Incident Response Security Consultant, Mandiant
Google · Italy | Denmark | United Kingdom
mid
Security Analyst
ic
· Posted May 14, 2026
Skills
About this role
Google is hiring a mid-level Security Analyst based in Italy | Denmark | United Kingdom. The posting calls out experience with Security, Incident Response, GCP.
- Role
- Security Analyst
- Function
- security
- Level
- mid
- Track
- Individual contributor
- Employment
- Full-time
- Location
- Italy | Denmark | United Kingdom
- Posted
- May 14, 2026
More roles at Google
Technical Program Manager III, Solutions Delivery, Google Cloud
Kirkland, WA | Boulder, CO · mid
GCP
Category Manager, Construction
Chicago, IL | Sunnyvale, CA · director
Senior UX Researcher, Labs, Generative Media
Mountain View, CA | Boulder, CO | New York City, NY | Seattle, WA · senior
LLMs A/B Testing
Senior Software Engineer, Cloud Control Platform SRE
London, United Kingdom · senior
Distributed Systems DevOps GCP
Principal Architect, Financial Services Institution, Google Cloud (English, Polish)
Warsaw, Poland · principal
Cloud Computing GCP Performance Optimization
All Google jobs →
Job description
from Google careers
In this role, you will understand existing and emerging threat actors, and identify rapidly changing tools, tactics, and procedures of attackers. You will understand evolving attacker behaviour and motivations, participate and manage large client-facing projects, and train and mentor other security consultants.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
Responsibilities
- Collaborate with internal and customer teams to investigate and contain incidents.
- Identify and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
- Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.
- Lead client-facing incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
Minimum qualifications:
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
- 3 years of experience in investigations with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
This is an excerpt. Read the full job description on Google careers →