigation reports.
- Apply a basic understanding of the incident response approach and primary incident response and digital forensics tools to incident response investigations. Examine endpoint, cloud, and network based sources of evidence, and investigate and contain incidents.
- Collaborate with internal and customer teams to investigate and contain incidents.
- Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
- Build scripts, tools, or methodologies to enhance mandiantβs incident investigation processes and capabilities.
Apply Now